If an app processes encrypted content, it needs to use a key to decrypt incoming traffic and encrypt outgoing traffic. Encryption and decryption are managed by functions inside the code of the application. If an app’s code is reverse engineered, and the cipher keys are unprotected, the keys used to encrypt/decrypt content can be discovered and provide a bad actor what they need to decipher encrypted information. Data resident in the app can be compromised along with all incoming and outgoing communications the app uses to interact with back office systems.
Once cipher keys are uncovered, they can be copied, re-distributed, and used maliciously. Detecting misuse of compromised keys is nearly impossible since they will be used through seemingly legitimate traffic. Once compromised, remediating a key breach is time- and resource-intensive and will require re-keying and updating every app and process using those keys.
Unsecured cipher keys are a threat vector that must be remediated, since existing data protection methods were not designed to defend keys from being discovered via reverse engineering or compromised app code. White-Box Cryptography was introduced to make it possible to provide secure cryptographic implementations in apps where attackers can manipulate the code and data at will.
What is White-Box Cryptography
White-Box Cryptography is a way to get the same output for a given input as a normal cryptographic implementation, but the internals of how it is done are completely different from a standard crypto implementation. As a result, cipher keys are not revealed, leaving attackers confused. Maintaining the confidentiality of the key is how data remains secure.
How White-Box Cryptography works
White-Box Cryptography uses mathematical techniques and transformations to blend together app code and keys to secure cryptographic operations. This prevents those keys from being found or extracted from the app. The way each White-Box Cryptography implementation works is unique and generally confidential to the creator. Different white-box implementations include different protections against attacks, especially as new attacks against older white-box implementations are developed. White-box implementations can include protections against static analysis, runtime code modifications, timing attacks, and fault injection, among others.
Digital.ai Key & Data Protection
Digital.ai Key & Data Protection encrypts static and dynamic keys, as well as sensitive application data, by keeping the most critical elements out of sight and hardened against attackers. Digital.ai supports all major cryptographic algorithms and modes while requiring only a minimal code footprint to achieve optimal application performance.
How to hide sensitive datain plain sight
Download the White-Box Cryptography solution brief to learn how Digital.ai Key & Data Protection safeguards sensitive data.