CN108183796A - The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file - Google Patents

The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file Download PDF

Info

Publication number
CN108183796A
CN108183796A CN201711488521.6A CN201711488521A CN108183796A CN 108183796 A CN108183796 A CN 108183796A CN 201711488521 A CN201711488521 A CN 201711488521A CN 108183796 A CN108183796 A CN 108183796A
Authority
CN
China
Prior art keywords
whitepack
file
key
library file
parameter combination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711488521.6A
Other languages
Chinese (zh)
Inventor
阚志刚
陈彪
王全洲
卢佐华
方宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Bang Bang Safety Technology Co Ltd
Original Assignee
Beijing Bang Bang Safety Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Bang Bang Safety Technology Co Ltd filed Critical Beijing Bang Bang Safety Technology Co Ltd
Priority to CN201711488521.6A priority Critical patent/CN108183796A/en
Publication of CN108183796A publication Critical patent/CN108183796A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Abstract

This application involves terminal security protection technology field more particularly to a kind of method and device that encryption and decryption is carried out using whitepack library file and whitepack key file, to solve the problems, such as that key in the prior art is unsafe.The application mainly includes:By the first parameter combination carried in library file generation request, whitepack library file is obtained;By the second parameter combination carried in key file generation request, whitepack key file is obtained;Encryption and decryption processing is carried out according to the whitepack library file and the whitepack key file, through the above technical solutions, so that key updating is more convenient, moreover, in more new key, update whitepack library file is not needed to, therefore, dynamic whitepack encryption flow can be simplified, and promote the safety of key.And then promote safety of the user when ciphertext being decrypted and to being encrypted in plain text.

