Skip to main content

Securing Shared Systems

  • Conference paper
  • First Online:
Cooperative Design, Visualization, and Engineering (CDVE 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9929))

  • 1420 Accesses

Abstract

With increasing reliance on new and interactive technologies, a challenge producers face is the requirement of a secure system to control users of their cooperative designs or applications to reap economic benefit. An authentication code is the series of letters and numbers, often disclosed after purchasing a product or service and that allows access for that user. This paper provides insight into the generation and verification of existing authentication codes and proposes a new scheme, which uses cryptography to embed mathematical structure within the codes to better protect cooperative applications. The proposed method uses a changing key based on a secret key and a random number, and symmetrical block cipher.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cullen, D.: Product Keys and Hashing (2010). https://bnetdocs.org/?op=doc&did=20

  2. de Koning Gans, G., Verheul, E.R.: Best effort and practice activation codes. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 98–112. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  3. Licenturion: Inside Windows Product Activation, Germany (2001). http://www.licenturion.com/xp/

  4. Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373–386 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  5. Penton: Symmetric vs. Asymmetric Ciphers (2016). http://windowsitpro.com/security/symmetric-vs-asymmetric-ciphers

  6. Quinstreet Enterprise: Symmetric-key Cryptography (2016). http://www.webopedia.com/TERM/S/symmetric_key_cryptography.html

  7. Rouse, M.: Data Encryption Standard (DES) (2014). http://searchsecurity.techtarget.com/definition/Data-Encryption-Standard

  8. SolidWorks Corporation: English EULA (2016). https://www.solidworks.com/sw/support/1090_ENU_HTML.htm

  9. Staggs, B.: Implementing a Partial Serial Number Verification System in Delphi (2007). http://www.brandonstaggs.com/2007/07/26/implementing-a-partial-serial-number-verification-system-in-delphi/

  10. Stinson, D.R.: Cryptography Theory and Practice. CRC Press Inc., Boca Raton (1995)

    MATH  Google Scholar 

  11. Tutorials Point: Feistel Block Cipher (2016). http://www.tutorialspoint.com/cryptography/feistel_block_cipher.htm

Download references

Acknowledgments

The first and third authors would like to thank the Faculty of Engineering and Information Sciences for the Start-Up Funding 231050500.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mandy Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Li, M., Susilo, W., Tonien, J. (2016). Securing Shared Systems. In: Luo, Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2016. Lecture Notes in Computer Science(), vol 9929. Springer, Cham. https://doi.org/10.1007/978-3-319-46771-9_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46771-9_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46770-2

  • Online ISBN: 978-3-319-46771-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics