Software encryption and decryption method and encryption and decryption device
A software and decapsulation technology, applied in secure communication devices, computer security devices, electrical components, etc., can solve problems such as the loss of software owners, and achieve the effect of improving security and strengthening protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] Hereinafter, the present invention will be described in detail in conjunction with the accompanying drawings.
[0037]The present invention uses the threshold key theory to further protect the first key, and splices the threshold key factor into the encrypted software, so that the cracker can obtain different jump addresses every time the tracking program runs, so that Crackers cannot determine where to find said first key. The software protected by the present invention is not limited to executable programs, but also includes functional modules and core algorithms of the software. The existing threshold encryption method is to use a random number as the second key to encrypt the first key SK into a key ciphertext PSK, and generate n threshold key factors for calculating the random number; When a key is needed for decryption, only t threshold key factors (t≤n) are required to generate the second key for decryption. The purpose of threshold cryptography is to decentral...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 