Cargando…

White Box Implementations Using Non-Commutative Cryptography

In this paper, we present a method to create a safe arithmetic that can be used to obfuscate implementations that require operations over commutative groups. The method is based on the structure of the endomorphisms of certain extensions of the original commutative group. The endomorphisms of a comm...

Descripción completa

Detalles Bibliográficos
Autor principal: Marin, Leandro
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427245/
https://www.ncbi.nlm.nih.gov/pubmed/30841626
http://dx.doi.org/10.3390/s19051122
_version_ 1783405165092536320
author Marin, Leandro
author_facet Marin, Leandro
author_sort Marin, Leandro
collection PubMed
description In this paper, we present a method to create a safe arithmetic that can be used to obfuscate implementations that require operations over commutative groups. The method is based on the structure of the endomorphisms of certain extensions of the original commutative group. The endomorphisms of a commutative group are non-commutative (in general), thus we can use a non-commutative group to emulate the arithmetic of a commutative one. The techniques presented in this paper are very flexible and the programmer has a wide variety of options to obfuscate the algorithms. The system can be parameterized using conjugations, thus it is possible to generate a different arithmetic for each instance of the program with a change in the security parameters, even in cases in which this number is huge (for example, in IoT applications). The security of this method is based not only on the difficulty of the conjugacy search problem (in a harder version because only partial information about the groups is known by the attacker), but also in a number of extra options that can be chosen by the programmer. The paper explains the general method, analyzes its algebraic properties and provides detailed examples based on the vector spaces over [Formula: see text] and XOR operators.
format Online
Article
Text
id pubmed-6427245
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-64272452019-04-15 White Box Implementations Using Non-Commutative Cryptography Marin, Leandro Sensors (Basel) Article In this paper, we present a method to create a safe arithmetic that can be used to obfuscate implementations that require operations over commutative groups. The method is based on the structure of the endomorphisms of certain extensions of the original commutative group. The endomorphisms of a commutative group are non-commutative (in general), thus we can use a non-commutative group to emulate the arithmetic of a commutative one. The techniques presented in this paper are very flexible and the programmer has a wide variety of options to obfuscate the algorithms. The system can be parameterized using conjugations, thus it is possible to generate a different arithmetic for each instance of the program with a change in the security parameters, even in cases in which this number is huge (for example, in IoT applications). The security of this method is based not only on the difficulty of the conjugacy search problem (in a harder version because only partial information about the groups is known by the attacker), but also in a number of extra options that can be chosen by the programmer. The paper explains the general method, analyzes its algebraic properties and provides detailed examples based on the vector spaces over [Formula: see text] and XOR operators. MDPI 2019-03-05 /pmc/articles/PMC6427245/ /pubmed/30841626 http://dx.doi.org/10.3390/s19051122 Text en © 2019 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Marin, Leandro
White Box Implementations Using Non-Commutative Cryptography
title White Box Implementations Using Non-Commutative Cryptography
title_full White Box Implementations Using Non-Commutative Cryptography
title_fullStr White Box Implementations Using Non-Commutative Cryptography
title_full_unstemmed White Box Implementations Using Non-Commutative Cryptography
title_short White Box Implementations Using Non-Commutative Cryptography
title_sort white box implementations using non-commutative cryptography
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427245/
https://www.ncbi.nlm.nih.gov/pubmed/30841626
http://dx.doi.org/10.3390/s19051122
work_keys_str_mv AT marinleandro whiteboximplementationsusingnoncommutativecryptography