Description

The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file
Technical field
This application involves terminal security protection technology field more particularly to a kind of utilization whitepack library files and whitepack key text Part carries out the method and device of encryption and decryption.
Background technology
With the development of terminal technology, the application program installed in terminal is more and more.User is using these using journey Some data or user for being not intended to be stolen by attacker can be generated during sequence and are not intended to the execution of application program in itself Logic is inversely cracked by attacker.In order to protect the safety of the data generated in application program and its operational process, it is often necessary to These data are encrypted.
Traditional encryption technology is black box encryption technology, and black box encryption technology generally refers to, in black box (black-box) ring Under border, clear data is encrypted using Encryption Algorithm, obtains ciphertext data and the technology of key.Wherein, black box environment is Refer to, safe and reliable, the sightless running environment for attacker, in the present context, attacker can only obtain Encryption Algorithm Input or output, and key can not be obtained.
In recent years, intelligent terminal is largely popularized, since the running environment of intelligent terminal is that opposing open namely intelligence are whole The running environment at end is visible for attacker and (is commonly called as whitepack (white-box) environment), therefore black box encryption technology is not It is applicable in again, whitepack cryptographic technique is correspondingly suggested.Whitepack cryptographic technique refers to, the close of attack can be resisted under whitepack environment Code technology.Its core concept is that cryptographic algorithm is obscured so that attacker can not learn specific algorithm flow, and then Achieve the purpose that protect key information, prevent attacker from extracting key in whitepack environment, so as to ensure protected data Safety.
Existing whitepack encryption technology typically first selectes a key, and then the mapping in plain text to ciphertext is put Disorderly coding represents the result of coding with the mode of look-up table (also referred to as whitepack library file) so that attacker can not be from look-up table Middle analysis obtains key.Such as the whitepack aes algorithm that Chow et al. is designed.But existing whitepack aes algorithm has been cracked, So that the data under whitepack environment still have security threat.
Invention content
The embodiment of the present application provides a kind of method and dress that encryption and decryption is carried out using whitepack library file and whitepack key file It puts, to solve the problems, such as that key in the prior art is unsafe.
In order to solve the above-mentioned technical problem, the embodiment of the present application uses following technical proposals:
A kind of method for carrying out encryption and decryption using whitepack library file and whitepack key file, including:
Library file generation request is submitted to server, wherein, carry user's selection in the library file generation request First parameter combination;
Receive the whitepack library file that the server is fed back according to first parameter combination;
Key file generation request is submitted to server, wherein, carry user's choosing in the key file generation request The second parameter combination selected;
Receive the whitepack key file that the server is fed back according to second parameter combination;
Encryption and decryption processing is carried out according to the whitepack library file and the whitepack key file.
A kind of device that encryption and decryption is carried out using whitepack library file and whitepack key file, including:
Sending module, for submitting library file generation request to server, wherein, it is carried in the library file generation request There is the first parameter combination that user selects;
Receiving module, for receiving the whitepack library file that the server is fed back according to first parameter combination;
The sending module is additionally operable to submit key file generation request to server, wherein, the key file generation The second parameter combination of user's selection is carried in request;
The receiving module is additionally operable to receive the whitepack key text that the server is fed back according to second parameter combination Part;
Processing module, for carrying out encryption and decryption processing according to the whitepack library file and the whitepack key file.
Above-mentioned at least one technical solution that the embodiment of the present application uses can reach following advantageous effect:
Through the above technical solutions, so that key updating is more convenient, moreover, in more new key, it is white update is not needed to Therefore box library file, can simplify dynamic whitepack encryption flow, and promote the safety of key.And then user is promoted to close Text is decrypted and safety during to being encrypted in plain text.
Description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen Illustrative embodiments and their description please do not form the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 (a) is one of flow diagram of generation method of whitepack library file that the application provides;
Fig. 1 (b) is the two of the flow diagram of the generation method of whitepack library file that the application provides;
Fig. 2 is the flow diagram of the method for down loading of whitepack library file that the application provides;
Fig. 3 (a) is one of flow diagram of method for down loading of whitepack library file that the application provides;
Fig. 3 (b) is the two of the flow diagram of the method for down loading of whitepack library file that the application provides;
Fig. 4 (a) is one of flow diagram of generation method of whitepack key file that the application provides;
Fig. 4 (b) is the two of the flow diagram of the generation method of whitepack key file that the application provides;
Fig. 5 is the flow diagram of the method for down loading of whitepack key file that the application provides;
Fig. 6 (a) is one of flow diagram of method for down loading of whitepack key file that the application provides;
Fig. 6 (b) is the two of the flow diagram of the method for down loading of whitepack key file that the application provides;
Fig. 7 is that the method flow using whitepack library file and the carry out encryption and decryption of whitepack key file that the application provides shows It is intended to;
Fig. 8 (a) is the structure diagram of the generating means of whitepack library file that the application provides;
Fig. 8 (b) is the structure diagram of the download apparatus of whitepack library file that the application provides;
Fig. 8 (c) is the structure diagram of the generating means of whitepack key file that the application provides;
Fig. 8 (d) is the structure diagram of the download apparatus of whitepack key file that the application provides;
Fig. 8 (e) is the apparatus structure that encryption and decryption is carried out using whitepack library file and whitepack key file that the application provides Schematic diagram.
Specific embodiment
Purpose, technical scheme and advantage to make the application are clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Go out all other embodiments obtained under the premise of creative work, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical solution that each embodiment of the application provides is described in detail.
In this application, a kind of dynamic white-box techniques scheme is mainly described.So-called dynamic whitepack refers to whitepack library file It does not need to update again after generation, primary key carries out key conversion by specific whitepack key generation facility, and it is close to obtain whitepack Key;After the whitepack library file that whitepack key matches with corresponding document transmission, it is possible to plaintext be carried out by way of tabling look-up Ciphertext is decrypted in encryption.In the encryption and decryption scheme of the dynamic whitepack, whitepack key is safe, and attacker cannot Any information about primary key is obtained by analyzing whitepack key, thus, it is possible to strengthen the difficulty that cracks of primary key, is protected Hinder the safety of encryption and decryption operation.
Separately below by several scheme branches in dynamic white-box techniques, it is situated between comprehensively to entire dynamic white-box techniques It continues.
Wherein, entire dynamic white-box techniques include:The generation scheme of dynamic whitepack library file;Under dynamic whitepack library file Load scheme;The generation scheme of dynamic whitepack key file;The download scenarios of dynamic whitepack key file;And utilize whitepack library File and whitepack key file carry out the scheme of encryption and decryption.
With reference to shown in Fig. 1 (a), for the flow diagram of the generation method of whitepack library file that the application provides, need Bright, the executive agent of the generation scheme of the whitepack library file can be server, and server here can specially be used In the child servers for carrying out the whitepack system server of whitepack file process or being integrated in developer's server.It should Generation method mainly includes the following steps that:
Step 11:According to the first determining parameter combination, determine and the matched first generation code block of first parameter combination.
Optionally, in this application, step 11 determines and first parameter group according to the first determining parameter combination When closing matched first generation code block, with reference to shown in Fig. 1 (b), specific perform is:
Step 111:The first parameter combination is determined from the library file generation request received.
