Abstract
The software protection is the key technology for the shareware and it can delay and prevent the software reverse and cracking. There are many methods such as junk code, anti-debug, virtual machine, deformation, packers, encryption and verification. The software registration is the most important step of protection and it can be implemented by many forms such as network registration, license key or file, dongle. This paper introduces and compares these protection methods. Some architectures of protection based on encryption and verification are provided and they are realized by RSA encryption and many verification methods which include self verification and key data verification. The method use the exe file and DLL file to protect each other and use the license file to check and provide software function. The method uses the RSA in the license key file to register and it can make it difficult to create the key generator for the cracker.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jackson, J.: Introduciton Into Windows Anti-Debugging (2008), http://www.codeproject.com/KB/security/Intro_To_Win_Anti_Debug.aspx
Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice Hall (2002)
RSA Cryptography Standard, http://www.rsa.com/rsalabs/node.asp?id=2125
Data Encryption Standard (DES) (1999), http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)
Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994)
Rivest, R.L.: The RC5 Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Heidelberg (1995)
Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: The RC6 Block Cipher, v1.1 (August 1998)
Rivest, R.: The MD5 Message-Digest Algorithm (1992), http://tools.ietf.org/html/rfc1321
Secure Hash Standard (2002), http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Liu, W. (2012). Software Protection with Encryption and Verification. In: Wu, Y. (eds) Software Engineering and Knowledge Engineering: Theory and Practice. Advances in Intelligent and Soft Computing, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25349-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-25349-2_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25348-5
Online ISBN: 978-3-642-25349-2
eBook Packages: EngineeringEngineering (R0)