{"entities":{"Q1789910":{"pageid":1800652,"ns":120,"title":"Item:Q1789910","lastrevid":73865298,"modified":"2026-04-14T17:32:48Z","type":"item","id":"Q1789910","labels":{"en":{"language":"en","value":"A secure implementation of a symmetric encryption algorithm in white-box attack contexts"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 6950672"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1789910$F3BF0003-ADD1-4905-931B-C864CC8E7301","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"eeba77fb903a2c7e32109dc45fe09e2b424dfff6","datavalue":{"value":{"text":"A secure implementation of a symmetric encryption algorithm in white-box attack contexts","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1789910$84194A03-572D-4233-8DDD-7E31AE22F67D","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"83b77812a2ecab2decdd3ff822be8d35c44e2c61","datavalue":{"value":"1397.68063","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1789910$821D1232-4663-4445-AC10-13A18F9DE8EC","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"57afde68404c68d67d8f84762002cec22c26cd1e","datavalue":{"value":"10.1155/2013/431794","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1789910$40FA7D96-D6C4-4015-978F-2B625C164E0D","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"31433671c1c6c1f72e9da64bf1c6dc72b59066f3","datavalue":{"value":{"entity-type":"item","numeric-id":273927,"id":"Q273927"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1789910$6D41197E-23CA-447A-A323-2A1C1DF488C5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"13a186f7b519c5f072546b8dfb79998845c943d6","datavalue":{"value":{"entity-type":"item","numeric-id":455978,"id":"Q455978"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1789910$FC1801AA-C00A-4D49-A653-E3CF2077EC0E","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"ba2c34fde4f5372e26f3959ec43f9d9579e5d9a8","datavalue":{"value":{"entity-type":"item","numeric-id":1626228,"id":"Q1626228"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1789910$F394F136-C9AE-477E-848D-22D1854DE50A","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"bb299feb2b87699ac8beef494c52fd2765eaf609","datavalue":{"value":{"entity-type":"item","numeric-id":118601,"id":"Q118601"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1789910$F88DD8D9-EC47-48AF-840C-28DA76FC33BA","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"9a9a21eafa993b72759052108b216b22ca406dd9","datavalue":{"value":{"time":"+2018-10-10T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1789910$A0B27904-E219-42F3-91B6-5E0E3A297EBF","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"06d8464d556ee2ce9a4ae35b543546acfcf700e6","datavalue":{"value":"Summary: In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed. The general approach is to merge several steps of the round function of SHARK into table lookups, blended by randomly generated mixing bijections. We prove the soundness of the implementation of the algorithm and analyze its security and efficiency. The implementation can be used in web hosts, digital right management devices, and mobile devices such as tablets and smart phones. We explain how the design approach can be adapted to other symmetric encryption algorithms with a slight modification.","type":"string"},"datatype":"string"},"type":"statement","id":"Q1789910$351F07EB-BF43-495C-B46E-5195107F33B9","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1789910$C5A14E27-D53E-453F-8D5C-65548058F376","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"d567344957461ef0a842df5654ddc86e757dc34f","datavalue":{"value":"6950672","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1789910$0E7BB273-CEC3-4225-9363-3DE1A7235D23","rank":"normal"}],"P12":[{"mainsnak":{"snaktype":"value","property":"P12","hash":"a8d3a964d49076063bd8a989924674f4a90f8e47","datavalue":{"value":"Q59005968","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1789910$283840B8-8810-4424-B560-0134F10902F5","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1789910$27D5C096-7434-4407-A5ED-FDE99B480E93","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"2683399202d940fdd342639baf5647ca45461a1a","datavalue":{"value":"https://doi.org/10.1155/2013/431794","type":"string"},"datatype":"url"},"type":"statement","id":"Q1789910$7C10A327-8E55-47BD-8E92-7A0F00BB216E","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"fcd211b21c592830738be2a8049869147291858e","datavalue":{"value":"W2152816118","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1789910$E9E28834-F524-4A1F-B437-8F5F6ED8EA01","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"396d8595078758075fa7002f3d2ed3be0721ce82","datavalue":{"value":{"entity-type":"item","numeric-id":1799264,"id":"Q1799264"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"721b0b3a206e3ca72892bf6cef2f53bc4c6a0333","datavalue":{"value":{"amount":"+0.8640769124031067","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q1789910$AEA10C50-F60E-4ACF-9DE9-DFFCC2B2602A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"ca79635d9a36f5cffd1b30c79a4fdfca074dd0d7","datavalue":{"value":{"entity-type":"item","numeric-id":1710604,"id":"Q1710604"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"3f80f35829d046b9b341d9f107d45b86154ce20a","datavalue":{"value":{"amount":"+0.8077327609062195","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q1789910$E15427D1-3375-43F4-AD79-900912606732","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"5636e1ec1bc19dc77cc121a478828d2315465c73","datavalue":{"value":{"entity-type":"item","numeric-id":4413867,"id":"Q4413867"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"1c681a94f314d5ee47a83bc08e63772a94eeb444","datavalue":{"value":{"amount":"+0.7999144792556763","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q1789910$88B58437-7D5A-462C-88C4-298230029420","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"c8c16ff7a747ef63244dbc368e0499eb83615c59","datavalue":{"value":{"entity-type":"item","numeric-id":5491752,"id":"Q5491752"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"d319107d82f848beb38cbc07d1f1cec8afb42bc8","datavalue":{"value":{"amount":"+0.7946866154670715","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q1789910$A716EB8A-0A41-4265-9CA9-CE3A1DCE0308","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"4380de094cd0ecc7d516af4e9803ecddd5dd0054","datavalue":{"value":{"entity-type":"item","numeric-id":2949532,"id":"Q2949532"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"2fde5cb45d41b6c13612286de73e6cc70ac49c06","datavalue":{"value":{"amount":"+0.793973445892334","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q1789910$8DAF658B-7715-4166-AC92-CD0CE15E064F","rank":"normal"}],"P163":[{"mainsnak":{"snaktype":"value","property":"P163","hash":"45fcd4163b5f33e6e8c784f5522d7246c0a1a61e","datavalue":{"value":{"entity-type":"item","numeric-id":57056,"id":"Q57056"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1789910$CCE643B5-B07E-40AD-B6A0-D5F5C392F603","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"A secure implementation of a symmetric encryption algorithm in white-box attack contexts","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/A_secure_implementation_of_a_symmetric_encryption_algorithm_in_white-box_attack_contexts"}}}}}