Specifically, in this application, library file generation request can be generated and be submitted by client.Wherein, library file is given birth to The first parameter combination is carried into request, is included at least in first parameter combination:Algorithm mark is applicable in platform identification and mesh These three types of mark function.
The algorithm mark refers to the combination of a kind of algorithm mark or many algorithms mark in Encryption Algorithm.At present The Encryption Algorithm of support includes:Advanced Encryption Standard (Advanced Encryption Standard, AES) algorithm, data add Close algorithm (Data Encryption Standard, DES, triple data encryption algorithm (Triple Data Encryption Standard, TDES and block cipher SM4.
The applicable platform identification refers to the terminal operating system that the dynamic white-box techniques are applicable in.The operation of support System includes at least:Android operation system or iOS operating systems, are also not limited to this in fact, can also support to be compatible with Android operation system and iOS operating systems.Wherein, Android operation system can support to generate static whitepack library file and Dynamic whitepack library file;IOS operating systems can be supported to generate static whitepack library file.
The objective function, it is for encrypting, decrypting or encryption and decryption to refer to whitepack library file to be generated.Goal Function can carry out single choice or multiselect when client opening is to user for user.
In fact, in this application, the first parameter combination can also wrap other than the parameter comprising above-mentioned three types Contain:Apparatus bound function;Can be specifically:It adds apparatus bound function or does not add apparatus bound function.It specifically can be The mark of client is added in first parameter combination.So as to so that the processing side of the dynamic white-box techniques can be directed to specific User carries out whitepack cipher key service.
Step 112:The corresponding first generation code block of code library to be matched according to first parameter combination selection.
The first parameter combination of its carrying is parsed from the library file generation request that client receives, then, according to First parameter combination chooses the code library to match from encryption library corresponding with Encryption Algorithm, wherein, the number of encryption library Match with Encryption Algorithm, can be 4 or 8 etc., the application is simultaneously not construed as limiting.It determines to correspond to according to the code library of selection First generation code block.Wherein, multiple first generation code blocks are included in each code library.
Step 12:The first generation code block is run, it is random to generate look-up table source file.
Specifically, in this application, look-up table source file can be the code collection for including look-up table.Wherein, the lookup Table source file can be generated according to default create-rule dynamic random, so as to ensure the library file initiated every time generation request institute The look-up table source file of generation is all different, so that it is all not to carry out the whitepack library file that key request is generated every time With, improve the safety of encryption and decryption.
Optionally, in this application, step 12, which specifically performs, is:Run the first generation code block, dynamic random generate to The fixed code of a few look-up table and corresponding each look-up table, wherein, the fixed code record has to described at least one Look-up table performs search rule during table lookup operation.The search rule is for indicate how look-up table and lookup mode.Its Real, look-up table is existing in a manner of mapping relations, the process tabled look-up be exactly input plaintext-output ciphertext or, input The process of ciphertext-output plaintext.
Step 13:The look-up table source file is compiled, obtains whitepack library file.
In this application, step 13 specifically includes:By at least one look-up table and the fixation of corresponding each look-up table Code is combined;The fixed code of at least one look-up table after combination and corresponding each look-up table is compiled It translates, obtains whitepack library file.
Look-up table in the whitepack library file is used to the plaintext subsequently inputted be encrypted or for subsequently inputting Ciphertext be decrypted.
Through the above technical solutions, using dynamic white-box techniques, according to what is carried in the library file generation request received First parameter combination determines corresponding first generation code block, and after first generation code block is run, and dynamic random generation is corresponding to search Table and corresponding fixed code after being compiled look-up table and corresponding fixed code, are obtained in dynamic white-box techniques Whitepack library file, in more new key, do not need to update whitepack library file, therefore, dynamic whitepack encryption flow can be simplified, And promote the safety of key.
In addition, in this application, it is contemplated that be compiled to look-up table source file, obtaining whitepack library file is, unlimited It is fixed that only look-up table and corresponding fixed code are compiled, different action types can also be directed to, addition is corresponding Code is encapsulated, for being docked with corresponding operating system.For example, for Android operation system, JNI generations can be added Code is used as interface encapsulation code, is compiled after the JNI code and look-up table and fixed code common combination, obtains whitepack library File, in order to which the whitepack library file is suitable for corresponding Android operation system.It for another example, can be with for iOS operating systems Other are added similar to code (code can be docked with the interface of iOS operating systems) as interface encapsulation code, it should It is compiled after interface encapsulation code and look-up table and fixed code common combination, obtains whitepack library file, in order to which this is white Box library file is suitable for corresponding iOS operating systems.This design can be in order to dock with whitepack canonical algorithm, and integrated level is high.
With reference to shown in Fig. 2, for the flow diagram of the method for down loading of whitepack library file that the application provides, the method for down loading It is mainly introduced with client and whitepack key server this system perspective, which mainly includes the following steps that:
Step 21:Client submits library file generation request to server.
Specifically, client receives the selection instruction of the selection operation triggering of user, determines the first parameter that user chooses Combination;Later, first parameter combination is added in library file generation request, and clothes is submitted into library file generation request Business device, submission here can be understood as sending.The first parameter combination is carried in library file generation request.First ginseng Array includes at least in closing:Algorithm mark is applicable in platform identification and objective function these three types.
By the agency of in the generation scheme of above-mentioned whitepack library file, details are not described herein again.
In fact, in this application, the first parameter combination can also wrap other than the parameter comprising above-mentioned three types Contain:Apparatus bound function;Can be specifically:It adds apparatus bound function or does not add apparatus bound function.It specifically can be The mark of client is added in first parameter combination.So as to so that the processing side of the dynamic white-box techniques can be directed to specific User carries out whitepack cipher key service.
Step 22:The server determines to ask matched first generation code block with library file generation;Run described One code block, it is random to generate look-up table source file;The look-up table source file is compiled, the whitepack library file of generation is sent out Give client.
Specifically, server generates request according to the library file received, parses the first parameter combination of its carrying, so Afterwards, according to first parameter combination, the code library to match is chosen from encryption library corresponding with Encryption Algorithm, according to selection Code library determines corresponding first generation code block.Look-up table source file can be the code collection for including look-up table.Wherein, the lookup Table source file can be generated according to default create-rule dynamic random, so as to ensure the library file initiated every time generation request institute The look-up table source file of generation is all different, so that it is all not to carry out the whitepack library file that key request is generated every time With, improve the safety of encryption and decryption.
The first generation code block is run, dynamic random generates the fixation generation of at least one look-up table and corresponding each look-up table Code, wherein, the fixed code record has search rule when table lookup operation is performed at least one look-up table.It is described to look into Rule is looked for for indicate how look-up table and lookup mode.In fact, look-up table is existing in a manner of mapping relations, is tabled look-up Process be exactly, input plaintext-output ciphertext or, input ciphertext-output plaintext process.
At least one look-up table is combined with the fixed code of corresponding each look-up table;Described in after combination The fixed code of at least one look-up table and corresponding each look-up table is compiled, and obtains whitepack library file.The whitepack library text Look-up table in part is used to the plaintext subsequently inputted be encrypted or for the ciphertext subsequently inputted to be decrypted.
