HMAC obfuscation method for implementation in untrusted systems
We propose an obfus-cation method for using hash-based message authentication codes (MAC) in untrusted systems. Our method is implemented for MAC in a form H(k,x) = h(k,p1, h(k,p2, x)). The main idea is to use inner states of a hash function h. We calculate both h intermediate values in a such way that all key related blocks are already reduced by the hash compression function. That values are h(epad(k,p1)) and h(epad(k,p2)), where epad is a key padding algorithm. Then we use them in functions h1 and h2, which calculate h with the initial block equalled h(epad(k,p1)) and h(epad(k,p2)) respectively. So, accordingly to the following equation, these new functions implement original MAC algorithm: H (k,x) = h(k,p1 ,h(k,p2 ,x)) = h1(h2(x)).
Keywords
white-box cryptography, коды аутентификации сообщений, HMAC, обфускация, защита приложений, white-box cryptography, message authentication codes, HMAC, obfuscation, web application securityAuthors
Name | Organization | |
Kolegov D. N. | Tomsk State University; "Positive Technologies" | d.n.kolegov@gmail.com |
Broslavsky O.V. | Tomsk State University | o.v.broslavsky@gmail.com |
Oleksov N. E. | Tomsk State University | n.e.oleksov@gmail.com |
References

HMAC obfuscation method for implementation in untrusted systems | Applied Discrete Mathematics. Supplement. 2016. № 9.