Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation

White box cryptographic algorithms aim to denying the key readout even if the source code embedding the key is disclosed. Full-privileged attack software shares a host with cryptographic software, having complete access to the implementation of algorithms, dynamic execution (with instantiated cryptographic keys) can be observed and internal algorithm details are completely visible and alterable. Chow proposed a new technique to secure cryptographic algorithms and key against white-box attacks, called white-box cryptography. Another technique such as obfuscation is mainly designed to facilitate securing of e-commerce and ebanking applications, which often embed cryptographic keys and critical information. In general, it can be used to protect all distributed client software where an owner loses control or where the user wants to protect against automated attacks. As we know main challenges in modern cryptography does how to encrypt or decrypt content without directly revealing any portion of the key and or the data and how to perform strong encryption mechanisms know that hackers can observe and or alter the code during execution. Considerding these problems we have suggested a novel approch in e–banking system (credit card processing) using white box cryptography to encrypt the key and obfuscation which gives a strong encryption. Combination of these two concepts gives a new level in modern cryptography as well as optimizes its performance and additionally we will make end points (Client and server) secure.

[1]  Brecht Wyseur,et al.  White-Box Cryptography , 2011, Encyclopedia of Cryptography and Security.

[2]  Paul C. van Oorschot,et al.  A White-Box DES Implementation for DRM Applications , 2002, Digital Rights Management Workshop.

[3]  Hamilton E. Link,et al.  Clarifying obfuscation: improving the security of white-box DES , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[4]  Olivier Billet,et al.  Cryptanalysis of a White Box AES Implementation , 2004, Selected Areas in Cryptography.

[5]  Li Yang White Box Cryptography , 2022 .

[6]  Paul C. van Oorschot,et al.  White-Box Cryptography and an AES Implementation , 2002, Selected Areas in Cryptography.

[7]  Hamilton E. Link,et al.  Clarifying Obfuscation: Improving the Security of White-Box Encoding , 2004, IACR Cryptol. ePrint Arch..

[8]  Wil Michiels,et al.  Mechanism for software tamper resistance: an application of white-box cryptography , 2007, DRM '07.

[9]  KEYS IN SOFTWARE WHITE-BOX CRYPTOGRAPHY : HIDING KEYS IN SOFTWARE , 2012 .