Finally, obtained whitepack library file is sent to client.
Step 23:The client receives the whitepack library file of the server feedback, in order to subsequently according to described white Box library file and the key file received carry out encryption and decryption operation.
Client receives the whitepack library file of server feedback, and stores, in order to which client is according to the whitepack library file Plaintext input by user or ciphertext are handled.So far, the down operation of whitepack library file is completed.
In fact, in this application, there may be while multiple client initiates the situation that the generation of whitepack library file is asked, this When, the mark according to each client is needed, the generation operation of different whitepack library files is carried out respectively, later, sends respectively Give the corresponding client of client identification.
With reference to shown in Fig. 3 (a), for the flow diagram of the method for down loading of whitepack library file that the application provides, the download Method is mainly introduced with client-side, which mainly includes the following steps that:
Step 31:Library file generation request is submitted to server.
Step 32:The whitepack library file that server generates request feedback according to the library file is received, in order to follow-up root Encryption and decryption operation is carried out according to the whitepack library file and the key file received.
Optionally, with reference to shown in Fig. 3 (b), before library file generation request is submitted to server, the method is also wrapped It includes:
Step 33:Determine the parameter combination that user chooses, the parameter combination includes at least:Encryption algorithm identification is applicable in Platform identification, objective function.
Step 34:Generation carries the library file generation request of the parameter combination.
Optionally, step 32 specifically includes:The server is received according to the ginseng carried in library file generation request Array closes the whitepack library file of feedback.
Optionally, in this application, the whitepack library file determines in the following manner:According to determining parameter combination, It determines and the matched code block of the parameter combination;The code block is run, it is random to generate look-up table source file;To the lookup Table source file is compiled, and obtains whitepack library file.
With reference to shown in Fig. 4 (a), for the flow diagram of the generation method of whitepack key file that the application provides, the life It is mainly included the following steps that into method:
Step 41:According to the second determining parameter combination, determine and the matched second generation code block of second parameter combination.
Optionally, in this application, with reference to shown in Fig. 4 (b), step 41, which specifically performs, is:
Step 411:The second parameter combination is determined from the key file generation request received.
Key file generation request can be generated and be submitted by client.Wherein, it is carried in key file generation request Second parameter combination is included at least in second parameter combination:Algorithm mark, primary key and objective function these three types.
The algorithm mark refers to the combination of a kind of algorithm mark or many algorithms mark in Encryption Algorithm.At present The Encryption Algorithm of support includes:Advanced Encryption Standard (Advanced Encryption Standard, AES) algorithm, data add Close algorithm (Data Encryption Standard, DES), triple data encryption algorithm (Triple Data Encryption Standard, TDES) and block cipher SM4.
Shown primary key can be 16 system format strings, also be not limited to other systems.That is key format { a-f, A-F, 0-9 } can be included.Specifically:
Aes algorithm is selected, primary key can be that 32 or 48 or 64 bit length characters or array combine;
DES algorithms are selected, primary key can be that 16 bit length characters or array combine;
3DES algorithms are selected, primary key can be that 48 bit length characters or array combine;
SM4 algorithms are selected, primary key can be that 32 bit length characters or array combine.
In fact, in this application, the second parameter combination can also wrap other than the parameter comprising above-mentioned three types Contain:Apparatus bound function;Can be specifically:It adds apparatus bound function or does not add apparatus bound function.It specifically can be The mark of client is added in second parameter combination.So as to so that the processing side of the dynamic white-box techniques can be directed to specific User carries out whitepack cipher key service.
Step 412:The corresponding second generation code block of code library to be matched according to second parameter combination selection.
It should be noted that it in this application, before the generation for carrying out whitepack key file, further includes:Whitepack library text The generating process of part, above-mentioned by the agency of, this will not be repeated here.And in the generation scheme of whitepack key file, it needs to combine white Box library file generation as a result, particular content can be identical with the second parameter combination in the first parameter combination i.e. in the application.It removes Outside different parameters, for example, selecting aes algorithm in the first parameter, and the platform suitable for iOS operating systems is selected, and be Encryption and decryption operates, then, in the second parameter or aes algorithm, encryption and decryption operate;And do not have in wherein the first parameter combination Primary key, the second parameter combination can arbitrarily select to input.In addition, it is adapted in order to the whitepack library file with generation It uses, after whitepack library file is generated, library file mark selected during generation whitepack library file can also be sent To client, in client generation key file generation request, also the library file can be identified as the second parameter combination A part add.So, when client initiates key file request, library file mark is can be combined with, is chosen Suitable code library finds suitable second generation code block.
Step 42:The second generation code block is run, obtains whitepack key file.
Specifically, the second generation code block is substituted into using primary key as input, output obtains corresponding to the primary key Whitepack key file.Wherein, the whitepack key file can be understood as by whitepack treated whitepack key, this is white Box key generally exists with character string forms.
Through the above technical solutions, using dynamic white-box techniques, according to what is carried in the library file generation request received Second parameter combination determines corresponding second generation code block, and after second generation code block is run, obtains white in dynamic white-box techniques Box key file, the whitepack key is very small, probably there is a byte more than 200 so that key updating is more convenient, moreover, more During new key, update whitepack library file is not needed to, therefore, dynamic whitepack encryption flow can be simplified, and promote the safety of key Property.Moreover, it is strong that different encryptions can be configured according to the business demand and data-handling capacity of user in dynamic white-box techniques Degree so that cipher mode is more flexible.
With reference to shown in Fig. 5, for the flow diagram of the method for down loading of whitepack key file that the application provides, the generation side Method mainly includes the following steps that:
The method for down loading is mainly introduced with client and whitepack key server this system perspective, the method for down loading It mainly includes the following steps that:
Step 51:Client submits key file generation request to server.
Specifically, client receives the selection instruction of the selection operation triggering of user, determines the second parameter that user chooses Combination;Later, second parameter combination is added in key file generation request, and key file is generated into request and is submitted To server, submission here can be understood as sending.The second parameter combination is carried in key file generation request.It should It is included at least in second parameter combination:Algorithm mark, primary key and objective function these three types.
By the agency of in the generation scheme of above-mentioned whitepack key file, details are not described herein again.
In fact, in this application, the second parameter combination can also wrap other than the parameter comprising above-mentioned three types Contain:Apparatus bound function;Can be specifically:It adds apparatus bound function or does not add apparatus bound function.It specifically can be The mark of client is added in second parameter combination.So as to so that the processing side of the dynamic white-box techniques can be directed to specific User carries out whitepack cipher key service.
Step 52:The server determines to ask matched second generation code block with key file generation;Described in operation Second generation code block obtains whitepack key file, and sends whitepack key file to client.
Specifically, server generates request according to the key file received, parses the second parameter combination of its carrying, Then, according to second parameter combination, the library text with being carried in the second parameter combination is chosen from library corresponding with Encryption Algorithm The code library that the mark of part matches determines corresponding second generation code block according to the code library of selection.
The second generation code block is substituted into using primary key as input, the whitepack that output obtains corresponding to the primary key is close Key file.Wherein, the whitepack key file can be understood as by whitepack treated whitepack key, whitepack key one As exist with character string forms.
