CN106603224A - Safety operation method and system based on white box encryption - Google Patents
Safety operation method and system based on white box encryption Download PDFInfo
- Publication number
- CN106603224A CN106603224A CN201611103026.4A CN201611103026A CN106603224A CN 106603224 A CN106603224 A CN 106603224A CN 201611103026 A CN201611103026 A CN 201611103026A CN 106603224 A CN106603224 A CN 106603224A
- Authority
- CN
- China
- Prior art keywords
- static data
- decryption
- encryption
- lambda
- whitepack
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention provides a safety operation method and system based on white box encryption. The corresponding encryption algorithm and the decryption algorithm are matched by employing a series of static data as fixed input, lightweight safety operation can be realized, the volume of the static data is small, the operation efficiency is high, and relatively high encryption security can be obtained in a white box attack environment with limited calculating resources.
Description
Technical field
The present invention relates to network safety filed, more particularly to a kind of method for safe operation encrypted based on whitepack and it is
System.
Background technology
With the development of the technologies such as Internet of Things and mobile computing, program may operate in scene in unsafe conditions also day
Benefit increases, such as by attacker's pickup or the smart mobile phone stolen and panel computer, the sensor network nodes being captured etc.,
Among running environment in being absolutely unsafe.The safety of the cryptographic algorithm and agreement safety overall to guarantee information system is to pass
It is important.The attack model of traditional cryptographic system, chosen -plain attact and chosen ciphertext attacks etc., are all based on one jointly
It is assumed that i.e. cryptographic algorithm is operated on safe terminal.Side-channel attack allows attacker to obtain certain leakage information,
But still constraining for function is leaked by what is given.And aforesaid some unsafe conditions, attacker is to program and its running
Unrestricted and observation can be carried out and intervened.Now, among white-box attack context, attacker can be using reverse for program
The strong attack method such as engineering and trace debug, is analyzed to crypto module and cracks.
Known whitepack encryption method, needs mostly large volume of static lookup table (MB of hundreds of KB to tens), and counts
Calculate cost larger, the embedded device not being suitable in mobile terminal and Internet of Things.In consideration of it, how to find safety preferably,
And while the lightweight whitepack encryption method with less static data volume and higher operational efficiency, just into this area
Technical staff's problem demanding prompt solution.
The content of the invention
The shortcoming of prior art in view of the above, it is an object of the invention to provide a kind of safety encrypted based on whitepack
Operation method and system, for solving to realize in prior art while having less static data volume and higher fortune
The problem of the encryption and decryption of line efficiency.
For achieving the above object and other related purposes, the present invention provides a kind of safe operation side encrypted based on whitepack
Method, including:Main frame of the order in security context is generated quiet for the encryption of encryption respectively according to default data genaration algorithm
State data acquisition system and the decryption static data set for decryption;The encryption static data set is stored in a terminal to set
It is standby, and the decryption static data set is stored in into a security terminal in security context;When the terminal unit pair
When the plaintext of one input is encrypted, the encryption static data collection merga pass is called to default in the encryption of the terminal unit
Algorithm, is encrypted to obtain the ciphertext of corresponding output to the plaintext of the input;When the terminal unit is to an input
When ciphertext is decrypted, the decryption static data collection merga pass is called to default in the security terminal from the security terminal
Decipherment algorithm, the ciphertext of the input is decrypted to obtain the plaintext of corresponding output.
In a specific embodiment of the invention, the data genaration algorithm is to generate the encryption static number for encryption respectively
Calculated using the data genaration according to set and the probabilistic algorithm of the decryption static data set for decryption, and the main frame
During method generates the encryption static data set and the decryption static data set, multiple random squares can be produced
Battle array.
In a specific embodiment of the invention, calculate in the data genaration algorithm, the AES and the decryption
Also include in the running of method:Make x, y ∈ Z+,For the set of entirety (xy) × (xy) reversible binary matrixes,For
The set of entirety (xy) × (xy) binary matrixs,For the set of all x positions to x positions dijection,It is all x positions to x positions
The set of dijection;And r ∈ { 0, L, N-1 } are made, wherein N is wheel number, and has i ∈ { 0, L, y-1 };Make Xr,Yr∈GF(2)x·y, Xr=
(Xr,y,L,Xr,0), Yr=(Yr,y,L,Yr,0), wherein for each i, Xr,i,Yr,i∈GF(2)x;For each i has Hi,
And haveWherein, ∈$Represent the uniform element chosen from set;For each i,J=0, L, 2y-1, and
Λ ' i are dijection of the 2xy position to 2xy positions so that Λi′,=Λ 'I, 2y-1PL PΛ′I, 0, wherein P represents two
Mapping is abreast acted on.
