A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption
DOI:
https://doi.org/10.21512/comtech.v5i2.2215Keywords:
software copy protection, hash, asymmetrical encryptionAbstract
Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.
Plum Analytics
References
Agrawal, M., & Mishra, P. (2012). A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering, 877-882.
AL-Badareen, A. B., Selamat, M. H., Jabar, M. A., Din, J., & Turaev, S. (2011). Reusable Software Component Life Cycle. International Journal of Computers, 191-199.
Bahaa-Eldin, A. M., & Sobh, M. A. (2014). A Comprehensive Software Copy Protection and Digital Rights Management Platform. Ain Shams Engineering Journal.
Barukab, O. M., Khan, A. I., Shaik, M. S., & Murthy, M. R. (2012). Secure Communication using Symmetric and Asymmetric Crypthographic Techniques. I.J. Information Engineering and
Electronic Business, 36-42.
Euresti, D., Smith, B., Chen, A., Sydell, A., Motes, A., Tang, J., & Hunter, R. (2014). United States of America Patent No. US 20140122451A1.
Paar, C., & Pelzl, J. (2009). Understanding Cryptography. New York: Springer.
Sivathanu, G., Wright, C. P., & Zadok, E. (2005). Ensuring data integrity in storage: techniques and applications. StorageSS '05 Proceedings of the 2005 ACM Workshop on Storage security and
survivability (pp. 26-36). New York: ACM.
Sojer, M., & Henkel, J. (2010). Code Reuse in Open Source Software Development: Quantitative Evidence, Drivers, and Impediments. Journal of the Association for Information Systems, 868-901.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: