当前位置:网站首页>A brief understanding of white box encryption technology
A brief understanding of white box encryption technology
2022-07-01 19:31:00 【Infinitesimal pawn】
Monologue :
When I first came into contact with white box encryption technology last year , After reading some relevant documents , Do some sorting on the generated output . Completely understand from a little white's perspective , Maybe the understanding of white box encryption technology is not particularly good , But I hope it can help Xiaobai understand white box .
problem :
I read the document with three simple questions .
One 、 What is a white box ?
Two 、 What can a white box do ?
3、 ... and 、 What are the advantages of white box technology ?
Cryptographic concepts :
Cryptography , seeing the name of a thing one thinks of its function , Is trying to hide sensitive data through various methods , To prevent others from seeing this information . In real life, due to the influence of many factors and environmental conditions , The protection strength of the key is weakened . In a white box environment , Traditional password technology lacks enough protection , In the face of various attacks against its inherent defects, it can't completely deal with
Therefore, in order to deal with the attack in the white box environment , New encryption technologies have emerged —— White box encryption .
What is a white box :
White box cryptography assumes that the attacker has completely controlled the entire encryption process and is completely visible , In this case, deal with the serious threat . Hackers can observe the running process of dynamic passwords without restrictions ( Have the sample key ), And the details of the internal algorithm are completely visible , Be free to change .
Although the method of white box cryptography is completely transparent , But it combines passwords so that the key is not easy to extract . To make a long story short , White box encryption is an encryption technology that can resist white box attacks .
The key plaintext will be protected after being encrypted by white box , It will not appear directly in memory , So it will not be extracted .
Decryption functions can be performed inside distributed applications , But the key cannot be extracted , And decryption can not be reverse operation to encrypt . The attacker has no feasible way to create the correct encrypted data , Therefore, reverse decryption cannot be used to generate the desired key value .
When the information transmission channel is affected by hardware equipment ( For example, hardware protection token ) When protecting , White box encryption is quite effective . Because hackers cannot extract the key of the secure channel , So they can neither decrypt the data flowing through the transmission channel , It is also impossible to inject data into the transmission channel .
What can a white box do :
Cover many fields in life , vehicle 、 Finance 、 Communications, etc , In terms of technical implementation, each field involves the three-tier architecture of the Internet of things , Involving specific sensing devices 、 Move APP、 Cloud 、 Communication and security .
Advantages of white box encryption :
1、 White box cryptography provides a method of encryption in a completely transparent environment . Although it is completely transparent , Encryption and decryption programs protect sensitive data from disclosure .
Besides , Although I know that hackers may be observing the executed code , White box encryption technology can also realize strong encryption mechanism ( Combined with other technologies )
2、 White box cipher algorithm is a new cipher algorithm , The difference between it and the traditional cryptographic algorithm is that it can resist the attack in the white box attack environment . White box password enables key information to be fully hidden 、 To prevent prying , Therefore, it ensures the safe application of the original password system in the sensing device , Greatly improved security .
3、 Protect sensing devices 、 There are also corresponding hardware solutions to protect key security , But in this competitive landscape , Hardware solutions will inevitably increase the cost burden of manufacturers , It even leads to the neglect of safety problems because of the cost . White box password as a software solution , The corresponding hardware scheme naturally has the advantage of low cost .
4、 White box cryptography, as a software defined security, has entered the lower level of the basic chip security field . Compare hardware to provide security , White box cryptography is constantly breaking through and studying by using confusion technology and various mathematical theories , There is still much room for development in the future ; At the same time, new attacks against Internet of things devices emerge in endlessly , White box password as a software can be more flexible dynamic response , Other security measures can be integrated , Updating and upgrading are also more convenient and fast .
5、 White box password application does not need the participation of various providers , And it can be enjoyed exclusively by one application , Data and security can be better controlled by application developers , At present HCE Cloud payment adopts the white box protection scheme . White box encryption technology, whether from management or technology , Have built a more simplified 、 A more pure trusted relationship .
summary :
The overall security of a protected application is highly dependent on the application itself , in other words , When the encryption algorithm is not used in the environment it is designed , Strong encryption algorithm alone cannot provide any security —— Not in white White box encryption technology is used in box applications , It will make hackers reverse operate the protected software . Most common attacks attempt to exploit vulnerabilities in password security rather than weaknesses in encryption algorithms —— But recently, hackers have realized that classical cryptography is open PC Vulnerable characteristics in the environment .
without doubt , Special attention must be paid to software protection in the design and application stages , In addition, it should be continuously strengthened throughout the product life cycle and the new version released . In addition to white box cryptography , Additional supplementary safety measures should also be adopted to further strengthen the overall protection scheme .
边栏推荐
- 寶,運維100+服務器很頭疼怎麼辦?用行雲管家!
- Junit单元测试框架详解
- Nacos configuration file publishing failed, please check whether the parameters are correct solution
- Go语言高级
- Bao, what if the O & M 100+ server is a headache? Use Xingyun housekeeper!
- 精耕渠道共谋发展 福昕携手伟仕佳杰开展新产品培训大会
- 如何正确使用Vertx操作Redis(3.9.4带源码分析)
- 赋能「新型中国企业」,SAP Process Automation 落地中国
- 【To .NET】C#集合类源码解析
- What must be done in graduation season before going to Shanhai
猜你喜欢
Shell高级进阶
[pytorch record] automatic hybrid accuracy training torch cuda. amp
sql查询去重统计的方法总结
Native JS creates a calendar - supports mouse wheel scrolling to select months - and can be ported to any framework
Lake Shore - crx-em-hf low temperature probe station
M91 fast hall measuring instrument - better measurement in a shorter time
原生js打造日程表-支持鼠标滚轮滚动选择月份-可以移植到任何框架中
axure不显示元件库
论文阅读【Discriminative Latent Semantic Graph for Video Captioning】
Summary of SQL query de duplication statistics methods
随机推荐
[English grammar] Unit1 articles, nouns, pronouns and numerals
测试自学人必看:软件测试如何找测试项目?
[go ~ 0 to 1] day 5 July 1 type alias, custom type, interface, package and initialization function
【org.slf4j.Logger中info()方法】
赋能「新型中国企业」,SAP Process Automation 落地中国
Cdga | if you are engaged in the communication industry, you should get a data management certificate
Collation of open source protocols of open source frameworks commonly used in Web Development
Methods of finding various limits
Dlib+opencv library for fatigue detection
如何正确使用Vertx操作Redis(3.9.4带源码分析)
Case sharing: basic networking configuration of QinQ
【6.24-7.1】写作社区精彩技术博文回顾
Contos 7 搭建sftp之创建用户、用户组以及删除用户
任务:拒绝服务DoS
Helium transmission line of lake shore cryostat
学习笔记【gumbel softmax】
Intensive cultivation of channels for joint development Fuxin and Weishi Jiajie held a new product training conference
[pytorch record] distributed training dataparallel and distributeddataparallel of the model
简版拼多多商品数据
nacos配置文件发布失败,请检查参数是否正确的解决方案