In a specific embodiment of the invention, orderWherein LiIt it is i-th piece from right to left, L is a random matrix, and is closed
In the formula expression of L it is:
L=[Ly-1 L L0]; (11)
And makeWherein ΔiIt it is i-th piece from right to left, Δ is a random matrix, and the formula of Δ is expressed as:
Δ=[Δy-1 L Δ0]; (12)
I-th T-box, i.e. T for making r take turnsi, the TiFor a look-up table, and Ti:GF(2)x×GF(2)x→GF(2
)2·x·y, TiDefinition expressed by equation below:
Wherein, the f in formula (3)iExpressed by below equation:
And for each pair<j,i>, wherein j ∈ { 0, K, 2y-1 }, i ∈ { 1, L, y-2 } make F by below equationi,j:GF
(2)x×GF(2)x→GF(2)xFor hidden safe adder masked secure adder:
Wherein, x0,x1∈GF(2)xAnd
In a specific embodiment of the invention, the security terminal is a back-end server, work station or is the place
Main frame in security context.
For achieving the above object and other related purposes, the present invention also provides a kind of safe operation system encrypted based on whitepack
System, including:Static data generation module, is arranged in the main frame in security context, to make the main frame according to default
Data genaration algorithm, generate respectively for encryption encryption static data set and for decryption decryption static data collection
Close;Static data memory module, is arranged in the main frame, sets the encryption static data set is stored in a terminal
It is standby, and the decryption static data set is stored in into a security terminal in security context;Encrypting module, is arranged at institute
State in terminal unit, when the terminal unit is encrypted to the plaintext of an input, to call the encryption static data
Collection merga pass defaults in the AES of the terminal unit, the plaintext of the input is encrypted corresponding defeated to obtain
The ciphertext for going out;Deciphering module, is arranged in the terminal unit, to solve to the ciphertext of an input when the terminal unit
When close, the decryption that the decryption static data collection merga pass defaults in the security terminal is called to calculate from the security terminal
Method, is decrypted to obtain the plaintext of corresponding output to the ciphertext of the input.
In a specific embodiment of the invention, the data genaration algorithm is to generate the encryption static number for encryption respectively
Calculated using the data genaration according to set and the probabilistic algorithm of the decryption static data set for decryption, and the main frame
During method generates the encryption static data set and the decryption static data set, multiple random squares can be produced
Battle array.
In a specific embodiment of the invention, calculate in the data genaration algorithm, the AES and the decryption
Also include in the running of method:
Make x, y ∈ Z+,For the set of entirety (xy) × (xy) reversible binary matrixes,For all (xy) ×
(xy) set of binary matrix,For the set of all x positions to x positions dijection,For the set of all x positions to x positions dijection;
And r ∈ { 0, L, N-1 } are made, wherein N is wheel number, and has i ∈ { 0, L, y-1 };Make Xr,Yr∈GF(2)x·y, Xr=(Xr,y, L,
Xr,0), Yr=(Yr,y, L, Yr,0), wherein for each i, Xr,i,Yr,i∈GF(2)x;For each i has Hi,And haveWherein, ∈$Represent the uniform element chosen from set;For each i,J=0, L, 2y-1, and Λ ' i
It is dijection of the 2xy position to 2xy positions so that Λi′,=Λi′,2y-1PL PΛi′,0, wherein P represents two mappings
Abreast act on.
In a specific embodiment of the invention, orderWherein LiIt it is i-th piece from right to left, L is a random matrix, and is closed
In the formula expression of L it is:
L=[Ly-1 L L0]; (16)
And makeWherein ΔiIt it is i-th piece from right to left, Δ is a random matrix, and the formula of Δ is expressed as:
Δ=[Δy-1 L Δ0]; (17)
I-th T-box, i.e. T for making r take turnsi, the TiFor a look-up table, and Ti:GF(2)x×GF(2)x→GF(2
)2·x·y, TiDefinition expressed by equation below:
Wherein, the f in formula (3)iExpressed by below equation:
And for each pair<j,i>, wherein j ∈ { 0, K, 2y-1 }, i ∈ { 1, L, y-2 } make F by below equationi,j:GF
(2)x×GF(2)x→GF(2)xFor hidden safe adder masked secure adder:
Wherein, x0,x1∈GF(2)xAnd
In a specific embodiment of the invention, the security terminal is a back-end server, work station or is the place
Main frame in security context.
