Obfuscating an ID

前端 未结 11 491
逝去的感伤
逝去的感伤 2020-11-28 02:20

I\'m looking for a way to encrypt/obfuscate an integer ID into another integer. More precisely, I need a function int F(int x), so that

  • x<->F(x
相关标签:
11条回答
  • 2020-11-28 02:59

    Obfuscation is not really sufficient in terms of security.

    However, if you are trying to thwart the casual onlooker, I'd recommend a combination of two methods:

    • A private key that you combine with the id by xor'ing them together
    • Rotating the bits by a certain amount both before and after the key has been applied

    Here is an example (using pseudo code):

      def F(x)
        x = x XOR 31415927       # XOR x with a secret key
        x = rotl(x, 5)           # rotate the bits left 5 times
        x = x XOR 31415927       # XOR x with a secret key again
        x = rotr(x, 5)           # rotate the bits right 5 times
        x = x XOR 31415927       # XOR x with a secret key again
        return x                 # return the value
      end
    

    I haven't tested it, but I think this is reversible, should be fast, and not too easy to tease out the method.

    0 讨论(0)
  • 2020-11-28 02:59

    What you're describing here seems to be the opposite of a one-way function: it's easy to invert but super difficult to apply. One option would be to use a standard, off-the-shelf public-key encryption algorithm where you fix a (secret, randomly-chosen) public key that you keep a secret and a private key that you share with the world. That way, your function F(x) would be the encryption of x using the public key. You could then easily decrypt F(x) back to x by using the private decryption key. Notice that the roles of the public and private key are reversed here - you give out the private key to everyone so that they can decrypt the function, but keep the public key secret on your server. That way:

    1. The function is a bijection, so it's invertible.
    2. Given F(x), x is efficiently computable.
    3. Given x and F(x), it is extremely difficult to compute F(y) from y, since without the public key (assuming you use a cryptographically strong encryption scheme) there is no feasible way to encrypt the data, even if the private decryption key is known.

    This has many advantages. First, you can rest assured that the crypto system is safe, since if you use a well-established algorithm like RSA then you don't need to worry about accidental insecurity. Second, there are already libraries out there to do this, so you don't need to code much up and can be immune to side-channel attacks. Finally, you can make it possible for anyone to go and invert F(x) without anyone actually being able to compute F(x).

    One detail- you should definitely not just be using the standard int type here. Even with 64-bit integers, there are so few combinations possible that an attacker could just brute-force try inverting everything until they find the encryption F(y) for some y even if they don't have the key. I would suggest using something like a 512-bit value, since even a science fiction attack would not be able to brute-force this.

    Hope this helps!

    0 讨论(0)
  • 2020-11-28 03:00

    Obfuscate it with some combination of 2 or 3 simple methods:

    • XOR
    • shuffle individual bits
    • convert to modular representation (D.Knuth, Vol. 2, Chapter 4.3.2)
    • choose 32 (or 64) overlapping subsets of bits and XOR bits in each subset (parity bits of subsets)
    • represent it in variable-length numberic system and shuffle digits
    • choose a pair of odd integers x and y that are multiplicative inverses of each other (modulo 232), then multiply by x to obfuscate and multiply by y to restore, all multiplications are modulo 232 (source: "A practical use of multiplicative inverses" by Eric Lippert)

    Variable-length numberic system method does not obey your "progression" requirement on its own. It always produces short arithmetic progressions. But when combined with some other method, it gives good results.

    The same is true for the modular representation method.

    Here is C++ code example for 3 of these methods. Shuffle bits example may use some different masks and distances to be more unpredictable. Other 2 examples are good for small numbers (just to give the idea). They should be extended to obfuscate all integer values properly.

    // *** Numberic system base: (4, 3, 5) -> (5, 3, 4)
    // In real life all the bases multiplied should be near 2^32
    unsigned y = x/15 + ((x/5)%3)*4 + (x%5)*12; // obfuscate
    unsigned z = y/12 + ((y/4)%3)*5 + (y%4)*15; // restore
    
    // *** Shuffle bits (method used here is described in D.Knuth's vol.4a chapter 7.1.3)
    const unsigned mask1 = 0x00550055; const unsigned d1 = 7;
    const unsigned mask2 = 0x0000cccc; const unsigned d2 = 14;
    
    // Obfuscate
    unsigned t = (x ^ (x >> d1)) & mask1;
    unsigned u = x ^ t ^ (t << d1);
    t = (u ^ (u  >> d2)) & mask2;
    y = u ^ t ^ (t << d2);
    
    // Restore
    t = (y ^ (y >> d2)) & mask2;
    u = y ^ t ^ (t << d2);
    t = (u ^ (u >> d1)) & mask1;
    z = u ^ t ^ (t << d1);
    
    // *** Subset parity
    t = (x ^ (x >> 1)) & 0x44444444;
    u = (x ^ (x << 2)) & 0xcccccccc;
    y = ((x & 0x88888888) >> 3) | (t >> 1) | u; // obfuscate
    
    t = ((y & 0x11111111) << 3) | (((y & 0x11111111) << 2) ^ ((y & 0x22222222) << 1));
    z = t | ((t >> 2) ^ ((y >> 2) & 0x33333333)); // restore
    
    0 讨论(0)
  • 2020-11-28 03:01

    I wrote an article on secure permutations with block ciphers, which ought to fulfil your requirements as stated.

    I'd suggest, though, that if you want hard to guess identifiers, you should just use them in the first place: generate UUIDs, and use those as the primary key for your records in the first place - there's no need to be able to convert to and from a 'real' ID.

    0 讨论(0)
  • 2020-11-28 03:05

    If xor is acceptable for everything but inferring F(y) given x and F(x) then I think you can do that with a salt. First choose a secret one-way function. For example S(s) = MD5(secret ^ s). Then F(x) = (s, S(s) ^ x) where s is chosen randomly. I wrote that as a tuple but you can combine the two parts into an integer, e.g. F(x) = 10000 * s + S(s) ^ x. The decryption extracts the salt s again and uses F'(F(x)) = S(extract s) ^ (extract S(s)^x). Given x and F(x) you can see s (though it is slightly obfuscated) and you can infer S(s) but for some other user y with a different random salt t the user knowing F(x) can't find S(t).

    0 讨论(0)
提交回复
热议问题