HMAC obfuscation method for implementation in untrusted systems | Applied Discrete Mathematics. Supplement. 2016. № 9.

HMAC obfuscation method for implementation in untrusted systems

We propose an obfus-cation method for using hash-based message authentication codes (MAC) in untrusted systems. Our method is implemented for MAC in a form H(k,x) = h(k,p1, h(k,p2, x)). The main idea is to use inner states of a hash function h. We calculate both h intermediate values in a such way that all key related blocks are already reduced by the hash compression function. That values are h(epad(k,p1)) and h(epad(k,p2)), where epad is a key padding algorithm. Then we use them in functions h1 and h2, which calculate h with the initial block equalled h(epad(k,p1)) and h(epad(k,p2)) respectively. So, accordingly to the following equation, these new functions implement original MAC algorithm: H (k,x) = h(k,p1 ,h(k,p2 ,x)) = h1(h2(x)).

Download file
Counter downloads: 240

Keywords

white-box cryptography, коды аутентификации сообщений, HMAC, обфускация, защита приложений, white-box cryptography, message authentication codes, HMAC, obfuscation, web application security

Authors

NameOrganizationE-mail
Kolegov D. N.Tomsk State University; "Positive Technologies"d.n.kolegov@gmail.com
Broslavsky O.V.Tomsk State Universityo.v.broslavsky@gmail.com
Oleksov N. E.Tomsk State Universityn.e.oleksov@gmail.com
Всего: 3

References

White-Box Cryptography: Protecting Cryptographic Keys in Software Applications. http: //www.whiteboxcrypto.com/
Chow W. S., Eisen P., Johnson H., and Van Oorschot P. C. A White-box DES Implementation for DRM Applications // LNCS. 2003. V.2696. P. 1-15.
Chow W. S., Eisen P., Johnson H., and Van Oorschot P. C. White-Box Cryptography and an AES Implementation // LNCS. 2003. V.2595. P. 250-270.
RFC 2104. HMAC: Keyed-Hashing for Message Authentication. https://tools.ietf.org/ html/rfc2104
Menezes A. J., Van Oorschot P. C., and Vanstone S. A. Handbook of Applied Cryptography. N.Y.: CRC Press, 1997.
jCrypto: White-Box Cryptography Tools for ECMAScript Language. https://github.com/ tsu-iscd/jcrypto
 HMAC obfuscation method for implementation in untrusted systems | Applied Discrete Mathematics. Supplement. 2016. № 9.

HMAC obfuscation method for implementation in untrusted systems | Applied Discrete Mathematics. Supplement. 2016. № 9.

Download full-text version
Counter downloads: 1385