As described above, the method for safe operation encrypted based on whitepack and system of the present invention, using a series of static datas
Corresponding AES and decipherment algorithm are matched as fixed input, the present invention can realize the safe operation of lightweight, and
The present invention has less static data volume and higher operational efficiency, and can cause in the limited white-box attack of computing resource
Of a relatively high cryptographic security is obtained in environment.
Description of the drawings
Fig. 1 is shown as illustrating based on the method for safe operation flow process in one embodiment that whitepack is encrypted for the present invention
Figure.
Fig. 2 is shown as the T in a specific embodiment of the present inventioniStructural representation.
Fig. 3 is shown as the T in a specific embodiment of the present inventioniStructural representation.
Fig. 4 is shown as the internal structure of the hidden adder in a specific embodiment of the present invention and which is encrypted in whitepack
Contact schematic diagram in journey.
Fig. 5 is shown as the algorithm flow schematic diagram of r wheel encryptions in a specific embodiment of the present invention.
Fig. 6 is shown as illustrating based on the safe operation system module in one embodiment that whitepack is encrypted for the present invention
Figure.
Component label instructions
10 method for safe operation encrypted based on whitepack
11~13 method and steps
20 safe operation systems encrypted based on whitepack
21 static data generation modules
22 static data memory modules
23 encrypting modules
24 deciphering modules
Specific embodiment
Embodiments of the present invention are illustrated below by way of specific instantiation, those skilled in the art can be by this specification
Disclosed content understands other advantages and effect of the present invention easily.The present invention can also pass through concrete realities different in addition
The mode of applying is carried out or applies, the every details in this specification can also based on different viewpoints with application, without departing from
Various modifications and changes are carried out under the spirit of the present invention.It should be noted that, in the case where not conflicting, following examples and enforcement
Feature in example can be mutually combined.
It should be noted that the diagram provided in following examples only illustrates the basic structure of the present invention in a schematic way
Think, the component relevant with the present invention is only shown in illustrating then rather than according to component count during actual enforcement, shape and size
Draw, which is actual when the implementing kenel of each component, quantity and ratio can be a kind of random change, and its assembly layout kenel
It is likely more complexity.
In order that the narration of the present invention it is more detailed with it is complete, can refer to the various embodiments of accompanying drawing and described below.But
There is provided embodiment simultaneously is not used to limit the scope covered by the present invention;The description of step is also not used to limit the suitable of its execution
Sequence, it is any by reconfiguring, it is produced with it is equal the effects such as device, be all the scope covered by the present invention.
In embodiment and claim, unless for article has been particularly limited in interior text, otherwise " one " with "
Should " single or a plurality of can be referred to.It will be further appreciated that, "comprising" used herein, " including ", " having " and
Similar vocabulary, indicates feature described in which, region, integer, step, operation and/or component, but is not excluded for extra one
Or multiple further features, region, integer, step, operation, component, and/or group wherein.
Fig. 1 is referred to, the method for safe operation encrypted based on whitepack of the present invention is shown as in one embodiment
Schematic flow sheet.Methods described 10 includes:
11:Main frame of the order in security context generates adding for encryption respectively according to default data genaration algorithm
Close static data set and the decryption static data set for decryption;
12:The encryption static data set is stored in into a terminal unit, and the decryption static data set is deposited
It is stored in a security terminal in security context;
13:When the terminal unit is encrypted to the plaintext of an input, the encryption static data collection is called to merge
By the AES for defaulting in the terminal unit, the plaintext of the input is encrypted to obtain the close of corresponding output
Text;When the terminal unit is decrypted to the ciphertext of an input, the decryption static data is called from the security terminal
Collection merga pass defaults in the decipherment algorithm of the security terminal, the ciphertext of the input is decrypted corresponding defeated to obtain
The plaintext for going out.
In a specific embodiment of the invention, the data genaration algorithm is to generate the encryption static number for encryption respectively
Calculated using the data genaration according to set and the probabilistic algorithm of the decryption static data set for decryption, and the main frame
During method generates the encryption static data set and the decryption static data set, multiple random squares can be produced
Battle array.
Preferably, the encryption static data set includes a look-up table, to carry out corresponding looking into according to the plaintext of input
Look for, obtain corresponding ciphertext.
