We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation

by Nilima Yadav, Sarvesh Tanwar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 2
Year of Publication: 2013
Authors: Nilima Yadav, Sarvesh Tanwar
10.5120/11938-7728

Nilima Yadav, Sarvesh Tanwar . Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation. International Journal of Computer Applications. 70, 2 ( May 2013), 35-38. DOI=10.5120/11938-7728

@article{ 10.5120/11938-7728,
author = { Nilima Yadav, Sarvesh Tanwar },
title = { Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 2 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 35-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number2/11938-7728/ },
doi = { 10.5120/11938-7728 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:50.769400+05:30
%A Nilima Yadav
%A Sarvesh Tanwar
%T Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 2
%P 35-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

White box cryptographic algorithms aim to denying the key readout even if the source code embedding the key is disclosed. Full-privileged attack software shares a host with cryptographic software, having complete access to the implementation of algorithms, dynamic execution (with instantiated cryptographic keys) can be observed and internal algorithm details are completely visible and alterable. Chow proposed a new technique to secure cryptographic algorithms and key against white-box attacks, called white-box cryptography. Another technique such as obfuscation is mainly designed to facilitate securing of e-commerce and e-banking applications, which often embed cryptographic keys and critical information. In general, it can be used to protect all distributed client software where an owner loses control or where the user wants to protect against automated attacks. As we know main challenges in modern cryptography does how to encrypt or decrypt content without directly revealing any portion of the key and or the data and how to perform strong encryption mechanisms know that hackers can observe and or alter the code during execution. Considerding these problems we have suggested a novel approch in e–banking system (credit card processing) using white box cryptography to encrypt the key and obfuscation which gives a strong encryption. Combination of these two concepts gives a new level in modern cryptography as well as optimizes its performance and additionally we will make end points (Client and server) secure.

References
  1. S. Chow, P. Eisen, H. Johnson, P. C. van Oorschot , 16 August 2002,"White-Box Cryptography and an AES Implementation", (SAC'02), Ottawa, Canada.
  2. Marc Joye,2008, "On White-Box Cryptography" ,Thomson R&D France, Technology Group, Corporate Research, Security Laboratory 1 avenue de Belle Fontaine, France Security of Information and Networks,Tra®ord Publishing.
  3. S. Chow, P. Eisen, H. Johnso1, P. C. van Oorschot,2002 ," A White-Box DES Implementation for DRM Applications", Cloakware Corporation, Ottawa, Canad , Carleton University, Ottawa, Canada .
  4. Marjanne Plasmans ,2005. ,"White-Box Cryptography for Digital Content protection", department of mathematics and computer science,
  5. James Muir, "White-Box Cryptography", Cryptography Developer Irdeto Canada MITACS Workshop on Network Security and Cryptography, 24 June 2010.
  6. James Muir,"Understanding the Advantages of Irdeto's White-Box Cryptography", December 2012.
  7. Hamilton E. Link, William D. Neumann,"Clarifying Obfuscation Improving the Security of White-Box DES", Sandia National Laboratories, 2004.
  8. Wil Michiels, "Mechanism for Software Tamper Resistance: An Application of White-Box Cryptography",Philips Research Laboratories Eindhoven, The Netherlands Department of Mathematics and Computer Science, DRM'07, Alexandria, Virginia, USA,Copyright 2007 ACM, October 29, 2007.
  9. Olivier Billet, Henri Gilbert,"Cryptanalysis of a White Box AES Implementation", Charaf Ech-Chatbi France T´el´ecom R&D, France, 2009.
  10. Brecht Wyseur Brecht, "White-Box Cryptography: Hiding Keys In Software", NAGRA Kudelski Group, Switzerland, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

White-Box cryptography Credit card Code obfuscation White –box attacks