Prikladnaya Diskretnaya Matematika. Supplement
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika. Supplement, 2016, Issue 9, Pages 89–91
DOI: https://doi.org/10.17223/2226308X/9/34
(Mi pdma275)
 

Mathematical Foundations of Computer Security

HMAC obfuscation method for implementation in untrusted systems

D. N. Kolegovab, O. V. Broslavskya, N. E. Oleksova

a Tomsk State University, Tomsk
b "Positive Technologies", Tomsk
References:
Abstract: We propose an obfuscation method for using hash-based message authentication codes (MAC) in untrusted systems. Our method is implemented for MAC in a form $H(k,x)=h(k,p_1,h(k,p_2,x))$. The main idea is to use inner states of a hash function $h$. We calculate both $h$ intermediate values in a such way that all key related blocks are already reduced by the hash compression function. That values are $h(epad(k,p_1))$ and $h(epad(k,p_2))$, where $epad$ is a key padding algorithm. Then we use them in functions $h_1$ and $h_2$, which calculate $h$ with the initial block equalled $h(epad(k,p_1))$ and $h(epad(k,p_2))$ respectively. So, accordingly to the following equation, these new functions implement original MAC algorithm: $H(k,x)=h(k,p_1,h(k, p_2, x))=h_1(h_2(x))$.
Keywords: white-box cryptography, message authentication codes, HMAC, obfuscation, web application security.
Document Type: Article
UDC: 004.94
Language: Russian
Citation: D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov, “HMAC obfuscation method for implementation in untrusted systems”, Prikl. Diskr. Mat. Suppl., 2016, no. 9, 89–91
Citation in format AMSBIB
\Bibitem{KolBroOle16}
\by D.~N.~Kolegov, O.~V.~Broslavsky, N.~E.~Oleksov
\paper HMAC obfuscation method for implementation in untrusted systems
\jour Prikl. Diskr. Mat. Suppl.
\yr 2016
\issue 9
\pages 89--91
\mathnet{http://mi.mathnet.ru/pdma275}
\crossref{https://doi.org/10.17223/2226308X/9/34}
Linking options:
  • https://www.mathnet.ru/eng/pdma275
  • https://www.mathnet.ru/eng/pdma/y2016/i9/p89
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Prikladnaya Diskretnaya Matematika. Supplement
    Statistics & downloads:
    Abstract page:404
    Full-text PDF :128
    References:50
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024