In a specific embodiment of the invention, calculate in the data genaration algorithm, the AES and the decryption
Also include in the running of method:Make x, y ∈ Z+,For the set of entirety (xy) × (xy) reversible binary matrixes,For
The set of entirety (xy) × (xy) binary matrixs,For the set of all x positions to x positions dijection,It is all x positions to x positions
The set of dijection;And r ∈ { 0, L, N-1 } are made, wherein N is wheel number, and has i ∈ { 0, L, y-1 };Make Xr,Yr∈GF(2)x·y, Xr=
(Xr,y, L, Xr,0), Yr=(Yr,y, L, Yr,0), wherein for each i, Xr,i,Yr,i∈GF(2)x;For each i has Hi,
And haveWherein, ∈$Represent the uniform element chosen from set;For each i,J=0, L, 2y-1, and
Λ ' i are dijection of the 2xy position to 2xy positions so that Λi' ,=Λi′,2y-1PL PΛi′,0, wherein P represents two
Individual mapping is abreast acted on.
In a specific embodiment of the invention, orderWherein LiIt it is i-th piece from right to left, L is a random matrix, and is closed
In the formula expression of L it is:
L=[Ly-1 L L0]; (21)
And makeWherein ΔiIt it is i-th piece from right to left, Δ is a random matrix, and the formula of Δ is expressed as:
Δ=[Δy-1 L Δ0]; (22)
I-th T-box, i.e. T for making r take turnsi, the TiFor the look-up table, and Ti:GF(2)x×GF(2)x→GF(2
)2·x·y, TiDefinition expressed by equation below:
The T is applied whereiniStructure it is as shown in Figure 2.And when x takes 4, y and takes 8, using the TiStructure such as Fig. 3 institutes
Show.
Wherein, the f in formula (3)iExpressed by below equation:
And for each pair<j,i>, wherein j ∈ { 0, K, 2y-1 }, i ∈ { 1, L, y-2 } make F by below equationi,j:GF
(2)x×GF(2)x→GF(2)xFor hidden safe adder masked secure adder:
Wherein, x0,x1∈GF(2)xAnd
Also, for each j ∈ { 0, L, 2y-1 }, F0,jIt is relied in the hidden addition of wheelSubstitute, referring particularly to following
Formula:
WhereinAnd the internal structure of hidden adder and their contact in whitepack ciphering process are in Fig. 4
Middle displaying.
In a specific embodiment of the invention, the security terminal is a back-end server, work station or is the place
Main frame in security context.The terminal unit for example includes that smart mobile phone, panel computer, desktop computer or intelligence can be worn
Wear equipment etc..Specifically, in actual applications, the flow process of the algorithm 1 is specially:
Note in the algorithm, TBoxiIt is one and realizes TiLook-up table, " FBoxi,j" andIt is to realize Fi,j
WithHidden adder.
(it is quiet that ciphering process needs the clear packets and data_enc of AES Enc (algorithm 2) receptions one 128
State data) as being input into and export corresponding 128 ciphertexts.
The flow process of algorithm 2 is specially:
Wherein, the component of tabular and its association, and the data flow of r wheel encryptions is referring particularly to shown in Fig. 5.
And the wheel number in the present invention can according to user need voluntarily arrange, also, the output of the first round is used as second
The input of wheel continues executing with the calculating process shown in Fig. 5, with when the output of the second wheel is obtained, by the output of second wheel
As the input of third round, and the wheel number of setting is performed successively, and the calculating output result of last wheel, it is this calculating
Output.
, and the flow process of algorithm 3 is specially:
Decipherment algorithm (algorithm 3) is assumed to be deployed in safety (black box attack) environment, such as back-end server or work
Stand.The measured block cipher (such as AES and DES) of traditional white-box attack decipherment algorithm simply uses key and extra coding
Carry out decrypting ciphertext.By contrast, set forth herein decipherment algorithm it is right to match as fixed input using a series of static datas
The AES answered.This is that our scheme obtains of a relatively high encryption peace in the limited white-box attack context of computing resource
The key of full property.
