期刊文献+

白盒密码的设计与研究 被引量:1

Design and Study of White-Box Cryptography
原文传递
导出
摘要 白盒攻击环境指的是密码软件的执行对攻击者完全可见的环境。在白盒攻击环境中,攻击者通过观察或者执行密码软件,很容易就可以获得密钥信息。白盒密码是针对这种环境提出来的,其目的是为了在白盒攻击环境中,有效地防止攻击者获得密钥信息,并介绍了白盒密码的主要设计方法并进行了分析。 White-Box attack context is the setting that the attacker has thorough access to the software implementation; the attacker could acquire the secret keys by observing or implementing the cryptographic software. White-Box cryptography is proposed under these circumstances, which aims at protecting the secret keys in White-Box attack context and preventing the attacker from finding the keys. In this paper, the main idea of how to design a White-Box cryptography is presented, and an analysis of the cryptography also given.
机构地区 上海交通大学
出处 《信息安全与通信保密》 2010年第2期45-48,共4页 Information Security and Communications Privacy
关键词 白盒密码 白盒攻击环境 分组密码 置乱编码 White-Box cryptography White-Box attack context block cipher encoding
  • 相关文献

参考文献17

  • 1Craver S A, Wu M, Liu B, et al. Reading Between the Lines: Lessons from the SDMI Challenge[R]. Washington, D.C. USA: Proc. 10^th USENIX Security Symposium, 2001.
  • 2Content Scramble System. DVD Copy Control Association[EB/OL]. (2008-10-08)[2009-12-01]. http: //www.dvdcca.org/css.
  • 3Sibert O, Bernstein D, van Wie D. The DigiBox: A Self-Protecting Container for Information Commerce[C]. New York: Proceedings of the First USENIX Workshop on Electronic Commerce, 1995: 01-13.
  • 4Adobe Systems Incorporated. Adobe Opens eBook Distribution With New Server Technology[EB/OL]. (2008-09-09)[2009-12-01]. http: //www.adobe. com/products/contentserver/.
  • 5Abraham D G, Dolan G M, Double G P, et al.Transaction Security System[J]. IBM Journal of Research and Development, 1991, 30(02): 206-229.
  • 6MAXIM-Dallas Semiconductor. Soft MicrocontroUer Module[EB/OL]. (2006-06-13)[2009-12-01]. http: //www.maxim-ic.com.cn/pdfserv/en/ds/ DS2252T.pdf.
  • 7Ross Anderson. Trusted Computing Platform Alliance FAQs[EB/OL]. (2003-08)[2009-12-01]. http: //www.cl.cam.ac.uk/~rja14/tcpa-faq.html.
  • 8Chow S, Eisen P, Johnson H, et al. A White-Box DES hnplementation for DRM Applications[J]. Lecture Notes in Computer Science, 2003, 2696: 01-15.
  • 9Chow S, Eisen P, Johnson H, et al. White-Box Cryptography and an AES Implementation[J]. Lechire Notes in Computer Science, 2003, 2595: 250-270.
  • 10Jacob M, Boneh D, Felten E. Attacking An Obfuscated Cipher by Injecting Faults[J]. Lecture Notes in Computer Science, 2003, 2696: 16-31.

共引文献8

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部