When it comes to securing your confidential data, encryption is universally acknowledged as a requirement, but it’s not a silver bullet for security. The Achilles Heel for encryption is the cryptographic key. Attackers are searching for these cryptographic keys as they permit access to the encrypted data. Basically, if you get the key, you get the data.
Most organizations are vulnerable to key theft attacks for two reasons:
In fact, key management is a growing and difficult-to-solve cybersecurity concern in many enterprises, according to a report from the Ponemon Institute. In 2020, 69% of enterprises were concerned about the management of encryption keys — up from 67% the year before. More than a quarter of the businesses surveyed listed key management and storage as a major challenge in their data encryption strategy with more than half saying that key management is “very painful.”
White-box cryptography is a very strong software-only approach for protecting cryptographic keys in hostile environments. A straightforward and powerful single C library, it can be included in mobile, desktop, cloud, and embedded system use cases.
White-box cryptography transforms cryptographic keys used in general-purpose software implementations. That means that even if an attacker gains control of a device and your app’s execution environment, they won’t be able to see your keys or encrypted data, even if the device is rooted or jailbroken.
While each vendor implements white-box cryptography differently, the central principle is the same: white-box cryptography combines methods of encryption and obfuscation to embed cryptographic keys and ciphers within application code so that both code and the encryption keys look indistinguishable to an attacker. This prevents those keys from being found or extracted from the app. White-box cryptography is designed to protect cryptographic keys and cryptographic operations in hostile environments, by design it assumes the attacker has full control of the system and it assumes it is being directly attacked at all times.
Most organizations can benefit from white-box cryptography, especially in the following scenarios:
The secure management of cryptographic keys is a crucial piece of encryption and overall data security strategy. So whether your cryptographic keys are stored in your mobile apps or somewhere in your backend, white-box cryptography should be used to protect your keys.
Zimperium’s zKeyBox provides white-box cryptography to protect against key theft attacks. The cryptographic keys are never revealed in plaintext; not on disk, not in memory, not in transit, not even during the execution of cryptographic operations. This makes it extremely difficult for attackers to locate, modify, or extract keys. zKeyBox also allows you to hold your own key; your application may be running on a multi-tenant public cloud, but your keys will be protected from attackers who want to compromise you through your third parties.
With Zimperium’s white-box cryptography, app development teams can enact proven strong, hardware-agnostic key protection that guards your keys against key extraction attacks and the vulnerabilities posed by unsupported hardware and compromised devices. Contact us for a personalized demo to learn more about how Zimperium secures cryptographic keys.