In one embodiment, the application principle of the of the invention method for safe operation 10 encrypted based on whitepack is:
During system initialization, generated using DataGen (algorithm 1) on the main frame of safety and be respectively used to encrypt and decrypt two
Individual static data set data_enc and data_dec (replacing the key in conventional symmetrical encryption system);The static state that decryption is used
Data acquisition system data_dec is stored in safe decrypting end, and encrypting that the static data set data_enc for using is stored in may be
On terminal unit used in white-box attack context;During encryption, Enc (algorithm 2) is called on the terminal device, using data_enc
As parameter, plaintext is encrypted and obtains ciphertext;During decryption, Dec (algorithm 3) is called on main frame, using data_dec
As parameter, ciphertext is decrypted and is recovered in plain text.
Fig. 6 is further regarded to, the safe operation system 20 encrypted based on whitepack of the present invention is shown as, including:
Static data generation module 21, is arranged in the main frame in security context, to make the main frame according to pre-
If data genaration algorithm, generate respectively for encryption encryption static data set and for decryption decryption static data
Set;
Static data memory module 22, is arranged in the main frame, the encryption static data set to be stored in
One terminal unit, and the decryption static data set is stored in into a security terminal in security context;
Encrypting module 23, is arranged in the terminal unit, to carry out to the plaintext of an input when the terminal unit
During encryption, the encryption static data collection merga pass is called to default in the AES of the terminal unit, to the input
Plaintext be encrypted to obtain the ciphertext of corresponding output;
Deciphering module 24, is arranged in the terminal unit, to carry out to the ciphertext of an input when the terminal unit
During decryption, the decryption that the decryption static data collection merga pass defaults in the security terminal is called to calculate from the security terminal
Method, is decrypted to obtain the plaintext of corresponding output to the ciphertext of the input.
In a specific embodiment of the invention, the data genaration algorithm is to generate the encryption static number for encryption respectively
Calculated using the data genaration according to set and the probabilistic algorithm of the decryption static data set for decryption, and the main frame
During method generates the encryption static data set and the decryption static data set, multiple random squares can be produced
Battle array.
In a specific embodiment of the invention, calculate in the data genaration algorithm, the AES and the decryption
Also include in the running of method:
Make x, y ∈ Z+,For the set of entirety (xy) × (xy) reversible binary matrixes,For all (xy) ×
(xy) set of binary matrix,For the set of all x positions to x positions dijection,For the set of all x positions to x positions dijection;
And r ∈ { 0, L, N-1 } are made, wherein N is wheel number, and has i ∈ { 0, L, y-1 };Make Xr,Yr∈GF(2)x·y, Xr=(Xr,y,L,
Xr,0), Yr=(Yr,y, L, Yr,0), wherein for each i, Xr,i,Yr,i∈GF(2)x;For each i has Hi,And haveWherein, ∈$Represent the uniform element chosen from set;For each i,J=0, L, 2y-1, and Λ ' i
It is dijection of the 2xy position to 2xy positions so that Λi′,=Λi′,2y-1PL PΛ′i,0, wherein P represents two mappings
Abreast act on.
In a specific embodiment of the invention, orderWherein LiIt it is i-th piece from right to left, L is a random matrix, and is closed
In the formula expression of L it is:
L=[Ly-1 L L0]; (27)
And makeWherein ΔiIt it is i-th piece from right to left, Δ is a random matrix, and the formula of Δ is expressed as:
Δ=[Δy-1 L Δ0]; (28)
I-th T-box, i.e. T for making r take turnsi, the TiFor the look-up table, and Ti:GF(2)x×GF(2)x→GF(2
)2·x·y, TiDefinition expressed by equation below:
Wherein, the f in formula (3)iExpressed by below equation:
And for each pair < j, i>, wherein j ∈ { 0, K, 2y-1 }, i ∈ { 1, L, y-2 } make F by below equationi,j:GF
(2)x×GF(2)x→GF(2)xFor hidden safe adder masked secure adder:
Wherein, x0,x1∈GF(2)xAnd
In a specific embodiment of the invention, the security terminal is a back-end server, work station or is the place
Main frame in security context.
It is described based on whitepack encrypt safe operation system 20 be and it is described based on whitepack encrypt method for safe operation 10
Corresponding system entries, the description of all about method for safe operation 10 encrypted based on whitepack can be applicable to the present embodiment
In, here is not added with repeating.
In sum, the of the invention method for safe operation encrypted based on whitepack and system, using a series of static datas
Corresponding AES and decipherment algorithm are matched as fixed input, the present invention can realize the safe operation of lightweight, and
The present invention has less static data volume and higher operational efficiency, and can cause in the limited white-box attack of computing resource
Of a relatively high cryptographic security is obtained in environment.So, the present invention effectively overcomes various shortcoming of the prior art and has
High industrial utilization.