Finally, obtained whitepack key file is sent to client.
Step 53:The client receives the whitepack key file of the server feedback, in order to follow-up according to Whitepack key file and the whitepack library file received carry out encryption and decryption operation.
Client receives the whitepack key file of server feedback, and stores, in order to client combination whitepack library file Plaintext input by user or ciphertext are handled.So far, the down operation of whitepack library file is completed.
In fact, in this application, there may be while multiple client initiates the situation that the generation of whitepack library file is asked, this When, the mark according to each client is needed, the generation operation of different whitepack library files is carried out respectively, later, sends respectively Give the corresponding client of client identification.
With reference to shown in Fig. 6 (a), for the flow diagram of the method for down loading of whitepack key file that the application provides, under this Support method is mainly introduced with client-side, which mainly includes the following steps that:
Step 61:Key file generation request is submitted to server.
Step 62:The whitepack key file that the server generates request feedback according to the key file is received, so as to In subsequently according to the whitepack key file and the whitepack library file received progress encryption and decryption operation.
Optionally, with reference to shown in Fig. 6 (b), before key file generation request is submitted to server, the method is also wrapped It includes:
Step 63 determines the second parameter combination that user chooses, and second parameter combination includes at least:Encryption Algorithm mark Know, be applicable in platform identification, objective function.
Step 64:Generation carries the key file generation request of second parameter combination.
Optionally, step 62 specifically includes:Receive what is carried during the server is asked according to key file generation The whitepack key file of second parameter combination feedback.
Optionally, in this application, the whitepack key file determines in the following manner:
According to the second determining parameter combination, determine and the matched second generation code block of second parameter combination;
The second generation code block is run, obtains whitepack key file.
Through the above technical solutions, using dynamic white-box techniques, according to what is carried in the library file generation request received Second parameter combination determines corresponding second generation code block, and after second generation code block is run, obtains white in dynamic white-box techniques Box key file, the whitepack key is very small, probably there is a byte more than 200 so that key updating is more convenient, moreover, more During new key, update whitepack library file is not needed to, therefore, dynamic whitepack encryption flow can be simplified, and promote the safety of key Property.Moreover, it is strong that different encryptions can be configured according to the business demand and data-handling capacity of user in dynamic white-box techniques Degree so that cipher mode is more flexible.Moreover, being also convenient for client by this way flexibly downloads required whitepack key text Part.
With reference to shown in Fig. 7, the carry out encryption and decryption of whitepack library file and whitepack key file is utilized for what the application provided Method flow schematic diagram, this method mainly include the following steps that:
Step 71:Library file generation request is submitted to server, wherein, carry user in the library file generation request First parameter combination of selection.
Step 72:Receive the whitepack library file that the server is fed back according to first parameter combination.
The step 71 can refer to the generation scheme of whitepack library file with step 72, and this will not be repeated here.
Step 73:Key file generation request is submitted to server, wherein, it is carried in the key file generation request Second parameter combination of user's selection.
Step 74:Receive the whitepack key file that the server is fed back according to second parameter combination.
The step 73 can refer to the generation scheme of whitepack key file with step 74, and this will not be repeated here.
It should be noted that in this application, under normal circumstances, it should the generation scheme of whitepack library file is first carried out, Perform the generation scheme of whitepack key file;If in the case where not changing dynamic whitepack scheme, also it is not excluded for comprising first carrying out The generation scheme of whitepack key file, then perform the sequence of the generation scheme of whitepack library file.In addition, the life of whitepack key file Into between scheme and the generation scheme of whitepack library file, there are the mark of library file, this is associated with, therefore, whitepack key file Generation can be the generation based on whitepack library file.
Step 75:Encryption and decryption processing is carried out according to the whitepack library file and the whitepack key file.
Optionally, in this application, step 75, which specifically performs, is:
Plaintext input by user is encrypted according to the whitepack library file and the whitepack key file or Person,
Ciphertext input by user is decrypted according to the whitepack library file and the whitepack key file.
Optionally, step 75 according to the whitepack library file and the whitepack key file to plaintext input by user into During row encryption, it can specifically perform and be:
1a is walked, and according to the whitepack key file, determines whitepack key corresponding with primary key;
2a is walked, and according to the whitepack library file, is carried out whitepack to the whitepack key and plaintext input by user and is added Close processing obtains the corresponding ciphertext of the plaintext.
For example, for the algorithm A and key K of former Encryption Algorithm (such as aes algorithm), encrypted under the black box environment of safety To a and k so that in the white-box attack context, the encrypted result of encrypted cryptographic system E (a, k, X) is constantly equal to encryption system E The encrypted result of (A, K, X).In this way, the cryptographic key protection that can be realized under unsafe white-box attack context be converted to it is safe Cryptographic key protection under black box environment, so as to effective protection primary key safety.
Alternatively,
Step 75 is decrypted ciphertext input by user according to the whitepack library file and the whitepack key file During processing, it can specifically perform and be:
1b is walked, and according to the whitepack key file, determines whitepack key corresponding with primary key;
2b is walked, and according to the whitepack library file, whitepack solution is carried out to the whitepack key and ciphertext input by user Close processing obtains the corresponding plaintext of the ciphertext.
Optionally, in this application, the whitepack library file determines in the following manner:According to the first parameter received Combination determines and the matched first generation code block of first parameter combination;The first generation code block is run, generates look-up table at random Source file;The look-up table source file part is compiled, obtains whitepack library file.
Optionally, in this application, the whitepack key file determines in the following manner:According to the second ginseng received Array is closed, and is determined and the matched second generation code block of second parameter combination;The second generation code block is run, obtains whitepack key File.
With reference to shown in Fig. 8 (a), for the structure diagram of the generating means of whitepack library file that the application provides, the device Mainly include following functions module:
Determining module 81a, for according to the first determining parameter combination, determining and the first parameter combination matched generation Code block.
Generation module 82a, it is random to generate look-up table source file for running the first generation code block.
Collector 83a for being compiled to the look-up table source file, obtains whitepack library file.
The determining module, specifically for determining the first parameter combination from the library file generation request received;According to The corresponding first generation code block of code library that the parameter combination selection matches.
Optionally, the generation module 82a, specifically for running the first generation code block, dynamic random generation at least one The fixed code of a look-up table and corresponding each look-up table, wherein, the fixed code record has at least one lookup Table performs search rule during table lookup operation.
Optionally, the collector 83a, specifically for by least one look-up table and corresponding each look-up table Fixed code is combined;The fixed code of at least one look-up table after combination and corresponding each look-up table is carried out Compiling, obtains whitepack library file.
With reference to shown in Fig. 8 (b), for the structure diagram of the download apparatus of whitepack library file that the application provides, the device Mainly include following functions module:
Sending module 81b, for submitting library file generation request to server;
Receiving module 82b generates the whitepack library file of request feedback for receiving the server according to the library file, In order to subsequently carry out encryption and decryption operation according to the whitepack library file and the key file received.
Optionally, referring now still to Fig. 8 (b) Suo Shi, described device further includes:
