The present invention relates to secure data protection, more specifically to a method and system for chain transformation.
Secured software implementations often rely on transforms to protect data being processed by it. The transformations are used internal to the software application but also are applied to the external data interfaces. This means that other applications need to use the correct transform in order to send and receive data from the secured software implementation. A software transform generally is assumed to be an invertible function that converts the data into the transformed domain.
Secured software applications are assumed to operate under a so-called whitebox attack environment. This means that the attacker is assumed to have full control over the execution environment of the secured software application. This allows the attacker to observe and modify the data structures and the instruction sequences.
Digital Rights Management (DRM) clients are an example of such secured software implementations. The DRM client receives encrypted content and only decrypts the content according to usage rules that are encoded in licenses associated with the content. The license also may contain an encrypted version of a content encryption key (CEK) that is required to decrypt the protected content. The license processing in the DRM client is assumed to be secured.
The output of the decryption process requires further processing by a content decoder. In order to prevent an attacker from intercepting the input to the content decoder, a transform is generally applied to (parts of) the input(s) to the content decoder. If the transform is applied to the content stream, some secured software mechanisms are present in the content decoder application.
A wide range of transforms may be used to encode program variables. However, if the transform is too complex to allow a program to compute with the encoded data, then the program must remove the transform before making computations. This defeats the purpose of the transform. Commonly, transforms are very simple and are applied to individual bytes of program data. For example, a simple linear transform to represent a byte x as sx+b for constants s and b permits a program to perform certain computations without ever having to explicitly store the quantity x.
The input to the content decoder contains fields that are known to an attacker. Examples of known fields are header data. The problem with simple linear encodings is that fixed bytes (in a fixed position within a block) are always encoded to the same values. For example, if a linear encoding (sx+b) is applied to a block of data that always starts with two fixed bytes (0x00, Ox01), the encoded bytes would be (b, s+b). By monitoring the encoded bytes, an attacker starting with no knowledge of our encoding methods might eventually figure out (sx+b) encoding and learn to read the rest of the data in each block.
There is a need for a method and system for a transform that avoids the fixed-byte problem while keeping the transform simple enough that encoded data can still be computed on without having to remove the transform first.
It is an object of the invention to provide a method and system that obviates or mitigates at least one of the disadvantages of existing systems.
According to an aspect of the present disclosure there is provided a method for secure data protection, which includes: carrying out a transform on structured data comprising a fixed data field for implementing an application, the structured data having n segments, each having m bits, including: encoding each of the n segments subsequently to provide n coded segments, including: encoding each of the (n−1) segments depending on a previous segment value; and changing at least one of the n encodings to the n segments such that the fixed data field of a first structured data is encoded differently from the fixed data field of a second structured data, and the transformed first structure data and the transformed second structure data are further processed in the same operation for implementing the application.
According to a further aspect of the present disclosure there is provided a computer readable storage medium storing computer instructions capable, when executed, of causing a system having a processor to perform the method.
According to a further aspect of the present disclosure there is provided a system for secure data protection, which includes: a processor; at least one computer-readable storage medium storing computer instructions translatable by the processor to perform at least one of the method.
These and other features of the invention will become more apparent from the following description in which reference is made to the appended drawings wherein:
Embodiments of the present disclosure provide a chained transform method and system for transforming structured data having one or more fixed data fields such that the fixed data fields are not always encoded to the same values and the transformed data can still be computed on or transformed without removing the chained transform for implementing the application of the data. The fixed field is in a fixed position, which may be known to an attacker. One example of the fixed fields is header information. The structured data may be for example, but not limited to, video streams or RSA private keys. Applications that would use the chained transform to deal with the structured data include, for example, video stream encoding and loading dynamic RSA keys.
Referring to
The chained transform 10 shown in
In this example, the initialization vector is a byte value that is included at the beginning of the output that serves as the initial “previous coded byte”. The initialization vector changes the encoding to the second segment. With the initialization vector the first encoded byte would no longer be a special case (i.e., the first byte does not have a single fixed encoding). Any time a sub-field, such as bytes 4 to 8 (n=8), is read, bytes 4 to 8 can be computed by reading encoded bytes 3 to 8.