The principle and its effect of above-described embodiment only illustrative present invention, it is of the invention not for limiting.It is any ripe
The personage for knowing this technology all can carry out modifications and changes to above-described embodiment under the spirit and the scope without prejudice to the present invention.Cause
This, those of ordinary skill in the art is complete with institute under technological thought without departing from disclosed spirit such as
Into all equivalent modifications or change, should by the present invention claim be covered.
Claims (10)
1. it is a kind of based on whitepack encrypt method for safe operation, it is characterised in that include:
Main frame of the order in security context generates the encryption static number for encryption respectively according to default data genaration algorithm
According to set and the decryption static data set for decryption;
The encryption static data set is stored in into a terminal unit, and the decryption static data set is stored at one
Security terminal in security context;
When the terminal unit is encrypted to the plaintext of an input, the encryption static data collection merga pass is called to preset
In the AES of the terminal unit, the plaintext of the input is encrypted to obtain the ciphertext of corresponding output;
When the terminal unit is decrypted to the ciphertext of an input, the decryption static data is called from the security terminal
Collection merga pass defaults in the decipherment algorithm of the security terminal, the ciphertext of the input is decrypted corresponding defeated to obtain
The plaintext for going out.
2. it is according to claim 1 based on whitepack encrypt method for safe operation, it is characterised in that:The data genaration is calculated
Method is to generate the probability calculation of the encryption static data set for encryption and the decryption static data set for decryption respectively
Method, and the main frame is generating the encryption static data set and the decryption static number using the data genaration algorithm
During according to set, multiple random matrixes can be produced.
3. it is according to claim 1 based on whitepack encrypt method for safe operation, it is characterised in that:In the data genaration
Also include in the running of algorithm, the AES and the decipherment algorithm:
Make x, y ∈ Z+,For the set of entirety (xy) × (xy) reversible binary matrixes,For entirety (xy) × (xy)
The set of binary matrix,For the set of all x positions to x positions dijection,For the set of all x positions to x positions dijection;And make r ∈
{ 0, L, N-1 }, wherein N are wheel number, and have i ∈ { 0, L, y-1 };Make Xr,Yr∈GF(2)x·y, Xr=(Xr,y,L,Xr,0), Yr=
(Yr,y,L,Yr,0), wherein for each i, Xr,i,Yr,i∈GF(2)x;For each i hasAnd haveWherein,
∈$Represent the uniform element chosen from set;For each i,And Λ 'iIt is a 2xy
Dijection of the position to 2xy positions so that Λ 'i,=Λ 'i,2y-1PL PΛ′i,0, wherein P represents that two mappings are abreast acted on.
4. it is according to claim 3 based on whitepack encrypt method for safe operation, it is characterised in that:OrderWherein LiIt is
I-th piece from right to left, L is a random matrix, and the formula expression with regard to L is:
L=[Ly-1 L L0]; (1)
And makeWherein ΔiIt it is i-th piece from right to left, Δ is a random matrix, and the formula of Δ is expressed as:
Δ=[Δy-1 L Δ0]; (2)
I-th T-box, i.e. T for making r take turnsi, the TiFor a look-up table, and Ti:GF(2)x×GF(2)x→GF(2)2·x·y, Ti
Definition expressed by equation below:
Wherein, the f in formula (3)iExpressed by below equation:
And for each pair<j,i>, wherein j ∈ { 0, K, 2y-1 }, i ∈ { 1, L, y-2 } make F by below equationi,j:GF(2)x×
GF(2)x→GF(2)xFor hidden safe adder masked secure adder:
Wherein, x0,x1∈GF(2)xAnd
5. it is according to claim 1 based on whitepack encrypt method for safe operation, it is characterised in that:The security terminal is
One back-end server, work station or for the main frame in security context.
6. it is a kind of based on whitepack encrypt safe operation system, it is characterised in that include:
Static data generation module, is arranged in the main frame in security context, to make the main frame according to default number
According to generating algorithm, the encryption static data set and the decryption static data set for decryption for encryption is generated respectively;
Static data memory module, is arranged in the main frame, the encryption static data set is stored in a terminal
Equipment, and the decryption static data set is stored in into a security terminal in security context;
Encrypting module, is arranged in the terminal unit, to when the terminal unit to one input plaintext be encrypted when,
Call the encryption static data collection merga pass to default in the AES of the terminal unit, the plaintext of the input is entered
Row is encrypted to obtain the ciphertext of corresponding output;
Deciphering module, is arranged in the terminal unit, to when the terminal unit to one input ciphertext be decrypted when,
The decryption static data collection merga pass is called to default in the decipherment algorithm of the security terminal from the security terminal, to institute
The ciphertext for stating input is decrypted to obtain the plaintext of corresponding output.