Determining module 83b, for before library file generation request is submitted to server, determining the parameter group that user chooses It closes;Generation carries the library file generation request of the parameter combination;Wherein, the parameter combination includes at least:Encryption Algorithm Mark is applicable in platform identification, objective function.
Optionally, the receiving module 82b, specifically for receiving the server according in library file generation request The whitepack library file of the parameter combination feedback of carrying.
In fact, in this application, the download apparatus of whitepack library file can be considered as the system for downloading whitepack library file, packet It includes:Client and server;
The client receives the whitepack library of the server feedback for submitting library file generation request to server File, in order to subsequently carry out encryption and decryption operation according to the whitepack library file and the key file received;
The server asks matched code block for determining to generate with the library file;The code block is run, with Machine generates look-up table source file;The look-up table source file is compiled, the whitepack library file of generation is sent to client.
With reference to shown in Fig. 8 (c), for the structure diagram of the generating means of whitepack key file that the application provides, the dress It puts and mainly includes following functions module:
Determining module 81c, for according to the second determining parameter combination, determining and second parameter combination matched the Two code blocks.
Processing module 82c for running the second generation code block, obtains whitepack key file, wherein, second parameter Combination includes at least:Encryption algorithm identification, primary key, objective function.
Optionally, the determining module 81c, is specifically used for:
The second parameter combination is determined from the key file generation request received;
The corresponding second generation code block of code library to be matched according to second parameter combination selection.
Optionally, it is further included in second parameter combination:Generate the mark of library file selected during whitepack library file;
The determining module 81c is in the corresponding second code of code library to be matched according to second parameter combination selection During block, it is specifically used for:
The mark of library file in second parameter combination, chooses the code library to match;
It is second generation code block to determine the code block in the code library to match.
The processing module 82c, specifically for substituting into the second generation code block using primary key as input, output obtains The whitepack key file of the corresponding primary key.
With reference to shown in Fig. 8 (d), for the structure diagram of the download apparatus of whitepack key file that the application provides, the dress It puts and mainly includes following functions module:
Sending module 81d, for submitting key file generation request to server;
Receiving module 82d generates the whitepack key of request feedback for receiving the server according to the key file File, in order to subsequently carry out encryption and decryption operation according to the whitepack key file and the whitepack library file received.
Optionally, referring now still to Fig. 8 (d) Suo Shi, described device further includes:
Determining module 83d, for before key file generation request is submitted to server, determining user chooses second Parameter combination, generation carry the key file generation request of second parameter combination;Second parameter combination is at least wrapped It includes:Encryption algorithm identification is applicable in platform identification, objective function.
Optionally, the receiving module 82d generates request specifically for receiving the server according to the key file The whitepack key file of the second parameter combination feedback of middle carrying.
In fact, in this application, the download apparatus of whitepack key file can be considered as the system for downloading whitepack key file, Including:Client and server;
The client, for submitting key file generation request to server and receiving the server feedback Whitepack key file, in order to subsequently carry out encryption and decryption behaviour according to the whitepack key file and the whitepack library file received Make;
The server, for determining to ask matched second generation code block with key file generation;Run described Two code blocks obtain whitepack key file, send the whitepack key file to the client.
With reference to shown in Fig. 8 (e), encryption and decryption is carried out using whitepack library file and whitepack key file for what the application provided Apparatus structure schematic diagram, the device mainly include following functions module:
Sending module 81e, for submitting library file generation request to server, wherein, in the library file generation request Carry the first parameter combination of user's selection;
Receiving module 82e, for receiving the whitepack library file that the server is fed back according to first parameter combination;
The sending module 81e is additionally operable to submit key file generation request to server, wherein, the key file The second parameter combination of user's selection is carried in generation request;
The receiving module 82e is additionally operable to receive the server close according to the whitepack that second parameter combination is fed back Key file;
Processing module 83e, for carrying out encryption and decryption processing according to the whitepack library file and the whitepack key file.
Optionally, the processing module 83e, is specifically used for:
Plaintext input by user is encrypted according to the whitepack library file and the whitepack key file or Person,
Ciphertext input by user is decrypted according to the whitepack library file and the whitepack key file.
Optionally, the processing module 83e is defeated to user according to the whitepack library file and the whitepack key file When the plaintext entered is encrypted, it is specifically used for:According to the whitepack key file, whitepack corresponding with primary key is determined Key;According to the whitepack library file, whitepack encryption is carried out to the whitepack key and plaintext input by user, is obtained The corresponding ciphertext of the plaintext.
Optionally, the processing module 83e is defeated to user according to the whitepack library file and the whitepack key file When the ciphertext entered is decrypted, it is specifically used for:According to the whitepack key file, whitepack corresponding with primary key is determined Key;According to the whitepack library file, whitepack decryption processing is carried out to the whitepack key and ciphertext input by user, is obtained The corresponding plaintext of the ciphertext.
The embodiment of the present invention also provides a kind of mobile terminal, and including processor, memory, storage is on a memory and can be The computer program run on the processor, the computer program are realized when being executed by processor under above-mentioned whitepack library file Support method and/or, the method for down loading of whitepack key file and/or, added using whitepack library file and whitepack key file Each process of the embodiment of decryption method, and identical technique effect can be reached, it is repeated to avoid, which is not described herein again.
The embodiment of the present invention also provides a kind of server apparatus, and including processor, memory, storage is on a memory and can The computer program run on the processor, the computer program realize above-mentioned whitepack library file when being executed by processor Generation method and/or, each process of the embodiment of the generation method of whitepack key file, and identical technology effect can be reached Fruit repeats to avoid, and which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realized when being executed by processor above-mentioned whitepack library file method for down loading and/or, whitepack is close The method for down loading of key file and/or, the generation method of whitepack library file and/or, the generation method of whitepack key file and/ Or, each process of encipher-decipher method embodiment of the method is carried out using whitepack library file and whitepack key file, and phase can be reached Same technique effect, repeats, which is not described herein again to avoid.Wherein, the computer readable storage medium, such as read-only storage Device (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic Dish or CD etc..
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware can be used in the present invention Apply the form of example.Moreover, the computer for wherein including computer usable program code in one or more can be used in the present invention The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices is generated for real The device of function specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps are performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, CD-ROM read-only memory (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, available for storing the information that can be accessed by a computing device.It defines, calculates according to herein Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of elements are not only including those elements, but also wrap Include other elements that are not explicitly listed or further include for this process, method, commodity or equipment it is intrinsic will Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described Also there are other identical elements in the process of element, method, commodity or equipment.
The foregoing is merely embodiments herein, are not limited to the application.For those skilled in the art For, the application can have various modifications and variations.All any modifications made within spirit herein and principle are equal Replace, improve etc., it should be included within the scope of claims hereof.

