Skip to main content

Software Protection with Encryption and Verification

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 115))

Abstract

The software protection is the key technology for the shareware and it can delay and prevent the software reverse and cracking. There are many methods such as junk code, anti-debug, virtual machine, deformation, packers, encryption and verification. The software registration is the most important step of protection and it can be implemented by many forms such as network registration, license key or file, dongle. This paper introduces and compares these protection methods. Some architectures of protection based on encryption and verification are provided and they are realized by RSA encryption and many verification methods which include self verification and key data verification. The method use the exe file and DLL file to protect each other and use the license file to check and provide software function. The method uses the RSA in the license key file to register and it can make it difficult to create the key generator for the cracker.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jackson, J.: Introduciton Into Windows Anti-Debugging (2008), http://www.codeproject.com/KB/security/Intro_To_Win_Anti_Debug.aspx

  2. Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice Hall (2002)

    Google Scholar 

  3. RSA Cryptography Standard, http://www.rsa.com/rsalabs/node.asp?id=2125

  4. Data Encryption Standard (DES) (1999), http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

  5. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)

    Google Scholar 

  6. Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994)

    Google Scholar 

  7. Rivest, R.L.: The RC5 Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Heidelberg (1995)

    Google Scholar 

  8. Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: The RC6 Block Cipher, v1.1 (August 1998)

    Google Scholar 

  9. Rivest, R.: The MD5 Message-Digest Algorithm (1992), http://tools.ietf.org/html/rfc1321

  10. Secure Hash Standard (2002), http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wentao Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Liu, W. (2012). Software Protection with Encryption and Verification. In: Wu, Y. (eds) Software Engineering and Knowledge Engineering: Theory and Practice. Advances in Intelligent and Soft Computing, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25349-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25349-2_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25348-5

  • Online ISBN: 978-3-642-25349-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics