Shopping Cart

No products in the cart.

BSI PD ISO/IEC/TR 24485:2022

$102.76

Information security, cybersecurity and privacy protection. Security techniques. Security properties and best practices for test and evaluation of white box cryptography

Published By Publication Date Number of Pages
BSI 2022 22
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 National foreword
7 Foreword
8 Introduction
9 1 ​Scope
2 ​Normative references
3 ​Terms and definitions
10 4 ​Security properties of white box cryptography
4.1 ​Implementation of a white box cryptography
4.1.1 ​General
4.1.2 ​Description of a WBC
11 4.1.3 ​Adherence between WBC code and the device hosting it
4.2 ​WBC attack path(s)
4.2.1 ​General
4.2.2 ​De-embedding of code (code lifting)
12 4.2.3 ​Device analysis
4.2.4 ​Code analysis
4.3 ​WBC usages
4.3.1 ​General
13 4.3.2 ​Symmetric encryption
4.3.3 ​Asymmetric encryption / signature
4.3.4 ​Keyed hash function
4.3.5 ​Customized cryptographic algorithm
4.4 ​Security properties
4.4.1 ​General
4.4.2 ​Secrecy of the key
14 4.4.3 ​Difficulty to attack diversified instance
4.4.4 ​Difficulty to lift the code
4.4.5 ​Difficulty to reverse-engineer the binary / obfuscation code
15 5 ​Best practices for WBC
5.1 ​Tests condition
5.1.1 ​General
5.1.2 ​WBC under source code version
5.1.3 ​WBC under compiled code version
5.1.4 ​Best practices for testing
5.2 ​Security tests
5.2.1 ​General
5.2.2 ​Testing the key secrecy
5.2.3 ​Testing the difficulty to attack diversified instances
16 5.2.4 ​Testing the difficulty to lift the code
5.2.5 ​Testing the difficulty to reverse-engineer the binary / obfuscation code
6 ​Best practices for WBC
6.1 ​General
6.2 ​Core analyses
6.2.1 ​General
6.2.2 ​Cryptanalytic analysis of tables
6.2.3 ​Side-channel analysis on WBC
17 6.2.4 ​Fault injection analysis on WBC
6.2.5 ​Evaluation involving combined techniques
6.3 ​Analysis aiming at circumventing access to the plain WBC protection
6.3.1 ​General
6.3.2 ​Reverse-engineering of the binary code
6.3.3 ​Space hardness evaluation
18 Annex A (informative) Design of white-boxing-friendly cryptographic algorithms
19 Bibliography
BSI PD ISO/IEC/TR 24485:2022
$102.76