7. it is according to claim 6 based on whitepack encrypt safe operation system, it is characterised in that:The data genaration is calculated
Method is to generate the probability calculation of the encryption static data set for encryption and the decryption static data set for decryption respectively
Method, and the main frame is generating the encryption static data set and the decryption static number using the data genaration algorithm
During according to set, multiple random matrixes can be produced.
8. it is according to claim 6 based on whitepack encrypt safe operation system, it is characterised in that:In the data genaration
Also include in the running of algorithm, the AES and the decipherment algorithm:
Make x, y ∈ Z+,For the set of entirety (xy) × (xy) reversible binary matrixes,For entirety (xy) × (xy)
The set of binary matrix,For the set of all x positions to x positions dijection,For the set of all x positions to x positions dijection;And make r ∈
{ 0, L, N-1 }, wherein N are wheel number, and have i ∈ { 0, L, y-1 };Make Xr,Yr∈GF(2)x·y, Xr=(Xr,y,L,Xr,0), Yr=
(Yr,y,L,Yr,0), wherein for each i, Xr,i,Yr,i∈GF(2)x;For each i hasAnd haveWherein,
∈$Represent the uniform element chosen from set;For each i,And Λ 'iIt is a 2xy
Dijection of the position to 2xy positions so that Λ 'i,=Λ 'i,2y-1PL PΛ′i,0, wherein P represents that two mappings are abreast acted on.
9. it is according to claim 8 based on whitepack encrypt safe operation system, it is characterised in that:OrderWherein LiIt is
I-th piece from right to left, L is a random matrix, and the formula expression with regard to L is:
L=[Ly-1 L L0]; (6)
And makeWherein ΔiIt it is i-th piece from right to left, Δ is a random matrix, and the formula of Δ is expressed as:
Δ=[Δy-1 L Δ0]; (7)
I-th T-box, i.e. T for making r take turnsi, the TiFor a look-up table, and Ti:GF(2)x×GF(2)x→GF(2)2·x·y, Ti
Definition expressed by equation below:
Wherein, the f in formula (3)iExpressed by below equation:
And for each pair<j,i>, wherein j ∈ { 0, K, 2y-1 }, i ∈ { 1, L, y-2 } make F by below equationi,j:GF(2)x×
GF(2)x→GF(2)xFor hidden safe adder masked secure adder:
Wherein, x0,x1∈GF(2)xAnd
10. it is according to claim 6 based on whitepack encrypt safe operation system, it is characterised in that:The security terminal
For a back-end server, work station or for the main frame in security context.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611103026.4A CN106603224B (en) | 2016-12-05 | 2016-12-05 | Method for safe operation and system based on whitepack encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611103026.4A CN106603224B (en) | 2016-12-05 | 2016-12-05 | Method for safe operation and system based on whitepack encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106603224A true CN106603224A (en) | 2017-04-26 |
CN106603224B CN106603224B (en) | 2019-09-27 |
Family
ID=58594910
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611103026.4A Active CN106603224B (en) | 2016-12-05 | 2016-12-05 | Method for safe operation and system based on whitepack encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106603224B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108270550A (en) * | 2018-01-10 | 2018-07-10 | 成都卫士通信息产业股份有限公司 | A kind of safe and efficient whitepack implementation method and device based on SM4 algorithms |
CN109714154A (en) * | 2019-03-05 | 2019-05-03 | 同济大学 | Whitepack cryptographic algorithm under code cubage difficulty whitepack security model |
CN111431888A (en) * | 2020-03-19 | 2020-07-17 | 深圳市道旅旅游科技股份有限公司 | Method, device, equipment and storage medium for shielding key information |
CN115396103A (en) * | 2022-10-26 | 2022-11-25 | 杭州海康威视数字技术股份有限公司 | AI data sharing method, system and device based on white box key |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140294175A1 (en) * | 2013-03-27 | 2014-10-02 | International Business Machines Corporation | Validating a User's Identity Utilizing Information Embedded in a Image File |
CN104184588A (en) * | 2014-08-15 | 2014-12-03 | 同济大学 | Undetachable digital signature method based on identity |
CN105681025A (en) * | 2016-01-29 | 2016-06-15 | 中国科学院信息工程研究所 | Security white box realizing method and device for national cipher standard algorithm SM4 |
-
2016
