Skip to main content

A cryptographic tool for programs protection

  • Section 4 Protection Of Information
  • Conference paper
  • First Online:
EUROCODE '90 (EUROCODE 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 514))

  • 126 Accesses

Abstract

In this paper we present a cryptographic mechanism for ensuring effective software protection. A new method is featured which solves this problem by properly coding rather than encrypting, that is without adopting the lengthy and expensive solution which consists of having the whole program signed/encrypted by an authority [PaWi89].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D.E. Denning and P.J. Denning, "Certification of Programs for Secure Information Flow", Communications of the ACM, vol 20, pp. 504–513, July 1977.

    Article  Google Scholar 

  2. W. Diffie and M.E. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol IT-22, pp. 644–654, Nov. 1976.

    Article  Google Scholar 

  3. G.H. Ebel, "Hybrid Circuits: Thick and Thin Film", in Handbook of Modern Microelectronics and Electrical Engineering, Ed. C. Belove, Wiley, New York, 1986.

    Google Scholar 

  4. T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Transactions on Information Theory, vol, IT-31, pp. 469–472, July 1985.

    Article  Google Scholar 

  5. Motorola, MC68020, 32-bit Microprocessor User's Manual, Prentice Hall, 1985.

    Google Scholar 

  6. G. Parkin and B. Wichmann, "Intelligent Modules", in The Protection of Computer Software — Its Technology and Applications, Ed. Grover, Cambridge University Press, 1989.

    Google Scholar 

  7. R.L. Rivest, L. Adleman and M.L. Dertouzos, "On Data Banks and Privacy Homomorphisms", in Foundations of Secure Computation, Ed. R.A. DeMillo et al., Academic Press, New York, 1978.

    Google Scholar 

  8. R.L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, vol. 21, pp.120–126, Feb 1978.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gérard Cohen Pascale Charpin

Rights and permissions

Reprints and permissions

Copyright information

© 1991 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Domingo-Ferrer, J., Huguet-Rotger, L. (1991). A cryptographic tool for programs protection. In: Cohen, G., Charpin, P. (eds) EUROCODE '90. EUROCODE 1990. Lecture Notes in Computer Science, vol 514. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-54303-1_135

Download citation

  • DOI: https://doi.org/10.1007/3-540-54303-1_135

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-54303-9

  • Online ISBN: 978-3-540-47546-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics