Unlock instant, AI-driven research and patent intelligence for your innovation.

Software encryption and decryption method and encryption and decryption device

A software and decapsulation technology, applied in secure communication devices, computer security devices, electrical components, etc., can solve problems such as the loss of software owners, and achieve the effect of improving security and strengthening protection

Active Publication Date: 2008-11-26
BEIJING SIEMENS CERBERUS ELECTRONICS
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above method is easy to be tracked by the cracker, and the cracker can track every step of the program startup as long as he uses the debugging tool
If the program accesses a certain file every time it runs, and obtains the key or the system symbol name from the file, this will make the cracker suspect that the file may be the key file of the software or the system symbol name comparison table, if If the cracker determines that the file is the key file, he will do everything possible to crack the key file. If the key file is cracked, the software code of the ciphertext can be converted into the software code of the plain text, and the software can be processed. Reverse engineering to generate source code at the loss of the owner of the software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software encryption and decryption method and encryption and decryption device
  • Software encryption and decryption method and encryption and decryption device
  • Software encryption and decryption method and encryption and decryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Hereinafter, the present invention will be described in detail in conjunction with the accompanying drawings.

[0037]The present invention uses the threshold key theory to further protect the first key, and splices the threshold key factor into the encrypted software, so that the cracker can obtain different jump addresses every time the tracking program runs, so that Crackers cannot determine where to find said first key. The software protected by the present invention is not limited to executable programs, but also includes functional modules and core algorithms of the software. The existing threshold encryption method is to use a random number as the second key to encrypt the first key SK into a key ciphertext PSK, and generate n threshold key factors for calculating the random number; When a key is needed for decryption, only t threshold key factors (t≤n) are required to generate the second key for decryption. The purpose of threshold cryptography is to decentral...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer security, in particular to a method for encrypting and decrypting software and a device thereof. The decryption of the invention comprises the following steps: step 201, t threshold cryptographic key factors are taken out randomly from n sections of a second software cryptograph, and the second software cryptograph is restored to a first software cryptograph and a cryptographic key cryptograph PSK, in which n is signless integral which is more than one, and t is signless integral which is less than or equal to n; step 202, the cryptographic key cryptograph PSK is taken out, a second cryptographic key is calculated according to the t threshold cryptographic key factors, and the cryptographic key cryptograph PSK is decrypted to a first cryptographic key SK by the second cryptographic key; step 203, the first software cryptograph is decrypted by using the first cryptographic key SK, and the software plaintext is obtained. The beneficial effect of the method provided by the invention is that protection of software with cryptographic key is strengthened, which is difficult for crackers to realize the purpose of software crack by tracking the process of software load.

Description

technical field [0001] The invention relates to the field of computer security, in particular to the field of computer encryption, in particular to a method for encrypting and decrypting software and an encryption and decryption device. Background technique [0002] Now, software has become a commodity with independent value, and the functions, execution process and coding of software are likely to be copied by competitors or other organizations or individuals. So software, especially software written in intermediate languages, such as Java, .NET and other programming languages, can be easily reverse-coded by reverse engineering, such as using .NET Reflect (Microsoft’s reverse engineering tool), JAD (Java’s reverse engineering tool ), so as to obtain information such as the core algorithm and code of the software. If this information is maliciously used by the cracker, it will cause losses to the developer, for example, imitating the core algorithm of the software, bypassing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22
CPCG06F21/602G06F21/14G06F2221/2107H04L9/085
Inventor 唐文胡建钧
Owner BEIJING SIEMENS CERBERUS ELECTRONICS