White-Box cryptography based data encryption-decryption scheme for IoT environment

被引:0
作者
Saha, Arunima [1 ]
Srinivasan, Chungath [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, TIFAC CORE Cyber Secur, Coimbatore, Tamil Nadu, India
来源
2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS) | 2019年
关键词
Internet of Things; Block cipher; Encryption; White-Box cryptography; CBC mode;
D O I
10.1109/icaccs.2019.8728331
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The economic progress of the Internet of Things (IoT) is phenomenal. Applications range from checking the alignment of some components during a manufacturing process, monitoring of transportation and pedestrian levels to enhance driving and walking path, remotely observing terminally ill patients by means of medical devices such as implanted devices and infusion pumps, and so on. To provide security, encrypting the data becomes an indispensable requirement, and symmetric encryptions algorithms are becoming a crucial implementation in the resource constrained environments. Typical symmetric encryption algorithms like Advanced Encryption Standard (AES) showcases an assumption that end points of communications are secured and that the encryption key being securely stored. However, devices might be physically unprotected, and attackers may have access to the memory while the data is still encrypted. It is essential to reserve the key in such a way that an attacker finds it hard to extract it. At present, techniques like White-Box cryptography has been utilized in these circumstances. But it has been reported that applying White-Box cryptography in IoT devices have resulted in other security issues like the adversary having access to the intermediate values, and the practical implementations leading to Code lifting attacks and differential attacks. In this paper, a solution is presented to overcome these problems by demonstrating the need of White-Box Cryptography to enhance the security by utilizing the cipher block chaining (CBC) mode.
引用
收藏
页码:637 / 641
页数:5
相关论文
共 8 条
  • [1] Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
  • [2] Lest We Remember: Cold-Boot Attacks on Encryption Keys
    Halderman, J. Alex
    Schoen, Seth D.
    Heninger, Nadia
    Clarkson, William
    Paul, William
    Calandrino, Joseph A.
    Feldman, Ariel J.
    Appelbaum, Jacob
    Felten, Edward W.
    [J]. COMMUNICATIONS OF THE ACM, 2009, 52 (05) : 91 - 98
  • [3] Hui Suo, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P648, DOI 10.1109/ICCSEE.2012.373
  • [4] An Overview of Privacy and Security Issues in the Internet of Things
    Medaglia, Carlo Maria
    Serbanati, Alexandru
    [J]. INTERNET OF THINGS-BOOK, 2010, : 389 - 395
  • [5] Muir JA, 2012, ADV NETWORK ANAL ITS, P209
  • [6] Security, Trust and Implementation Limitations of Prominent IoT Platforms
    Sathyadevan, Shiju
    Kalarickal, Boney S.
    Jinesh, M. K.
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 85 - 95
  • [7] Shamir A, 1999, LECT NOTES COMPUT SC, V1648, P118
  • [8] Wyseur B., 2011, ENCY CRYPTOGRAPHY SE, P1386