The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes,WAS,an improved white-box cryptographic algorithm over AS iteration is proposed.This scheme utilizes the AS iterative structure to construct a lookup table with a fvelayer ASASA structure,and the maximum distance separable matrix is used as a linear layer to achieve complete difusion in a small number of rounds.Attackers can be prevented from recovering the key under black-box model.The length of nonlinear layer S and afne layer A in lookup table is 16 bits,which efectively avoids decomposition attack against the ASASA structure and makes the algorithm possess anti-key extraction security under the whitebox model,while WAS possesses weak white-box(32 KB,112)-space hardness to satisfy anti-code lifting security.WAS has provable security and better storage cost than existing schemes,with the same anti-key extraction security and anti-code lifting security,only 128 KB of memory space is required in WAS,which is only 14%of SPACE-16 algorithm and 33%of Yoroi-16 algorithm.展开更多
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto...Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical.展开更多
为解决SONiC(software for open networking in the cloud)交换机操作系统对多模态网络(polymor phic network,PINet)中模态适配及模态管控问题,提出了一个基于P4Runtime的SONiC网元控制通道容器p4runtime-pins,使多模态网元设备可以支...为解决SONiC(software for open networking in the cloud)交换机操作系统对多模态网络(polymor phic network,PINet)中模态适配及模态管控问题,提出了一个基于P4Runtime的SONiC网元控制通道容器p4runtime-pins,使多模态网元设备可以支持多种网络模态流表的配置。p4runtime-pins容器通过gRPC服务模块实现与控制器的连接,使用邻近网元发现算法实现控制器对链路的发现。设计了网元端口更新算法解决了网元设备在实际应用环境中存在的端口变更问题。同时,针对SONiC网元交换机中硬件转发处理单元存在的流表支持性差异问题,设计了内部流表转存和gRPC网元代理功能,实现了不同网络模态流表的部署。实验结果表明,p4runtime-pins容器资源消耗低,仅占用了1.70%的CPU资源和0.45%的内存资源。同时,部署p4runtime-pins容器的SONiC网元设备能够准确地接收并配置控制器下发的流表规则,流表配置延迟仅为0.027~0.037 s。展开更多
The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almo...The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almost all white-box solutions have been broken. In this study, we propose a white-box encryption scheme that is not a variant of obfuscating existing ciphers but a completely new solution. The new scheme is based on the unbalanced Feistel network as well as the ASASASA (where "A" means affine, and "S" means substitution) structure. It has an optional input block size and is suitable for saving space compared with other solutions because the space requirement grows slowly (linearly) with the growth of block size. Moreover, our scheme not only has huge white-box diversity and white-box ambiguity but also has a particular construction to bypass public white-box cryptanalysis techniques, including attacks aimed at white-box variants of existing ciphers and attacks specific to the ASASASA structure. More precisely, we present a definition of white-box security with regard to equivalent key, and prove that our scheme satisfies such security requirement.展开更多
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ...White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment.展开更多
The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirica...The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirical correlations and the empirical closure correlations for the mechanistic models were developed with experimental datasets.In addition,most machine learning(ML)FBHP prediction models were constructed with real-time well data points and published without any visible mathematical equation.This makes it difficult for other readers to use these ML models since the datasets used in their development are not open-source.This study presents a white-box adaptive neuro-fuzzy inference system(ANFIS)model for real-time prediction of multiphase FBHP in wellbores.1001 real well data points and 1001 normalized well data points were used in constructing twenty-eight different Takagi eSugeno fuzzy inference systems(FIS)structures.The dataset was divided into two sets;80%for training and 20%for testing.Statistical performance analysis showed that a FIS with a 0.3 range of influence and trained with a normalized dataset achieved the best FBHP prediction performance.The optimal ANFIS black-box model was then translated into the ANFIS white-box model with the Gaussian input and the linear output membership functions and the extracted tuned premise and consequence parameter sets.Trend analysis revealed that the novel ANFIS model correctly simulates the anticipated effect of input parameters on FBHP.In addition,graphical and statistical error analyses revealed that the novel ANFIS model performed better than published mechanistic models,empirical correlations,and machine learning models.New training datasets covering wider input parameter ranges should be added to the original training dataset to improve the model's range of applicability and accuracy.展开更多
新型电力系统的发展催生出大量多业务场景以及对通信质量敏感的新业务,然而现有的电力通信网络架构在时延保障、灵活性等方面逐渐难以适配电力业务大连接等需求。白盒网络架构为传输网络带来了灵活的数据平面可编程和低时延处理芯片,有...新型电力系统的发展催生出大量多业务场景以及对通信质量敏感的新业务,然而现有的电力通信网络架构在时延保障、灵活性等方面逐渐难以适配电力业务大连接等需求。白盒网络架构为传输网络带来了灵活的数据平面可编程和低时延处理芯片,有望成为实现6G内生智能与确定性服务的关键技术。文章首先提出了面向电力6G的白盒网络服务架构,实现电力通信业务承载的资源协同及可编程化管理;然后,提出面向电力6G白盒网络的服务功能链(service function chain,SFC)编排模型,并设计了基于深度Q学习(deep Q-network,DQN)的编排算法。仿真结果表明,该编排方法能够显著提高电力白盒网络SFC的接受率和时延,提高电力业务的承载质量。展开更多
基金supported by Beijing Natural Science Foundation(No:4232034)the Fundamental Research Funds for the Central Universities(No:328202222).