Referring to
In a non-limiting example, the last segment U[n] serves as the first segment U′ [1] that is xored with the random set of m bits. In a further non-limiting example, the uncoded segments are chained in reverse order (i.e., U[1]→U′[n], U[2]→>U′[n−1], . . . , U[n]>U′[1]) as shown in
It would be appreciated by one of ordinary skill in the art that any ordering is possible as long as it is known to a receiver which decodes the encoded outputs. The method for change of order is not limited by those of
In
It would be appreciated by one of ordinary skill in the art that the uncoded input may be divided into two or more than three byte segments, and the segment number n may vary. The chained transform modules 10 and 20 may include two or more than three encodings and XORs. The chained transform modules 10 and 20 may include components not illustrated in
For secure data protection, a mode, such as counter mode (CM), is less desirable since the encoding of a byte depends only on the byte's value and its position. This means that this byte will always be encoded in the same way, and thus an attacker with multiple blocks may be able to detect fixed fields. By contrast, the chained transform uses the initialization vector, chains the output bytes together in a different order, or a combination thereof. Thus the first encoded byte would no longer have a single fixed encoding. The first byte will not always give the same output value and therefore will not always make the same contribution to the encoding selection on the second byte.
Referring to
Referring to
Referring to
One example of the chained transform shown in
One example of the last set of tables for an AES operation with the chained transform is schematically illustrated in
The AES table that produces the first encoded output byte is unchanged. In a non-limiting example, the first table of the last set of tables may have an initialization vector as a set of z bits. In a further example, the first table of the last set of tables may have a single encoding without the initialization vector,
Referring to
The four encodings may be common to all 16 bytes or may be different for each byte. The selected encodings are, for example, bijections, which can be randomly selected. The inverse bijections will be implemented at the last stage of data processing (e.g., displaying a video at a receiver) to remove the bijections.
If there are constraints in the later processing, these encodings may be linear or affine mappings over GF(2̂8), concatenated 4 bit arbitrary bijections or a composition of these two. Other possibilities exist as well.
The chained transform may be implement by changing the order of the uncoded bytes. Chaining of bytes for selection of encoding may go in any order (e.g., in reverse order).
The chained transforms described above are applicable for obscuring data flows between secured modules that contain structured data, such as encoded content processed by Digital Rights Management (DRM) clients and content decoders. Examples of data flows between secured modules that contain structured data are disclosed in U.S. Pat. No. 7,350,085, U.S. Pat. No. 6,594,761, U.S. Pat. No. 6,842,862, and U.S. Pat. No. 7,966,499, which are incorporated herein by reference. The chained transformed data may be further computed on by operations disclosed in U.S. Pat. No. 7,350,085, U.S. Pat. No. 6,594,761, U.S. Pat. No. 6,842,862, amd U.S. Pat. No. 7,966,499.
In a non-limiting example, the chained transform may be used to protect compressed video that will be transferred from a sender to a receiver, such that capture of compressed video is prevented as shown in
In another non-limiting example, the chained transform may be used for dynamic RSA key loading where the RSA private key is updated in a white-box RSA implementation as shown in
In both cases of
It will be appreciated by one of ordinary skill in the art that each of the server 500 and the protected environment 530 in
The embodiments described herein may include one or more elements or components, not illustrated in the drawings. The embodiments may be described with the limited number of elements in a certain topology by way of example only. Each element may include a structure to perform certain operations. Each element may be implemented as hardware, software, or any combination thereof. The data structures and software codes, either in its entirety or a part thereof, may be stored in a computer readable medium, which may be any device or medium that can store code and/or data for use by a computer system. Further, a computer data signal representing the software code which may be embedded in a carrier wave may be transmitted via a communication network.
One or more currently preferred embodiments have been described by way of example. It will be apparent to persons skilled in the art that a number of variations and modifications can be made without departing from the scope of the invention as defined in the claims.
This application is the National Stage of International Patent Application No. PCT/CA2012/000251, filed Mar. 21, 2012, the disclosure of which is hereby incorporated by reference in its entirety.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CA2012/000251 | 3/21/2012 | WO | 00 | 11/24/2014 |