{"id":408626,"date":"2024-10-20T05:31:36","date_gmt":"2024-10-20T05:31:36","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-tr-244852022\/"},"modified":"2024-10-26T10:04:36","modified_gmt":"2024-10-26T10:04:36","slug":"bsi-pd-iso-iec-tr-244852022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-tr-244852022\/","title":{"rendered":"BSI PD ISO\/IEC\/TR 24485:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 \u200bScope
2 \u200bNormative references
3 \u200bTerms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 \u200bSecurity properties of white box cryptography
4.1 \u200bImplementation of a white box cryptography
4.1.1 \u200bGeneral
4.1.2 \u200bDescription of a WBC <\/td>\n<\/tr>\n
11<\/td>\n4.1.3 \u200bAdherence between WBC code and the device hosting it
4.2 \u200bWBC attack path(s)
4.2.1 \u200bGeneral
4.2.2 \u200bDe-embedding of code (code lifting) <\/td>\n<\/tr>\n
12<\/td>\n4.2.3 \u200bDevice analysis
4.2.4 \u200bCode analysis
4.3 \u200bWBC usages
4.3.1 \u200bGeneral <\/td>\n<\/tr>\n
13<\/td>\n4.3.2 \u200bSymmetric encryption
4.3.3 \u200bAsymmetric encryption \/ signature
4.3.4 \u200bKeyed hash function
4.3.5 \u200bCustomized cryptographic algorithm
4.4 \u200bSecurity properties
4.4.1 \u200bGeneral
4.4.2 \u200bSecrecy of the key <\/td>\n<\/tr>\n
14<\/td>\n4.4.3 \u200bDifficulty to attack diversified instance
4.4.4 \u200bDifficulty to lift the code
4.4.5 \u200bDifficulty to reverse-engineer the binary \/ obfuscation code <\/td>\n<\/tr>\n
15<\/td>\n5 \u200bBest practices for WBC
5.1 \u200bTests condition
5.1.1 \u200bGeneral
5.1.2 \u200bWBC under source code version
5.1.3 \u200bWBC under compiled code version
5.1.4 \u200bBest practices for testing
5.2 \u200bSecurity tests
5.2.1 \u200bGeneral
5.2.2 \u200bTesting the key secrecy
5.2.3 \u200bTesting the difficulty to attack diversified instances <\/td>\n<\/tr>\n
16<\/td>\n5.2.4 \u200bTesting the difficulty to lift the code
5.2.5 \u200bTesting the difficulty to reverse-engineer the binary \/ obfuscation code
6 \u200bBest practices for WBC
6.1 \u200bGeneral
6.2 \u200bCore analyses
6.2.1 \u200bGeneral
6.2.2 \u200bCryptanalytic analysis of tables
6.2.3 \u200bSide-channel analysis on WBC <\/td>\n<\/tr>\n
17<\/td>\n6.2.4 \u200bFault injection analysis on WBC
6.2.5 \u200bEvaluation involving combined techniques
6.3 \u200bAnalysis aiming at circumventing access to the plain WBC protection
6.3.1 \u200bGeneral
6.3.2 \u200bReverse-engineering of the binary code
6.3.3 \u200bSpace hardness evaluation <\/td>\n<\/tr>\n
18<\/td>\nAnnex A (informative) Design of white-boxing-friendly cryptographic algorithms <\/td>\n<\/tr>\n
19<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection. Security techniques. Security properties and best practices for test and evaluation of white box cryptography<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n22<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":408633,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-408626","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/408626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/408633"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=408626"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=408626"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=408626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}