Show simple item record

dc.contributor.advisorYanhaona, Muhammad Nur
dc.contributor.authorEshan, Adnan Rahman
dc.contributor.authorKashfee, Jarin Tasnim Khan
dc.contributor.authorHasan, Md. Rabib
dc.contributor.authorIslam, Mahmudul
dc.date.accessioned2024-05-16T06:02:18Z
dc.date.available2024-05-16T06:02:18Z
dc.date.copyright©2024
dc.date.issued2024-01
dc.identifier.otherID: 20101601
dc.identifier.otherID: 20101062
dc.identifier.otherID: 20101561
dc.identifier.otherID: 20101200
dc.identifier.urihttp://hdl.handle.net/10361/22850
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2024.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 40-41).
dc.description.abstractWhitebox Cryptography techniques are those which are aimed at protecting software implementations of cryptographic algorithms against key recovery in unprotected devices. The sensitive data embedded in the code is the major concern in any security-sensitive application. Therefore, data encryption is indispensable. But white box cryptography aims to protect the security keys used for data encryption from being revealed. As a whole, such a type of cryptography concerns the analysis of algorithms that are said to operate in a whitebox attack context. In this attack context, all information and details of implementations are visible to an attacker. The attacker not only sees the input and output portions, but they can also see every intermediary implementation and operation that happened along the way. The challenge that whitebox cryptography aims to address is implementing a cryptographic algorithm that will keep the cryptographic assets of software secure even when subject to whitebox attacks. As converting blackbox cryptographic algorithms to whitebox has some sort of performance consequences that have not been measured or identified properly, we will compare the performance of alternative algorithms. In addition to that, as some of the algorithms have very few implementations and any e↵ective open source implementation is yet to be found that will help the researchers in this sector, we will write an open source white box implementation for our performance analysis and the future benefit of the researchers. Moreover, companies lacking resources /skills may also be benefited because of such implementation. In addition, we want to investigate the kinds of attacks that can be launched against the solution in our library and try to add security features to strengthen them to resist common forms of attacks.en_US
dc.description.statementofresponsibilityAdnan Rahman Eshan
dc.description.statementofresponsibilityJarin Tasnim Khan Kashfee
dc.description.statementofresponsibilityMd. Rabib Hasan
dc.description.statementofresponsibilityMahmudul Islam
dc.format.extent47 pages
dc.language.isoenen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectWhitebox cryptographyen_US
dc.subjectCryptographyen_US
dc.subjectCryptographic algorithmen_US
dc.subject.lcshData structures (Computer science)
dc.subject.lcshComputer security
dc.subject.lcshData encryption (Computer science)
dc.titleAn investigation on implementations of theoretical whitebox cryptographic solutionsen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB.Sc in Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record