BSI PD ISO/IEC/TR 24485:2022
$102.76
Information security, cybersecurity and privacy protection. Security techniques. Security properties and best practices for test and evaluation of white box cryptography
Published By | Publication Date | Number of Pages |
BSI | 2022 | 22 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Security properties of white box cryptography 4.1 Implementation of a white box cryptography 4.1.1 General 4.1.2 Description of a WBC |
11 | 4.1.3 Adherence between WBC code and the device hosting it 4.2 WBC attack path(s) 4.2.1 General 4.2.2 De-embedding of code (code lifting) |
12 | 4.2.3 Device analysis 4.2.4 Code analysis 4.3 WBC usages 4.3.1 General |
13 | 4.3.2 Symmetric encryption 4.3.3 Asymmetric encryption / signature 4.3.4 Keyed hash function 4.3.5 Customized cryptographic algorithm 4.4 Security properties 4.4.1 General 4.4.2 Secrecy of the key |
14 | 4.4.3 Difficulty to attack diversified instance 4.4.4 Difficulty to lift the code 4.4.5 Difficulty to reverse-engineer the binary / obfuscation code |
15 | 5 Best practices for WBC 5.1 Tests condition 5.1.1 General 5.1.2 WBC under source code version 5.1.3 WBC under compiled code version 5.1.4 Best practices for testing 5.2 Security tests 5.2.1 General 5.2.2 Testing the key secrecy 5.2.3 Testing the difficulty to attack diversified instances |
16 | 5.2.4 Testing the difficulty to lift the code 5.2.5 Testing the difficulty to reverse-engineer the binary / obfuscation code 6 Best practices for WBC 6.1 General 6.2 Core analyses 6.2.1 General 6.2.2 Cryptanalytic analysis of tables 6.2.3 Side-channel analysis on WBC |
17 | 6.2.4 Fault injection analysis on WBC 6.2.5 Evaluation involving combined techniques 6.3 Analysis aiming at circumventing access to the plain WBC protection 6.3.1 General 6.3.2 Reverse-engineering of the binary code 6.3.3 Space hardness evaluation |
18 | Annex A (informative) Design of white-boxing-friendly cryptographic algorithms |
19 | Bibliography |