A software protection method based on modified one time pad

A technology of software protection and codebook, which is applied in program/content distribution protection, instruments, electrical digital data processing, etc. It can solve problems such as difficult tampering, long startup delay, and difficulty in obtaining programs, so as to reduce overhead and enhance anti-attack The effect of reducing the time required for decryption

Inactive Publication Date: 2007-04-25
SUN YAT SEN UNIV
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of the present invention abandons the traditional one-step decryption method, and uses the real-time decoder to decrypt the software step by step with the function as the unit during operation, and only decrypts the necessary part in one operation, making it difficult for the attacker to obtain the complete decrypted program. Tampering and bypassing the software protection function in the undecrypted part enhances the anti-attack performance. In terms of running effect, since the decryption is decentralized, the problem of long startup delay is solved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A software protection method based on modified one time pad

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with accompanying drawing.

[0025] The method of the present invention realizes software encryption by using an improved one-time-pass random code book. One-time pad garbled codes use a large set of non-repeating true random key letters, which is called garbled codes. The method of the invention is to popularize the encryption algorithm of the one-time pad garbled code book, replace the one-time pad garbled code book composed of letters with the one-time pad garbled code book composed of binary numbers, and replace the addition of plaintext letters with XOR. When decrypting, it only needs to be XORed again against the one-time password garbled code book. When the encryption method is used to protect the software, the decryption is automatically completed when the software is running, so the decryption time takes up the running time of the software. With the one-time pad, the decryption operation is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a software protection method based on improved once code error edit, which comprises coding and decoding processes and discards traditional one step decoding type and through instant decoding as function for steps of decoding software with one time for partly decoding to make the attacker get total decoding program hard to change the software protection function to strengthen the anti-attack property; due to decoding steps, it solves the problems of long time lag.

Description

technical field [0001] The invention belongs to the technical field of software encryption and decryption protection, in particular to a software protection method based on an improved one-time password garbled code book. Background technique [0002] Software piracy is the illegal copying and reselling of software. Piracy has brought huge losses to the entire software industry. The most basic technical method for pirates is to crack the program through reverse engineering, and then illegally tamper with the software to remove software protection methods such as legality self-check program fragments in the software. Technically protecting software has important engineering application value. In order to increase the difficulty of reverse engineering for pirates, obfuscation technology, anti-disassembly technology, and anti-debugging technology have been proposed. However, no technology is theoretically unhackable. The significance of software protection is to increase the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F21/00G06F21/12
Inventor 马识佳罗笑南
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products