Volume 46 Issue 9
Sep.  2020
Turn off MathJax
Article Contents
WU Zhen, BAI Jian, LI Dashuang, et al. White-box cryptographic video data sharing system based on SM4 algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics, 2020, 46(9): 1660-1669. doi: 10.13700/j.bh.1001-5965.2020.0080(in Chinese)
Citation: WU Zhen, BAI Jian, LI Dashuang, et al. White-box cryptographic video data sharing system based on SM4 algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics, 2020, 46(9): 1660-1669. doi: 10.13700/j.bh.1001-5965.2020.0080(in Chinese)

White-box cryptographic video data sharing system based on SM4 algorithm

doi: 10.13700/j.bh.1001-5965.2020.0080
Funds:

National Key R & D Program of China 2016YFC0801004

More Information
  • Corresponding author: WU Zhen.E-mail:wuzhen@30kt.com
  • Received Date: 03 Mar 2020
  • Accepted Date: 27 Mar 2020
  • Publish Date: 20 Sep 2020
  • White-box cryptographic video data sharing system based on SM4 algorithm is a system that guarantees the security of cross-level and cross-domain sharing of surveillance video data.In this paper, we propose a white-box cipher implementation method based on SM4 cryptographic algorithm, and analyze the security of the algorithm, solves the problem how the SM4 algorithm can compute safely in untrusted hardware environments.In addition, we developed a video data security sharing software system based on background permission control mechanism, including shared video data upload/download, sharing audit, data white-box encryption, access control functions, and shared video decryption player based on white-box cryptographic algorithm, realizing the security management and control of the entire process of video data sharing.Then we set up the experimental environment, and the system's functional performance experiment was performed. The experimental results show that the system's functional performance meets the design requirements.

     

  • loading
  • [1]
    中华人民共和国公安部.公共安全视频监控联网信息安全技术要求: GB 35114-2017[S].北京: 中国标准出版社, 2017: 4-5.

    Ministry of Public Security of the PRC.Technical requirements for information security of video surveillance network system for public security: GB 35114-2017[S].Beijing: China Standard Press, 2017: 4-5(in Chinese).
    [2]
    COLLBERG C, NAGRA J.软件加密与解密[M].崔孝晨, 译.北京: 人民邮电出版社, 2012: 5-6. https://www.ituring.com.cn/book/795

    COLLBERG C, NAGRA J.Surreptitious software:Obfuscation, watermarking, and tamperproofing for software protection[M].CUI X C, translated.Beijing:Posts & Telecom Press, 2012:5-6(in Chinese). https://www.ituring.com.cn/book/795
    [3]
    ANDERSON R, KUHN M.Low cost attacks on tamper resistant devices[C]//Security Protocols 1997.Berlin: Springer, 1997: 125-136. https://www.zhangqiaokeyan.com/open-access_resources_thesis/0100056189752.html
    [4]
    BIHAM E, SHAMIR A.Differential fault analysis of secret key cryptosystems[C]//17th Annual International Cryptology Conferenceon Advances in Cryptology.Berlin: Springer, 1997: 513-525. https://www.researchgate.net/publication/2269851_Differential_Fault_Analysis_of_Secret_Key_Cryptosystems
    [5]
    BIHAM E, SHAMIR A.Power analysis of the key scheduling of the AES candidates[C]//2nd AES Candidate Conference, 1999: 22-23. https://www.researchgate.net/publication/239666203_Power_Analysis_of_the_Key_Scheduling_of_the_AES_Canditates
    [6]
    BONEH D, DEMILLO R A, LIPTON R J.On the importance of eliminating errors in cryptographic computations[J].Journal of Cryptology, 2001, 14(2):101-119. http://cn.bing.com/academic/profile?id=ad6745446d405cc4eb435a2b80948861&encoded=0&v=paper_preview&mkt=zh-cn
    [7]
    CHOW S, EISEN P, JOHNSON H, et al.White-box cryptography and an AES implementation[C]//Cryptography-SAC 2002.Berlin: Springer, 2002: 250-270. doi: 10.1007/3-540-36492-7_17
    [8]
    周洁, 白健.基于余数系统的SM2签名算法的白盒实现[C]//中国密码学会2017年会, 2017: 71-73.

    ZHOU J, BAI J.White box implementation of the SM2 signature algorithm based on the remainder system[C]//Chinese Association for Cryptologic Research 2017 Annual Meeting, 2017: 71-73(in Chinese).
    [9]
    潘文伦, 秦体红, 贾音, 等.对两个SM4白盒方案的分析[J].密码学报, 2018, 5(6):651-670.

    PAN W L, QIN T H, JIA Y, et al.Analysis of two SM4 white box scenarios[J].Journal of Cryptologic Research, 2018, 5(6):651-670(in Chinese).
    [10]
    CHOW S, EISEN P, JOHNSON H, et al.A white-box DES implementation for DRM applications[C]//Digital Rights Management-DRM 2002.Berlin: Springer, 2003: 1-15.
    [11]
    XIAO Y Y, LAI X J.White-box crytography and implementation of SMS4[C]//Proceedings of the 2009 CACR Annual Meeting.Beijing: Science Press, 2009: 24-34.
    [12]
    BILLET O, GILBERT H, ECH-CHATBI C.Cryptanalysis of a white box AES implementation[C]//Selected Areas in Cryptography-SAC 2004.Berlin: Springer, 2005: 227-240.
    [13]
    国家密码管理局.SM4分组密码算法: GM/T 0002-2012[S].北京: 中国标准出版社, 2012. http://www.doc88.com/p-5037490963262.html

    State Cryptography Administration Office of Security Commercial Code Administration.SM4 block cipher algorithm: GM/T 0002-2012[S].Beijing: China Standard Press, 2012(in Chinese). http://www.doc88.com/p-5037490963262.html
    [14]
    国家密码管理局.信息安全技术SM4分组密码算法: GB/T 32907-2016[S].北京: 中国标准出版社, 2016. http://www.doc88.com/p-6406486835803.html

    State Cryptography Administration Office of Security Commercial Code Administration.Information security technology-SM4 block cipher algorthm: GB/T 32907-2016[S].Beijing: China Standard Press, 2016(in Chinese). http://www.doc88.com/p-6406486835803.html
    [15]
    吕述望, 苏波展, 王鹏, 等.SM4分组密码算法综述[J].信息安全研究, 2016(11):995-1007. http://www.cnki.com.cn/Article/CJFDTotal-XAQY201611005.htm

    LU S W, SU B Z, WANG P, et al.Overview on SM4 algorithm[J].Journal of Information Security Research, 2016(11):995-1007(in Chinese). http://www.cnki.com.cn/Article/CJFDTotal-XAQY201611005.htm
    [16]
    国家密码管理局.SM3密码杂凑算法: GM/T 0004-2012[S].北京: 中国标准出版社, 2012. http://www.doc88.com/p-9953839177988.html

    State Cryptography Administration Office of Security Commercial Code Administration.SM3 cryptographic hash algorithm: GM/T 0004-2012[S].Beijing: China Standard Press, 2012(in Chinese). http://www.doc88.com/p-9953839177988.html
    [17]
    MICHIELS W, GORISSEN P, HOLLMANN H D L.Cryptanalysis of a generic class of white-box implementations[C]//The Selected Areas in Cryptography.Berlin: Springer, 2009: 414-428.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(9)  / Tables(2)

    Article Metrics

    Article views(1088) PDF downloads(322) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return