Claims (12)

  1. A kind of 1. method for carrying out encryption and decryption using whitepack library file and whitepack key file, which is characterized in that including:
    Library file generation request is submitted to server, wherein, carry the first of user's selection in the library file generation request Parameter combination;
    Receive the whitepack library file that the server is fed back according to first parameter combination;
    Key file generation request is submitted to server, wherein, carry user's selection in the key file generation request Second parameter combination;
    Receive the whitepack key file that the server is fed back according to second parameter combination;
    Encryption and decryption processing is carried out according to the whitepack library file and the whitepack key file.
  2. 2. the method as described in claim 1, which is characterized in that according to the whitepack library file and the whitepack key file into The processing of row encryption and decryption, specifically includes:
    Plaintext input by user is encrypted according to the whitepack library file and the whitepack key file, alternatively,
    Ciphertext input by user is decrypted according to the whitepack library file and the whitepack key file.
  3. 3. method as claimed in claim 2, which is characterized in that according to the whitepack library file and the whitepack key file pair Plaintext input by user is encrypted, and specifically includes:
    According to the whitepack key file, whitepack key corresponding with primary key is determined;
    According to the whitepack library file, whitepack encryption is carried out to the whitepack key and plaintext input by user, is obtained The corresponding ciphertext of the plaintext.
  4. 4. method as claimed in claim 2, which is characterized in that according to the whitepack library file and the whitepack key file pair Ciphertext input by user is decrypted, and specifically includes:
    According to the whitepack key file, whitepack key corresponding with primary key is determined;
    According to the whitepack library file, whitepack decryption processing is carried out to the whitepack key and ciphertext input by user, is obtained The corresponding plaintext of the ciphertext.
  5. 5. such as claim 1-4 any one of them methods, which is characterized in that the whitepack library file is true in the following manner It is fixed:
    According to the first parameter combination received, determine and the matched first generation code block of first parameter combination;
    The first generation code block is run, it is random to generate look-up table source file;
    The look-up table source file part is compiled, obtains whitepack library file.
  6. 6. such as claim 1-4 any one of them methods, which is characterized in that the whitepack key file is true in the following manner It is fixed:
    According to the second parameter combination received, determine and the matched second generation code block of second parameter combination;
    The second generation code block is run, obtains whitepack key file.
  7. 7. a kind of device that encryption and decryption is carried out using whitepack library file and whitepack key file, which is characterized in that including:
    Sending module, for submitting library file generation request to server, wherein, it is carried in the library file generation request useful First parameter combination of family selection;
    Receiving module, for receiving the whitepack library file that the server is fed back according to first parameter combination;
    The sending module is additionally operable to submit key file generation request to server, wherein, the key file generation request In carry user selection the second parameter combination;
    The receiving module is additionally operable to receive the whitepack key file that the server is fed back according to second parameter combination;
    Processing module, for carrying out encryption and decryption processing according to the whitepack library file and the whitepack key file.
  8. 8. device as claimed in claim 7, which is characterized in that the processing module is specifically used for:
    Plaintext input by user is encrypted according to the whitepack library file and the whitepack key file, alternatively,
    Ciphertext input by user is decrypted according to the whitepack library file and the whitepack key file.
  9. 9. device as claimed in claim 8, which is characterized in that the processing module is according to the whitepack library file and described When plaintext input by user is encrypted in whitepack key file, it is specifically used for:
    According to the whitepack key file, whitepack key corresponding with primary key is determined;
    According to the whitepack library file, whitepack encryption is carried out to the whitepack key and plaintext input by user, is obtained The corresponding ciphertext of the plaintext.
  10. 10. device as claimed in claim 8, which is characterized in that the processing module is according to the whitepack library file and institute When stating whitepack key file ciphertext input by user being decrypted, it is specifically used for:
    According to the whitepack key file, whitepack key corresponding with primary key is determined;
    According to the whitepack library file, whitepack decryption processing is carried out to the whitepack key and ciphertext input by user, is obtained The corresponding plaintext of the ciphertext.
  11. 11. a kind of device that encryption and decryption is carried out using whitepack library file and whitepack key file, which is characterized in that including:Storage Device, processor and the computer program that can be run on the memory and on the processor is stored in, the computer journey It is realized when sequence is performed by the processor such as the step of method according to any one of claims 1 to 6.
  12. 12. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program is realized when the computer program is executed by processor such as the step of method according to any one of claims 1 to 6.
CN201711488521.6A 2017-12-29 2017-12-29 The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file Pending CN108183796A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711488521.6A CN108183796A (en) 2017-12-29 2017-12-29 The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711488521.6A CN108183796A (en) 2017-12-29 2017-12-29 The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file

