Cargando…

AES Based White Box Cryptography in Digital Signature Verification

According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An adversary in such a setting is aware of the method and can an...

Descripción completa

Detalles Bibliográficos
Autores principales: Shukla, Piyush Kumar, Aljaedi, Amer, Pareek, Piyush Kumar, Alharbi, Adel R., Jamal, Sajjad Shaukat
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9740536/
https://www.ncbi.nlm.nih.gov/pubmed/36502144
http://dx.doi.org/10.3390/s22239444
_version_ 1784848087506747392
author Shukla, Piyush Kumar
Aljaedi, Amer
Pareek, Piyush Kumar
Alharbi, Adel R.
Jamal, Sajjad Shaukat
author_facet Shukla, Piyush Kumar
Aljaedi, Amer
Pareek, Piyush Kumar
Alharbi, Adel R.
Jamal, Sajjad Shaukat
author_sort Shukla, Piyush Kumar
collection PubMed
description According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An adversary in such a setting is aware of the method and can analyze many system inputs and outputs, but is blind to the specifics of how a critical instantiation primitive is implemented. This is the focus of white-box solutions, which are designed to withstand attacks that come from the execution environment. This is significant because an attacker may obtain unrestricted access to the program’s execution in this environment. The purpose of this article is to assess the efficiency of white-box implementations in terms of security. Our contribution is twofold: first, we explore the practical implementations of white-box approaches, and second, we analyze the theoretical foundations upon which these implementations are built. First, a research proposal is crafted that details white-box applications of DES and AES encryption algorithms. To begin, this preparation is necessary. The research effort planned for this project also includes cryptanalysis of these techniques. Once the general cryptanalysis results have been examined, the white-box design approaches will be covered. We have decided to launch an investigation into creating a theoretical model for white box, since no prior formal definitions have been offered, and suggested implementations have not been accompanied by any assurance of security. This is due to the fact that no formal definition of “white box” has ever been provided. In this way lies the explanation for why this is the situation. We define WBC to encompass the security requirements of WBC specified over a white box cryptography technology and a security concept by studying formal models of obfuscation and shown security. This definition is the product of extensive investigation. This state-of-the-art theoretical model provides a setting in which to investigate the security of white-box implementations, leading to a wide range of positive and negative conclusions. As a result, this paper includes the results of a Digital Signature Algorithm (DSA) study which may be put to use in the real world with signature verification. Possible future applications of White Box Cryptography (WBC) research findings are discussed in light of these purposes and areas of investigation.
format Online
Article
Text
id pubmed-9740536
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-97405362022-12-11 AES Based White Box Cryptography in Digital Signature Verification Shukla, Piyush Kumar Aljaedi, Amer Pareek, Piyush Kumar Alharbi, Adel R. Jamal, Sajjad Shaukat Sensors (Basel) Article According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An adversary in such a setting is aware of the method and can analyze many system inputs and outputs, but is blind to the specifics of how a critical instantiation primitive is implemented. This is the focus of white-box solutions, which are designed to withstand attacks that come from the execution environment. This is significant because an attacker may obtain unrestricted access to the program’s execution in this environment. The purpose of this article is to assess the efficiency of white-box implementations in terms of security. Our contribution is twofold: first, we explore the practical implementations of white-box approaches, and second, we analyze the theoretical foundations upon which these implementations are built. First, a research proposal is crafted that details white-box applications of DES and AES encryption algorithms. To begin, this preparation is necessary. The research effort planned for this project also includes cryptanalysis of these techniques. Once the general cryptanalysis results have been examined, the white-box design approaches will be covered. We have decided to launch an investigation into creating a theoretical model for white box, since no prior formal definitions have been offered, and suggested implementations have not been accompanied by any assurance of security. This is due to the fact that no formal definition of “white box” has ever been provided. In this way lies the explanation for why this is the situation. We define WBC to encompass the security requirements of WBC specified over a white box cryptography technology and a security concept by studying formal models of obfuscation and shown security. This definition is the product of extensive investigation. This state-of-the-art theoretical model provides a setting in which to investigate the security of white-box implementations, leading to a wide range of positive and negative conclusions. As a result, this paper includes the results of a Digital Signature Algorithm (DSA) study which may be put to use in the real world with signature verification. Possible future applications of White Box Cryptography (WBC) research findings are discussed in light of these purposes and areas of investigation. MDPI 2022-12-02 /pmc/articles/PMC9740536/ /pubmed/36502144 http://dx.doi.org/10.3390/s22239444 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Shukla, Piyush Kumar
Aljaedi, Amer
Pareek, Piyush Kumar
Alharbi, Adel R.
Jamal, Sajjad Shaukat
AES Based White Box Cryptography in Digital Signature Verification
title AES Based White Box Cryptography in Digital Signature Verification
title_full AES Based White Box Cryptography in Digital Signature Verification
title_fullStr AES Based White Box Cryptography in Digital Signature Verification
title_full_unstemmed AES Based White Box Cryptography in Digital Signature Verification
title_short AES Based White Box Cryptography in Digital Signature Verification
title_sort aes based white box cryptography in digital signature verification
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9740536/
https://www.ncbi.nlm.nih.gov/pubmed/36502144
http://dx.doi.org/10.3390/s22239444
work_keys_str_mv AT shuklapiyushkumar aesbasedwhiteboxcryptographyindigitalsignatureverification
AT aljaediamer aesbasedwhiteboxcryptographyindigitalsignatureverification
AT pareekpiyushkumar aesbasedwhiteboxcryptographyindigitalsignatureverification
AT alharbiadelr aesbasedwhiteboxcryptographyindigitalsignatureverification
AT jamalsajjadshaukat aesbasedwhiteboxcryptographyindigitalsignatureverification