Abstract
In this paper we present a cryptographic mechanism for ensuring effective software protection. A new method is featured which solves this problem by properly coding rather than encrypting, that is without adopting the lengthy and expensive solution which consists of having the whole program signed/encrypted by an authority [PaWi89].
Preview
Unable to display preview. Download preview PDF.
References
D.E. Denning and P.J. Denning, "Certification of Programs for Secure Information Flow", Communications of the ACM, vol 20, pp. 504–513, July 1977.
W. Diffie and M.E. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol IT-22, pp. 644–654, Nov. 1976.
G.H. Ebel, "Hybrid Circuits: Thick and Thin Film", in Handbook of Modern Microelectronics and Electrical Engineering, Ed. C. Belove, Wiley, New York, 1986.
T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Transactions on Information Theory, vol, IT-31, pp. 469–472, July 1985.
Motorola, MC68020, 32-bit Microprocessor User's Manual, Prentice Hall, 1985.
G. Parkin and B. Wichmann, "Intelligent Modules", in The Protection of Computer Software — Its Technology and Applications, Ed. Grover, Cambridge University Press, 1989.
R.L. Rivest, L. Adleman and M.L. Dertouzos, "On Data Banks and Privacy Homomorphisms", in Foundations of Secure Computation, Ed. R.A. DeMillo et al., Academic Press, New York, 1978.
R.L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, vol. 21, pp.120–126, Feb 1978.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Domingo-Ferrer, J., Huguet-Rotger, L. (1991). A cryptographic tool for programs protection. In: Cohen, G., Charpin, P. (eds) EUROCODE '90. EUROCODE 1990. Lecture Notes in Computer Science, vol 514. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-54303-1_135
Download citation
DOI: https://doi.org/10.1007/3-540-54303-1_135
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54303-9
Online ISBN: 978-3-540-47546-0
eBook Packages: Springer Book Archive