Publications (1)

Publication Number Publication Date
CN108183796A true CN108183796A (en) 2018-06-19

Family

ID=62549499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711488521.6A Pending CN108183796A (en) 2017-12-29 2017-12-29 The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file

Country Status (1)

Country Link
CN (1) CN108183796A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714154A (en) * 2019-03-05 2019-05-03 同济大学 Whitepack cryptographic algorithm under code cubage difficulty whitepack security model
CN110149311A (en) * 2019-04-09 2019-08-20 北京奇艺世纪科技有限公司 Data processing method, device, server and readable storage medium storing program for executing
CN111191195A (en) * 2019-12-10 2020-05-22 航天信息股份有限公司 Method and device for protecting APK
CN111901109A (en) * 2020-08-04 2020-11-06 华人运通(上海)云计算科技有限公司 White-box-based communication method, device, equipment and storage medium
CN112115496A (en) * 2020-09-27 2020-12-22 万兴科技集团股份有限公司 Data decryption mode identification method and device, computer equipment and storage medium
CN112887263A (en) * 2020-12-29 2021-06-01 美的集团股份有限公司 Data transmission method in equipment, method and device for realizing data transmission in equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7769165B2 (en) * 2005-10-14 2010-08-03 Microsoft Corporation Semi-public white-box cipher
CN102047220A (en) * 2008-05-23 2011-05-04 爱迪德加拿大公司 System and method for generating white-box implementations of software applications
CN106411518A (en) * 2016-09-26 2017-02-15 北京洋浦伟业科技发展有限公司 Symmetric white box encryption method with unfixed key and apparatus
CN106612177A (en) * 2015-10-23 2017-05-03 三星Sds株式会社 Encrytion apparatus and method
CN106850603A (en) * 2017-01-19 2017-06-13 北京洋浦伟业科技发展有限公司 A kind of whitepack password Bidirectional identity authentication method, terminal, service end and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7769165B2 (en) * 2005-10-14 2010-08-03 Microsoft Corporation Semi-public white-box cipher
CN102047220A (en) * 2008-05-23 2011-05-04 爱迪德加拿大公司 System and method for generating white-box implementations of software applications
CN106612177A (en) * 2015-10-23 2017-05-03 三星Sds株式会社 Encrytion apparatus and method
CN106411518A (en) * 2016-09-26 2017-02-15 北京洋浦伟业科技发展有限公司 Symmetric white box encryption method with unfixed key and apparatus
CN106850603A (en) * 2017-01-19 2017-06-13 北京洋浦伟业科技发展有限公司 A kind of whitepack password Bidirectional identity authentication method, terminal, service end and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714154A (en) * 2019-03-05 2019-05-03 同济大学 Whitepack cryptographic algorithm under code cubage difficulty whitepack security model
CN109714154B (en) * 2019-03-05 2021-10-29 同济大学 Implementation method of white-box cryptographic algorithm under white-box security model with difficult code volume
CN110149311A (en) * 2019-04-09 2019-08-20 北京奇艺世纪科技有限公司 Data processing method, device, server and readable storage medium storing program for executing
CN110149311B (en) * 2019-04-09 2021-05-25 北京奇艺世纪科技有限公司 Data processing method, device, server and readable storage medium
CN111191195A (en) * 2019-12-10 2020-05-22 航天信息股份有限公司 Method and device for protecting APK
CN111901109A (en) * 2020-08-04 2020-11-06 华人运通(上海)云计算科技有限公司 White-box-based communication method, device, equipment and storage medium
CN112115496A (en) * 2020-09-27 2020-12-22 万兴科技集团股份有限公司 Data decryption mode identification method and device, computer equipment and storage medium
CN112115496B (en) * 2020-09-27 2024-04-12 万兴科技集团股份有限公司 Data decryption pattern recognition method and device, computer equipment and storage medium
CN112887263A (en) * 2020-12-29 2021-06-01 美的集团股份有限公司 Data transmission method in equipment, method and device for realizing data transmission in equipment

Similar Documents

Publication Publication Date Title
CN108183796A (en) The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file
CN107947917A (en) A kind of method and device for generating whitepack key
CN108134673A (en) A kind of method and device for generating whitepack library file
EP3044901B1 (en) Keying infrastructure
CN108111622A (en) A kind of method, apparatus and system for downloading whitepack library file
CN110826031B (en) Encryption method, device, computer equipment and storage medium
US20090290708A1 (en) Generating and Securing Archive Keys
US7970133B2 (en) System and method for secure and flexible key schedule generation
CN103617401A (en) Method and device for protecting data files
CN110276610B (en) Method and device for realizing dynamic encryption based on transaction offset
US11270227B2 (en) Method for managing a machine learning model
CN113010856A (en) Dynamic asymmetric encryption and decryption JavaScript code obfuscation method and system
CN110855430A (en) Providing a secure object store using a hierarchical key system
CN108416224B (en) A kind of data encryption/decryption method and device
CN108898008A (en) The operation method and device of application program
CN110263547B (en) Method and device for realizing dynamic encryption based on contract state modification sequence
CN107220528A (en) The protection of java applet and operation method, device and terminal
CN105847011A (en) Key loading method and device
US10572635B2 (en) Automatic correction of cryptographic application program interfaces
CN104182691B (en) data encryption method and device
CN116455572B (en) Data encryption method, device and equipment
CN107968793A (en) A kind of method, apparatus and system for downloading whitepack key
CN110611568B (en) Dynamic encryption and decryption method, device and equipment based on multiple encryption and decryption algorithms
CN115510402A (en) License control method and system based on encryption and code confusion
CN110032832B (en) Web application processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180619

RJ01 Rejection of invention patent application after publication