NDLI logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Journal of Computer Science and Technology
  2. Journal of Computer Science and Technology : Volume 32
  3. Journal of Computer Science and Technology : Volume 32, Issue 2, March 2017
  4. A New Feistel-Type White-Box Encryption Scheme
Loading...

Please wait, while we are loading the content...

Journal of Computer Science and Technology : Volume 32
Journal of Computer Science and Technology : Volume 32, Issue 4, July 2017
Journal of Computer Science and Technology : Volume 32, Issue 3, May 2017
Journal of Computer Science and Technology : Volume 32, Issue 2, March 2017
Providing Virtual Cloud for Special Purposes on Demand in JointCloud Computing Environment
Labeled von Neumann Architecture for Software-Defined Cloud
Evolution of Cloud Operating System: From Technology to Ecosystem
Intelligent Development Environment and Software Knowledge Graph
Experience Availability: Tail-Latency Oriented Availability in Software-Defined Cloud Computing
Architectural Design of a Cloud Robotic System for Upper-Limb Rehabilitation with Multimodal Interaction
Parallel Turing Machine, a Proposal
DLPlib: A Library for Deep Learning Processor
A Power and Area Optimization Approach of Mixed Polarity Reed-Muller Expression for Incompletely Specified Boolean Functions
A Hint Frequency Based Approach to Enhancing the I/O Performance of Multilevel Cache Storage Systems
Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding
A Novel Hardware/Software Partitioning Method Based on Position Disturbed Particle Swarm Optimization with Invasive Weed Optimization
Automatic Fall Detection Using Membership Based Histogram Descriptors
Parallel Incremental Frequent Itemset Mining for Large Data
A New Feistel-Type White-Box Encryption Scheme
Developer Role Evolution in Open Source Software Ecosystem: An Explanatory Study on GNOME
Journal of Computer Science and Technology : Volume 32, Issue 1, January 2017
Journal of Computer Science and Technology : Volume 31
Journal of Computer Science and Technology : Volume 30
Journal of Computer Science and Technology : Volume 29
Journal of Computer Science and Technology : Volume 28
Journal of Computer Science and Technology : Volume 27
Journal of Computer Science and Technology : Volume 26
Journal of Computer Science and Technology : Volume 25
Journal of Computer Science and Technology : Volume 24
Journal of Computer Science and Technology : Volume 23
Journal of Computer Science and Technology : Volume 22
Journal of Computer Science and Technology : Volume 21
Journal of Computer Science and Technology : Volume 20
Journal of Computer Science and Technology : Volume 19
Journal of Computer Science and Technology : Volume 18
Journal of Computer Science and Technology : Volume 17
Journal of Computer Science and Technology : Volume 16
Journal of Computer Science and Technology : Volume 15
Journal of Computer Science and Technology : Volume 14
Journal of Computer Science and Technology : Volume 13
Journal of Computer Science and Technology : Volume 12

Similar Documents

...
A New Public-Key Encryption Scheme

Article

...
Provably Secure Role-Based Encryption with Revocation Mechanism

Article

...
Authenticating tripartite key agreement protocol with pairings

Article

...
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts

Article

...
Secure Two-Party Point-Circle Inclusion Problem

Article

...
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes

Article

...
Special announcement

Article

...
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles

Article

...
An efficient key assignment scheme based on one-way hash function in a user hierarchy

Article

A New Feistel-Type White-Box Encryption Scheme

Content Provider SpringerLink
Author Lin, Ting Ting Lai, Xue Jia Xue, Wei Jia Jia, Yin
Copyright Year 2017
Abstract The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almost all white-box solutions have been broken. In this study, we propose a white-box encryption scheme that is not a variant of obfuscating existing ciphers but a completely new solution. The new scheme is based on the unbalanced Feistel network as well as the ASASASA (where ā€œAā€ means affine, and ā€œSā€ means substitution) structure. It has an optional input block size and is suitable for saving space compared with other solutions because the space requirement grows slowly (linearly) with the growth of block size. Moreover, our scheme not only has huge white-box diversity and white-box ambiguity but also has a particular construction to bypass public white-box cryptanalysis techniques, including attacks aimed at white-box variants of existing ciphers and attacks specific to the ASASASA structure. More precisely, we present a definition of white-box security with regard to equivalent key, and prove that our scheme satisfies such security requirement.
Starting Page 386
Ending Page 395
Page Count 10
File Format PDF
ISSN 10009000
Journal Journal of Computer Science and Technology
Volume Number 32
Issue Number 2
e-ISSN 18604749
Language English
Publisher Springer US
Publisher Date 2017-03-13
Publisher Place New York
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword white-box equivalent key Feistel network cryptography ASASASA Computer Science Software Engineering Theory of Computation Data Structures, Cryptology and Information Theory Artificial Intelligence (incl. Robotics) Information Systems Applications (incl.Internet)
Content Type Text
Resource Type Article
Subject Theoretical Computer Science Computational Theory and Mathematics Computer Science Applications Software Hardware and Architecture
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...