dc.contributor.advisor | Yanhaona, Muhammad Nur | |
dc.contributor.author | Eshan, Adnan Rahman | |
dc.contributor.author | Kashfee, Jarin Tasnim Khan | |
dc.contributor.author | Hasan, Md. Rabib | |
dc.contributor.author | Islam, Mahmudul | |
dc.date.accessioned | 2024-05-16T06:02:18Z | |
dc.date.available | 2024-05-16T06:02:18Z | |
dc.date.copyright | ©2024 | |
dc.date.issued | 2024-01 | |
dc.identifier.other | ID: 20101601 | |
dc.identifier.other | ID: 20101062 | |
dc.identifier.other | ID: 20101561 | |
dc.identifier.other | ID: 20101200 | |
dc.identifier.uri | http://hdl.handle.net/10361/22850 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2024. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 40-41). | |
dc.description.abstract | Whitebox Cryptography techniques are those which are aimed at protecting software
implementations of cryptographic algorithms against key recovery in unprotected
devices. The sensitive data embedded in the code is the major concern in
any security-sensitive application. Therefore, data encryption is indispensable. But
white box cryptography aims to protect the security keys used for data encryption
from being revealed. As a whole, such a type of cryptography concerns the analysis
of algorithms that are said to operate in a whitebox attack context. In this
attack context, all information and details of implementations are visible to an attacker.
The attacker not only sees the input and output portions, but they can
also see every intermediary implementation and operation that happened along the
way. The challenge that whitebox cryptography aims to address is implementing
a cryptographic algorithm that will keep the cryptographic assets of software secure
even when subject to whitebox attacks. As converting blackbox cryptographic
algorithms to whitebox has some sort of performance consequences that have not
been measured or identified properly, we will compare the performance of alternative
algorithms. In addition to that, as some of the algorithms have very few implementations
and any e↵ective open source implementation is yet to be found that will
help the researchers in this sector, we will write an open source white box implementation
for our performance analysis and the future benefit of the researchers.
Moreover, companies lacking resources /skills may also be benefited because of such
implementation. In addition, we want to investigate the kinds of attacks that can
be launched against the solution in our library and try to add security features to
strengthen them to resist common forms of attacks. | en_US |
dc.description.statementofresponsibility | Adnan Rahman Eshan | |
dc.description.statementofresponsibility | Jarin Tasnim Khan Kashfee | |
dc.description.statementofresponsibility | Md. Rabib Hasan | |
dc.description.statementofresponsibility | Mahmudul Islam | |
dc.format.extent | 47 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Whitebox cryptography | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Cryptographic algorithm | en_US |
dc.subject.lcsh | Data structures (Computer science) | |
dc.subject.lcsh | Computer security | |
dc.subject.lcsh | Data encryption (Computer science) | |
dc.title | An investigation on implementations of theoretical whitebox cryptographic solutions | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B.Sc in Computer Science | |