A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption

Authors

  • Aswin Wibisurya Bina Nusantara University
  • Timothy Yudi Adinugroho Bina Nusantara University

DOI:

https://doi.org/10.21512/comtech.v5i2.2215

Keywords:

software copy protection, hash, asymmetrical encryption

Abstract

Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.

Dimensions

Plum Analytics

References

Agrawal, M., & Mishra, P. (2012). A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering, 877-882.

AL-Badareen, A. B., Selamat, M. H., Jabar, M. A., Din, J., & Turaev, S. (2011). Reusable Software Component Life Cycle. International Journal of Computers, 191-199.

Bahaa-Eldin, A. M., & Sobh, M. A. (2014). A Comprehensive Software Copy Protection and Digital Rights Management Platform. Ain Shams Engineering Journal.

Barukab, O. M., Khan, A. I., Shaik, M. S., & Murthy, M. R. (2012). Secure Communication using Symmetric and Asymmetric Crypthographic Techniques. I.J. Information Engineering and

Electronic Business, 36-42.

Euresti, D., Smith, B., Chen, A., Sydell, A., Motes, A., Tang, J., & Hunter, R. (2014). United States of America Patent No. US 20140122451A1.

Paar, C., & Pelzl, J. (2009). Understanding Cryptography. New York: Springer.

Sivathanu, G., Wright, C. P., & Zadok, E. (2005). Ensuring data integrity in storage: techniques and applications. StorageSS '05 Proceedings of the 2005 ACM Workshop on Storage security and

survivability (pp. 26-36). New York: ACM.

Sojer, M., & Henkel, J. (2010). Code Reuse in Open Source Software Development: Quantitative Evidence, Drivers, and Impediments. Journal of the Association for Information Systems, 868-901.

Downloads

Published

2014-12-01

Issue

Section

Articles
Abstract 292  .
PDF downloaded 279  .