White-Box Cryptography: Louie Carl R. Mandapat Larry Aumentado Mit, Uplb Internet Security
White-Box Cryptography: Louie Carl R. Mandapat Larry Aumentado Mit, Uplb Internet Security
OVERVIEW
1
Introduction The Need for WBC (White-box Cryptography) Black Box Cryptography White Box Cryptography Implementation Conclusion
7/28/12
INTRODUCTION
2
Traditionally, cryptography has offered a means of
communicating sensitive (secret, confidential or private) information while making it unintelligible to everyone except for the message recipient.
7/28/12
7/28/12
endpoints, PC and hardware protection tokens for example, are to be trusted. If those endpoints reside in a potentially hostile environment then the cryptographic keys may be directly visible to attackers monitoring the application execution while attempting to extract the keys either embedded or generated by the application from memory.
7/28/12
The notion of keeping valuable information such as licensing and other trade secrets hidden while operating in a fully transparent environment poses various challenges:
How to encrypt or decrypt content without directly revealing any portion of the key and or the data?
How
the Key (algorithm performing the encryption or decryption) or any internal workings, rather can only observe external information and behavior.
7/28/12
ciphertext (output) of the system while assuming zero visibility on code execution and dynamic encryption operations.
7/28/12
hackers have full visibility and control over the whole operation.
7/28/12
and internal algorithm details are completely visible and alterable at will.
7/28/12
IMPLEMENTATION
5
7/28/12
CONCLUSION
6
7/28/12
THANK YOU
7/28/12