文摘The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes,WAS,an improved white-box cryptographic algorithm over AS iteration is proposed.This scheme utilizes the AS iterative structure to construct a lookup table with a fvelayer ASASA structure,and the maximum distance separable matrix is used as a linear layer to achieve complete difusion in a small number of rounds.Attackers can be prevented from recovering the key under black-box model.The length of nonlinear layer S and afne layer A in lookup table is 16 bits,which efectively avoids decomposition attack against the ASASA structure and makes the algorithm possess anti-key extraction security under the whitebox model,while WAS possesses weak white-box(32 KB,112)-space hardness to satisfy anti-code lifting security.WAS has provable security and better storage cost than existing schemes,with the same anti-key extraction security and anti-code lifting security,only 128 KB of memory space is required in WAS,which is only 14%of SPACE-16 algorithm and 33%of Yoroi-16 algorithm.
基金supported by the National Key Research and Development Program of China (2017YFB0802000)the National Natural Science Foundations of China (61672412,61972457)the National Cryptography Development Fund of China (MMJJ20170104, MMJJ20180219)。
文摘Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical.
文摘为解决SONiC(software for open networking in the cloud)交换机操作系统对多模态网络(polymor phic network,PINet)中模态适配及模态管控问题,提出了一个基于P4Runtime的SONiC网元控制通道容器p4runtime-pins,使多模态网元设备可以支持多种网络模态流表的配置。p4runtime-pins容器通过gRPC服务模块实现与控制器的连接,使用邻近网元发现算法实现控制器对链路的发现。设计了网元端口更新算法解决了网元设备在实际应用环境中存在的端口变更问题。同时,针对SONiC网元交换机中硬件转发处理单元存在的流表支持性差异问题,设计了内部流表转存和gRPC网元代理功能,实现了不同网络模态流表的部署。实验结果表明,p4runtime-pins容器资源消耗低,仅占用了1.70%的CPU资源和0.45%的内存资源。同时,部署p4runtime-pins容器的SONiC网元设备能够准确地接收并配置控制器下发的流表规则,流表配置延迟仅为0.027~0.037 s。
基金This work was supported by the National Natural Science Foundation of China under Grant Nos. 61272440, 61472251, and U1536101, and China Postdoctoral Science Foundation under Grant Nos. 2013M531174 and 2014T70417.
文摘The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almost all white-box solutions have been broken. In this study, we propose a white-box encryption scheme that is not a variant of obfuscating existing ciphers but a completely new solution. The new scheme is based on the unbalanced Feistel network as well as the ASASASA (where "A" means affine, and "S" means substitution) structure. It has an optional input block size and is suitable for saving space compared with other solutions because the space requirement grows slowly (linearly) with the growth of block size. Moreover, our scheme not only has huge white-box diversity and white-box ambiguity but also has a particular construction to bypass public white-box cryptanalysis techniques, including attacks aimed at white-box variants of existing ciphers and attacks specific to the ASASASA structure. More precisely, we present a definition of white-box security with regard to equivalent key, and prove that our scheme satisfies such security requirement.
基金supported by the Beijing Natural Science Foundation(4232034)the Fundamental Research Funds for the Central Universities(328202222)the“Communication Engineering”and“Electronic Information Engineering”National First-Class Undergraduate Major Construction Project。
文摘White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment.
文摘The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirical correlations and the empirical closure correlations for the mechanistic models were developed with experimental datasets.In addition,most machine learning(ML)FBHP prediction models were constructed with real-time well data points and published without any visible mathematical equation.This makes it difficult for other readers to use these ML models since the datasets used in their development are not open-source.This study presents a white-box adaptive neuro-fuzzy inference system(ANFIS)model for real-time prediction of multiphase FBHP in wellbores.1001 real well data points and 1001 normalized well data points were used in constructing twenty-eight different Takagi eSugeno fuzzy inference systems(FIS)structures.The dataset was divided into two sets;80%for training and 20%for testing.Statistical performance analysis showed that a FIS with a 0.3 range of influence and trained with a normalized dataset achieved the best FBHP prediction performance.The optimal ANFIS black-box model was then translated into the ANFIS white-box model with the Gaussian input and the linear output membership functions and the extracted tuned premise and consequence parameter sets.Trend analysis revealed that the novel ANFIS model correctly simulates the anticipated effect of input parameters on FBHP.In addition,graphical and statistical error analyses revealed that the novel ANFIS model performed better than published mechanistic models,empirical correlations,and machine learning models.New training datasets covering wider input parameter ranges should be added to the original training dataset to improve the model's range of applicability and accuracy.
文摘新型电力系统的发展催生出大量多业务场景以及对通信质量敏感的新业务,然而现有的电力通信网络架构在时延保障、灵活性等方面逐渐难以适配电力业务大连接等需求。白盒网络架构为传输网络带来了灵活的数据平面可编程和低时延处理芯片,有望成为实现6G内生智能与确定性服务的关键技术。文章首先提出了面向电力6G的白盒网络服务架构,实现电力通信业务承载的资源协同及可编程化管理;然后,提出面向电力6G白盒网络的服务功能链(service function chain,SFC)编排模型,并设计了基于深度Q学习(deep Q-network,DQN)的编排算法。仿真结果表明,该编排方法能够显著提高电力白盒网络SFC的接受率和时延,提高电力业务的承载质量。