Font Size: a A A

Digital Copyright Protection Technology On White-box Cryptography

Posted on:2017-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:L Y LiFull Text:PDF
GTID:2348330503472474Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Mobile terminal is now widely used, many cryptographic algorithms have been used in the terminal. But the terminal is not safe, no protection, may will be an attacker, and attackers can get into a lot of news, for example,memory inside the message, in this way,our program running is completely transparent to the attacker. Some traditional symmetric encryption algorithm is unable to deal with this kind of attack, so this time,the white box password appeared. So, the white box code is very important.White box cryptography it main operation mode is to hide the key, white box cryptography will not enter the key, because of white box cryptography is mainly used to find the form to replace the function of the function, key is hidden in their algorithm itself, in this way, the attacker can't get into the key, so as to achieve the purpose of our.White box encryption algorithm has just started, is not mature, the current application and the actual project should be the implementation of the Chow white box DES and AES white box, but the current security is not so high. So you need to improve security,so you can use the symmetric password as an asymmetric password. Even symmetric encryption and decryption algorithm to the public, the attacker can not from access to any information, thus, safety and rate of the symmetric key and asymmetric key functions together. If we can guarantee the security of the white box symmetric cipher,then I can use the white box cipher instead of the asymmetrical cipher. So based on safety,system of chow AES white box were external code, the flower instructions and based on cheat code- data confusion algorithm for the binary code confusion, increase the difficulty of the attackers.System is a digital copyright protection system. White-box AES through adding junk code and binary algorithm will find the main white-box cryptography module adds a junk code works digest signatures, and digital signature appears stacked when the lower-rightcorner works as a watermark, users buy digital watermarking works, with the help of a trusted third party Rights Center based NSSK completed under the agreement.
Keywords/Search Tags:AES white-box cryptography, Binary code obfuscation, Digital copyright protection, Digital watermarking, Digital signatures
PDF Full Text Request
Related items