Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

What is the point of encrypting anything in Android (or Java) if source code can be reverse engineered?

Android and Java provide a crypto API that is relatively easy to use for crypto non-experts.

But since we know that no code can really be protected from reverse engineering, especially string constants used as seeds or shared secrets, I am wondering: What is the point of going through the ordeal of encrypting and decrypting in Android applications?

Am I missing something?

Trying to make my question clearer and more concrete: Suppose I have an application in which certain strings used by the code and in the code (i.e. not user data) need to be secret: One approach is to store them in encrypted form in the compiled .apk and decrypt them (using an obfuscated hard-coded password) at runtime. Another approach would be to store them in encrypted form in a remote server, fetch them (over the Internet) and decrypt (using a shared password) them at runtime.

I don't see much difference between the two, since both require the "secret key" being present in the (reverse-engineer-able) code.

Is there a solution to this problem?

If there isn't a solution, why encrypt at all?

like image 777
ateiob Avatar asked Aug 18 '11 20:08

ateiob


People also ask

What is used to prevent reverse engineering?

It is advisable to secure the user credentials to avoid reverse engineering of the application. The frequency of seeking user credentials in the mobile application should be less. This will allow the apps to avoid phishing attacks, more likely to be unsuccessful. It is advisable to use an authorization token.

What is the use of encryption in Android phone?

Encryption stores your data in a form that can be read only when your phone or tablet is unlocked. Unlocking your encrypted device decrypts your data. Encryption can add protection in case your device is stolen.

What is reverse engineering in Android?

Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon.


2 Answers

This is not strictly a problem with Android or Java. Anything can be reversed, it's just harder if it's native code. And bear in mind that they don't even have to reverse it: you have to eventually decrypt the data on memory to manipulate it. At this point, the attacker can just take a memory dump and they will get your data. If they have physical access to the device, and you are manipulating the data in software, there is really nothing you can do to stop them. The solution for this is to use a dedicated hardware module (HSM) that is tamper-resistant or at least tamper-evident (if some one messes with it, it either deletes all data or at least keeps some logs of the event). Those come in different shapes and sizes ranging from smart cards to network connected devices that cost a lot. Currently not available for Android, but maybe it will get something similar to a TPM, so you can store your keys securely and do crypto operations in hardware.

So consider just how secret your data needs to be and decide on an adequate protection level.

You might want to have it downloaded it over SSL (that would protect it in transit), making sure you authenticate both the server (so you know you re getting the right data from a trusted place) and the client (so you can be sure you are only giving the data to the right person). You can use SSL client authentication for this, and it will be much more secure than any custom encryption/key exchange scheme you (or anyone who is not a cryptography expert) might come with.

like image 95
Nikolay Elenkov Avatar answered Sep 21 '22 16:09

Nikolay Elenkov


The shared secret in the crypto API is not something that you would store in the app (as you say, that would be vulnerable to reverse-engineering -- though perhaps not as vulnerable as you would expect; obfuscation is pretty easy).

Imagine instead you wanted to create/read encrypted files on your phone (for your secret grocery list).

After creating one, you save it using a master password (that is immediately discarded by the program). Then when you want to read it, you have to re-enter your master password. That's the shared secret the API refers to, and it is completely tangential to reverse-engineering.

like image 38
Alex Churchill Avatar answered Sep 22 '22 16:09

Alex Churchill