Questions tagged [obfuscation]

Obfuscation is the process by which the code is altered so that a developer finds it much harder to understand clearly what the intended program does or how it operates. The larger the program the greater the obfuscation, as code becomes intertwined linking different segments through out the program.

While it may be possible to use a disassembler to figure out how certain aspects within a program function, it requires knowledge of assembly. Assembly language by its nature is non-trivial.

Another way to increase obfuscation is to use packers.

26 questions
10
votes
1 answer

How inefficient are current Indistinguishability Obfuscation (IO) candidates?

Since last year, IO finally seems to be within our reach. Several papers (https://eprint.iacr.org/2020/1003, https://eprint.iacr.org/2020/1024 and https://eprint.iacr.org/2020/1042) proved the existence of IO based on almost-standard…
CryptoPerson
  • 121
  • 4
6
votes
1 answer

Rewarding the finding of zeroes of a hash function

I've been thinking about the following problem and haven't yet found a solution. We have an arbitrary and public hash function $\text{Hash}$. Could I possibly publish a function $F$ (that is, publish an algorithm that returns $F(M)$ given $M$) such…
aleph2
  • 173
  • 5
5
votes
1 answer

Virtual Black Box Obfuscator

For which class of circuits does the Virtual black box(VBB) obfuscator exists? If so Why? What are the attempts/further developments made in this topic?
Crypto_Research
  • 719
  • 3
  • 10
4
votes
1 answer

How to explain indistinguishability obfuscation (iO) to my grandmother?

At the risk of oversimplification, how do I explain indistinguishability obfuscation (iO) to my grandmother?
Nathan Aw
  • 2,357
  • 3
  • 18
  • 22
4
votes
2 answers

What is Black-Box Obfuscation?

I understand black-box obfuscation at some intuitive level as- "an adversary can learn nothing more from an obfuscated program/circuit/function than he or she can from a black-box access to the same program/circuit/function." But I am failing at…
DaveIdito
  • 143
  • 3
4
votes
1 answer

Quantum-secure obfuscation

My question is a follow-up to a recent question regarding quantum-secure time-lock puzzles (TLPs). TLPs can be built (in principle) from indistinguishability obfuscation (iO) [BGJ+,BGL+] as noted in this thread. As a corollary, quantum-secure iO…
ckamath
  • 5,488
  • 2
  • 25
  • 42
4
votes
2 answers

Randomized encodings and Indistinguishability obfuscation

I want to understand the difference between randomized encodings and indistinguishability obfuscation (iO). Are randomized encodings a special type of iO?
BlackHat18
  • 397
  • 1
  • 9
3
votes
2 answers

Is there still a place for obfuscation (secret algorithms) in encryption?

As far as I know, the Second World War was won on codes that used obfuscation, not open source. These were also used during the cold war. For general use (not large companies with hundreds of employees who may or not be trustworthy) surely basic…
Zonnkq Shad
  • 137
  • 1
  • 7
2
votes
1 answer

About obfuscating re-encryption: the first construction is not a obfuscator

An intuitive understanding of obfuscated re-encryption: A third party with a re-encryption program learns no more from the re- encryption program than from interaction with a black-box oracle that provides the same functionality. I'm reading this…
Haotian Yin
  • 174
  • 8
2
votes
0 answers

Indistinguishability Obfuscation for state machines?

As far as I know, iO can "hide" programs written as boolean circuits, but I'm interested in understanding if state machines can be hidden as well. I know state changes can be modelled as boolean circuits by means of Karnaugh maps, however what I'm…
2
votes
1 answer

Is there any bijective obfuscation scheme which maintains a byte order (e.g. sorted) or does so after not too many trials? (for 128bit = 16 byte)

We have given 16 bytes and apply some order to them. For example sorting them by their absolute value. We want to obfuscate them as best as possible while maintaining their order. That means if we apply the order function after the obfuscation…
J. Doe
  • 463
  • 4
  • 15
2
votes
0 answers

Homomorphic encryption and program obfuscation

[Say I want to outsource the computation of $y=f(x)$ without revealing information about $x$, $y$, or $f$. I thought I'd have to combine homomorphic encryption with some obfuscation $\mathcal{O}$, passing along encrypted data $\mathsf{enc}(x)$ and…
yoyo
  • 480
  • 2
  • 12
1
vote
1 answer

What's the difference between VBB and iO?

What's the difference between the definitions of virtual black-box (VBB) obfuscation and indistinguishability obfuscation (iO)? Is there any presentation describing both? Furthermore, why is the notion of iO interesting (and sufficient in practical…
user4936
1
vote
0 answers

Distributional Virtual Black Box security

Can anyone clearly explain the difference between these two notions of obfuscation security: VBB security and D-VBB Security. VBB Security: An obfuscated program is no better than just a black box access to the program D-VBB Security : Let $D =…
Vshi
  • 31
  • 2
1
vote
0 answers

Cryptographic Code Anonymization

I've been reading a lot about techniques related to stylometry whereby programmers can be de-anonymized by analyzing their source code. Resisting deanonymization seems like a multifaceted problem. From variable renaming, space generation etc... to…
1
2