Cargando…
AES Based White Box Cryptography in Digital Signature Verification
According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An adversary in such a setting is aware of the method and can an...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9740536/ https://www.ncbi.nlm.nih.gov/pubmed/36502144 http://dx.doi.org/10.3390/s22239444 |
_version_ | 1784848087506747392 |
---|---|
author | Shukla, Piyush Kumar Aljaedi, Amer Pareek, Piyush Kumar Alharbi, Adel R. Jamal, Sajjad Shaukat |
author_facet | Shukla, Piyush Kumar Aljaedi, Amer Pareek, Piyush Kumar Alharbi, Adel R. Jamal, Sajjad Shaukat |
author_sort | Shukla, Piyush Kumar |
collection | PubMed |
description | According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An adversary in such a setting is aware of the method and can analyze many system inputs and outputs, but is blind to the specifics of how a critical instantiation primitive is implemented. This is the focus of white-box solutions, which are designed to withstand attacks that come from the execution environment. This is significant because an attacker may obtain unrestricted access to the program’s execution in this environment. The purpose of this article is to assess the efficiency of white-box implementations in terms of security. Our contribution is twofold: first, we explore the practical implementations of white-box approaches, and second, we analyze the theoretical foundations upon which these implementations are built. First, a research proposal is crafted that details white-box applications of DES and AES encryption algorithms. To begin, this preparation is necessary. The research effort planned for this project also includes cryptanalysis of these techniques. Once the general cryptanalysis results have been examined, the white-box design approaches will be covered. We have decided to launch an investigation into creating a theoretical model for white box, since no prior formal definitions have been offered, and suggested implementations have not been accompanied by any assurance of security. This is due to the fact that no formal definition of “white box” has ever been provided. In this way lies the explanation for why this is the situation. We define WBC to encompass the security requirements of WBC specified over a white box cryptography technology and a security concept by studying formal models of obfuscation and shown security. This definition is the product of extensive investigation. This state-of-the-art theoretical model provides a setting in which to investigate the security of white-box implementations, leading to a wide range of positive and negative conclusions. As a result, this paper includes the results of a Digital Signature Algorithm (DSA) study which may be put to use in the real world with signature verification. Possible future applications of White Box Cryptography (WBC) research findings are discussed in light of these purposes and areas of investigation. |
format | Online Article Text |
id | pubmed-9740536 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-97405362022-12-11 AES Based White Box Cryptography in Digital Signature Verification Shukla, Piyush Kumar Aljaedi, Amer Pareek, Piyush Kumar Alharbi, Adel R. Jamal, Sajjad Shaukat Sensors (Basel) Article According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An adversary in such a setting is aware of the method and can analyze many system inputs and outputs, but is blind to the specifics of how a critical instantiation primitive is implemented. This is the focus of white-box solutions, which are designed to withstand attacks that come from the execution environment. This is significant because an attacker may obtain unrestricted access to the program’s execution in this environment. The purpose of this article is to assess the efficiency of white-box implementations in terms of security. Our contribution is twofold: first, we explore the practical implementations of white-box approaches, and second, we analyze the theoretical foundations upon which these implementations are built. First, a research proposal is crafted that details white-box applications of DES and AES encryption algorithms. To begin, this preparation is necessary. The research effort planned for this project also includes cryptanalysis of these techniques. Once the general cryptanalysis results have been examined, the white-box design approaches will be covered. We have decided to launch an investigation into creating a theoretical model for white box, since no prior formal definitions have been offered, and suggested implementations have not been accompanied by any assurance of security. This is due to the fact that no formal definition of “white box” has ever been provided. In this way lies the explanation for why this is the situation. We define WBC to encompass the security requirements of WBC specified over a white box cryptography technology and a security concept by studying formal models of obfuscation and shown security. This definition is the product of extensive investigation. This state-of-the-art theoretical model provides a setting in which to investigate the security of white-box implementations, leading to a wide range of positive and negative conclusions. As a result, this paper includes the results of a Digital Signature Algorithm (DSA) study which may be put to use in the real world with signature verification. Possible future applications of White Box Cryptography (WBC) research findings are discussed in light of these purposes and areas of investigation. MDPI 2022-12-02 /pmc/articles/PMC9740536/ /pubmed/36502144 http://dx.doi.org/10.3390/s22239444 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Shukla, Piyush Kumar Aljaedi, Amer Pareek, Piyush Kumar Alharbi, Adel R. Jamal, Sajjad Shaukat AES Based White Box Cryptography in Digital Signature Verification |
title | AES Based White Box Cryptography in Digital Signature Verification |
title_full | AES Based White Box Cryptography in Digital Signature Verification |
title_fullStr | AES Based White Box Cryptography in Digital Signature Verification |
title_full_unstemmed | AES Based White Box Cryptography in Digital Signature Verification |
title_short | AES Based White Box Cryptography in Digital Signature Verification |
title_sort | aes based white box cryptography in digital signature verification |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9740536/ https://www.ncbi.nlm.nih.gov/pubmed/36502144 http://dx.doi.org/10.3390/s22239444 |
work_keys_str_mv | AT shuklapiyushkumar aesbasedwhiteboxcryptographyindigitalsignatureverification AT aljaediamer aesbasedwhiteboxcryptographyindigitalsignatureverification AT pareekpiyushkumar aesbasedwhiteboxcryptographyindigitalsignatureverification AT alharbiadelr aesbasedwhiteboxcryptographyindigitalsignatureverification AT jamalsajjadshaukat aesbasedwhiteboxcryptographyindigitalsignatureverification |