Five ways to change the Internet of Things with white box cryptography

April 01, 2021

The Internet of Things is leading the third revolution in the information industry. On the one hand, it shows the explosive development of the industry's full coverage. On the other hand, it is too deep into people's lives. Security issues are very worrying for users and manufacturers. The development of the Internet of Things is affected. Obstruction. Network information security has been developing for many years. What kind of security does the Internet of Things need now?

From the large architecture, the Internet of Things can be divided into the sensing layer, the network layer and the application layer. It is a complex integrated network consisting of Wi-Fi, Bluetooth, ZigBee, 4G LTE, etc., and is connected from the cloud. Apply control with the App to provide the correct service.

In the composition of the Internet of Things, the network layer contains a large number of network devices, involving various communication protocols, and the computing infrastructure involves cloud computing, storage, application scheduling, etc. These aspects of security risks and security protection measures have experienced the Internet and mobile After the development of the Internet, there has been a certain degree of security research, and there are corresponding security architectures and numerous security products.

However, at the level of IoT perception, embedded system development has always been a low-key and independent field. There is less integration with the Internet. It does not touch or understand the sinister risks and risks of cyberspace, and there are fewer security measures for development. On the other hand, due to various limitations of the hardware and software resources of the embedded system, the security measures of the original Internet are also difficult to directly transplant to the sensing layer.

Corresponding to the lack of security protection of the perception layer, the perception layer becomes a new attack and risk point as the extension of the original network, and the harm from the attack is rising. How to implement safe and effective protection measures on a large number of sensing devices, white box cryptography technology has risen and received more and more attention. White-box cryptography subverts the limitations of traditional cryptography on the capabilities of attackers and is more in line with real-life security threats.

How does white-box cryptography create a safer Internet of Things and promote the rapid development of the Internet of Things? Let's take a look at the five ways in which white-box cryptography changes the Internet of Things:

1, greatly improve security

System security, data access, and information communication for IoT-aware devices often require cryptographic protection. However, the sensing device is usually in an environment where a white-box attack occurs. The traditional cryptographic algorithm cannot be used safely in a white-box attack environment, or even extremely vulnerable. The key becomes a single point of failure for implementing a protection system using cryptography. In the current attack method, it is easy to obtain the password by combining the control of the running environment with the control of the CPU breakpoint, the observation register, the memory analysis, etc. through the disassembly and static analysis of the binary file. In the existing case, we saw that in unprotected software, key extraction attacks can usually successfully extract the key code stored in a text data array within a few hours.

The white-box cryptographic algorithm is a new cryptographic algorithm that differs from traditional cryptographic algorithms in that it is resistant to attacks in white-box attacks. The white-box password makes the key information fully hidden and prevents snooping, thus ensuring the secure application of the original cryptosystem in the sensing device, which greatly improves security.

2, significantly reduce costs

As the outbreak of emerging markets, the Internet of Things has transformed and broken the global downturn economy. However, the Internet of Things is more of a cost-sensitive consumer market, such as wearable devices, smart homes, medical health, and smart transportation. For example, we have already seen the tragic price war in the embedded Wi-Fi chip market. The price of the traditional Wi-Fi solution exceeded 40 yuan. In early 2014, it fell to around 30 yuan. In mid-2014, the price fell to around 20 yuan, and later retreated. Only 10 yuan up and down. It is expected that the competition will further heat up in 2016.

Protection-aware device security and protection key security also have corresponding hardware solutions. However, in this competitive situation, the hardware solution will inevitably increase the cost burden of the manufacturer, and even lead to the neglect of security problems due to cost. The white box password is a software solution, and the corresponding hardware solution naturally has the advantage of low cost.

3, software defined security

When Gartner released the top ten technologies and trends of strategic significance in 2014, it first proposed the strategic technology of Software Defined Anything - this is not a concept, but a real technological evolution.

White-box cryptography as a software-defined security has entered the lower-level base of chip security. Compared with hardware to provide security, white-box cryptography technology uses confusing technology and various mathematical theories to continuously make breakthroughs and research, and there is still much room for development in the future. At the same time, new types of attacks against IoT devices are emerging, and white-box passwords can be used as software. More flexible dynamic response, other security measures can be integrated, and upgrades are more convenient and faster.

4, a more purely trusted relationship

Mobile payment as a financial sector application represents a higher level of security. Researching Mobile Payment Security We have found that hardware SE and TEE are often used to store and execute more sensitive data and processes to ensure security. However, few people think that SE and TEE need to be managed as security components, such as TSM platform, and platform administrators may be third-party, chip vendors, mobile phone manufacturers, etc.; and SDKs provided by TEE development are often The three parties provide; as well as the security components they are shared, the above generally run a number of financial institutions procedures, of course, there is a security isolation mechanism. But from this we still feel too many participants in an application, too long and complex trust relationship.

The white-box password application does not require the participation of various providers, and can be used exclusively by one application. The data and security can be better controlled by the application developer. The current HCE cloud payment adopts a white-box protection scheme. White-box cryptography has built a simpler, more purely trusted relationship both administratively and technically.

5. Accelerate the development of the Internet of Things

The development of the Internet of Things is like a sci-fi movie that is being staged, beyond the daily thinking of people, in addition to constantly facing surprises and even learning to live. The Internet of Things covers many fields in life, such as car, home, medical, finance, energy, transportation, industrial production, etc., and each area of ​​technology implementation involves the three-tier architecture of the Internet of Things, involving specific sensing devices. Mobile APP, cloud, communication and other implementation and security.

As an emerging security application technology, white-box password can be widely applied in various industry fields and applied at various technical implementation levels. For example, HCE cloud payment, car networking, security protection of keys and sensitive data at the endpoint (mobile terminal, vehicle terminal) level; in cloud computing, white box password can be used for software on the cloud to ensure sharing in the cloud On the resource pool, information that the user needs to keep secret when performing encryption and decryption operations will not be leaked.

We make 7.4v 2000mah to 20Ah Li Ion Battery Pack for heated clothing all types, including heated glove, heated jacket, heated coat, heated vest, heated shirt, electric heated jacket, heated pants, heated boots, heated gloves, heated underwear, heated jacket liners, heated glove liners, heated work glove, heating vest, heating clothing, heated motorcycle jacket, heated hunting jacket.

most popular model is 7.4v 2 cells battery, typical capacity 2200-2400mah, 2500-2600mah, 2900-3000mah, 3200-3400mah. 

7v heated clothing battery

7v Heated Glove Battery

7V Heated Glove Battery,Heated Gloves Battery,Hand Warmers Battery,Warmest Gloves Battery

Asarke Industry Co., Limited , https://www.asarke-industry.com