- 2016-12-05 CN CN201611103026.4A patent/CN106603224B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140294175A1 (en) * | 2013-03-27 | 2014-10-02 | International Business Machines Corporation | Validating a User's Identity Utilizing Information Embedded in a Image File |
CN104184588A (en) * | 2014-08-15 | 2014-12-03 | 同济大学 | Undetachable digital signature method based on identity |
CN105681025A (en) * | 2016-01-29 | 2016-06-15 | 中国科学院信息工程研究所 | Security white box realizing method and device for national cipher standard algorithm SM4 |
Non-Patent Citations (4)
Title |
---|
SERGE VAUDENAY: "《On the Lai-Massey Scheme》", 《INTERNATIONAL CONFERENCE ON THE THEORY AND APPLICATION OF CRYTOLOGY AND INFORMATION SECURITY》 * |
YANG SHI,ET.AL: "《A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs》", 《IEEE》 * |
肖雅莹 等: "《白盒密码及SMS4算法的白盒实现》", 《中国密码学会2009年会》 * |
苏帅: "基于Android平台的软件保护研究与实现", 《中国优秀硕士学位论文全文数据库(电子期刊) 信息科技辑》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108270550A (en) * | 2018-01-10 | 2018-07-10 | 成都卫士通信息产业股份有限公司 | A kind of safe and efficient whitepack implementation method and device based on SM4 algorithms |
CN108270550B (en) * | 2018-01-10 | 2021-03-02 | 成都卫士通信息产业股份有限公司 | Safe and efficient white box implementation method and device based on SM4 algorithm |
CN109714154A (en) * | 2019-03-05 | 2019-05-03 | 同济大学 | Whitepack cryptographic algorithm under code cubage difficulty whitepack security model |
CN111431888A (en) * | 2020-03-19 | 2020-07-17 | 深圳市道旅旅游科技股份有限公司 | Method, device, equipment and storage medium for shielding key information |
CN115396103A (en) * | 2022-10-26 | 2022-11-25 | 杭州海康威视数字技术股份有限公司 | AI data sharing method, system and device based on white box key |
CN115396103B (en) * | 2022-10-26 | 2023-03-24 | 杭州海康威视数字技术股份有限公司 | AI data sharing method, system and device based on white box key |
Also Published As
Publication number | Publication date |
---|---|
CN106603224B (en) | 2019-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3154217B1 (en) | Scrambled tweak mode of block ciphers for differential power analysis resistant encryption | |
US8175265B2 (en) | Systems and methods for implementing block cipher algorithms on attacker-controlled systems | |
Zhang et al. | Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box | |
CN104917617B (en) | A kind of encryption group ranking obscures method | |
Wen et al. | Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture | |
Zhu et al. | Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system | |
Wang et al. | Cryptanalysis of an image cryptosystem based on logistic map | |
CN106603224A (en) | Safety operation method and system based on white box encryption | |
CN103501224A (en) | Asymmetric image encryption and decryption method based on quantum cell neural network system | |
EP3154215B1 (en) | Scrambled counter mode for differential power analysis resistant encryption | |
CN107257279A (en) | A kind of clear data encryption method and equipment | |
Wen | Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack | |
Mewada et al. | Exploration of efficient symmetric AES algorithm | |
CN103916248A (en) | Fully homomorphic encryption public key space compression method | |
Mishra et al. | A New algorithm of encryption and decryption of images using chaotic mapping | |
CN105162590A (en) | Parallel homomorphic data encryption method in cloud computation environment | |
Mousavi et al. | Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems) | |
Saddam et al. | A lightweight image encryption and blowfish decryption for the secure internet of things | |
Kahla et al. | Asymmetric image encryption based on twin message fusion | |
KR20110120837A (en) | A cryptosystem with a discretized chaotic map | |
Farajallah et al. | Efficient image encryption and authentication scheme based on chaotic sequences | |
Saha et al. | White-box cryptography based data encryption-decryption scheme for iot environment | |
CN108124076A (en) | Image encryption method based on isomery chaos and keccak hash functions | |
Prihandoko et al. | Implementation of super H-antimagic total graph on establishing stream cipher | |
Kumar et al. | Image encryption using simplified data encryption standard (S-DES) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |