Abstract
One of the overwhelming problems that software producers must contend with, is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are imperfect. We present protocols that enables software protection, without causing overhead in distribution and maintenance. The protocols may be implemented by a conventional cryptosystem, such as the DES, or by a public key cryptosystem, such as the RSA. Both implementations are proved to satisfy required security criterions.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
7. References
D.J. Albert and S.P. Morse, “Combating Software Piracy by Encryption and Key Management”, Computer April 1984
National Bureau of Standard, “Data Encryption Standard”, Federal Information Processing Standard Publication 46, January 1977
W. Diffie and M. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Vol. IT-22, 1976
A. Herzberg and G. Karmi, “On Software Protection” Proc. Fourth JCIT, Jerusalem, Israel April 1984
A. Herzberg and S. Pinter, “The Transaction System Model and Security Engineering”, in preparation
M.J. Merritt, “Cryptographic Protocols”, GIT-ICS-83/06, doctoral dissertation, The Georgia Institute of Technology, 1983.
R.L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and PKCs”, Comm. ACM, Vol. 21, No. 2 (Feb. 1978).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1986 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Herzberg, A., Pinter, S.S. (1986). Public Protection of Software. In: Williams, H.C. (eds) Advances in Cryptology — CRYPTO ’85 Proceedings. CRYPTO 1985. Lecture Notes in Computer Science, vol 218. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39799-X_14
Download citation
DOI: https://doi.org/10.1007/3-540-39799-X_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-16463-0
Online ISBN: 978-3-540-39799-1
eBook Packages: Springer Book Archive