RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2016 Issue 9, Pages 89–91 (Mi pdma275)

Mathematical Foundations of Computer Security

HMAC obfuscation method for implementation in untrusted systems

D. N. Kolegovab, O. V. Broslavskya, N. E. Oleksova

a Tomsk State University, Tomsk
b "Positive Technologies", Tomsk

Abstract: We propose an obfuscation method for using hash-based message authentication codes (MAC) in untrusted systems. Our method is implemented for MAC in a form $H(k,x)=h(k,p_1,h(k,p_2,x))$. The main idea is to use inner states of a hash function $h$. We calculate both $h$ intermediate values in a such way that all key related blocks are already reduced by the hash compression function. That values are $h(epad(k,p_1))$ and $h(epad(k,p_2))$, where $epad$ is a key padding algorithm. Then we use them in functions $h_1$ and $h_2$, which calculate $h$ with the initial block equalled $h(epad(k,p_1))$ and $h(epad(k,p_2))$ respectively. So, accordingly to the following equation, these new functions implement original MAC algorithm: $H(k,x)=h(k,p_1,h(k, p_2, x))=h_1(h_2(x))$.

Keywords: white-box cryptography, message authentication codes, HMAC, obfuscation, web application security.

UDC: 004.94

DOI: 10.17223/2226308X/9/34



© Steklov Math. Inst. of RAS, 2024