Abstract
With increasing reliance on new and interactive technologies, a challenge producers face is the requirement of a secure system to control users of their cooperative designs or applications to reap economic benefit. An authentication code is the series of letters and numbers, often disclosed after purchasing a product or service and that allows access for that user. This paper provides insight into the generation and verification of existing authentication codes and proposes a new scheme, which uses cryptography to embed mathematical structure within the codes to better protect cooperative applications. The proposed method uses a changing key based on a secret key and a random number, and symmetrical block cipher.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cullen, D.: Product Keys and Hashing (2010). https://bnetdocs.org/?op=doc&did=20
de Koning Gans, G., Verheul, E.R.: Best effort and practice activation codes. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 98–112. Springer, Heidelberg (2011)
Licenturion: Inside Windows Product Activation, Germany (2001). http://www.licenturion.com/xp/
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373–386 (1988)
Penton: Symmetric vs. Asymmetric Ciphers (2016). http://windowsitpro.com/security/symmetric-vs-asymmetric-ciphers
Quinstreet Enterprise: Symmetric-key Cryptography (2016). http://www.webopedia.com/TERM/S/symmetric_key_cryptography.html
Rouse, M.: Data Encryption Standard (DES) (2014). http://searchsecurity.techtarget.com/definition/Data-Encryption-Standard
SolidWorks Corporation: English EULA (2016). https://www.solidworks.com/sw/support/1090_ENU_HTML.htm
Staggs, B.: Implementing a Partial Serial Number Verification System in Delphi (2007). http://www.brandonstaggs.com/2007/07/26/implementing-a-partial-serial-number-verification-system-in-delphi/
Stinson, D.R.: Cryptography Theory and Practice. CRC Press Inc., Boca Raton (1995)
Tutorials Point: Feistel Block Cipher (2016). http://www.tutorialspoint.com/cryptography/feistel_block_cipher.htm
Acknowledgments
The first and third authors would like to thank the Faculty of Engineering and Information Sciences for the Start-Up Funding 231050500.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Li, M., Susilo, W., Tonien, J. (2016). Securing Shared Systems. In: Luo, Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2016. Lecture Notes in Computer Science(), vol 9929. Springer, Cham. https://doi.org/10.1007/978-3-319-46771-9_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-46771-9_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46770-2
Online ISBN: 978-3-319-46771-9
eBook Packages: Computer ScienceComputer Science (R0)