Advertisement

Public Protection of Software

  • Amir Herzberg
  • Shlomit S. Pinter
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 218)

Abstract

One of the overwhelming problems that software producers must contend with, is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are imperfect. We present protocols that enables software protection, without causing overhead in distribution and maintenance. The protocols may be implemented by a conventional cryptosystem, such as the DES, or by a public key cryptosystem, such as the RSA. Both implementations are proved to satisfy required security criterions.

Keywords

Cryptographic Protocol Software Producer Software Piracy Software Distribution Replacement Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

7. References

  1. [AM84]
    D.J. Albert and S.P. Morse, “Combating Software Piracy by Encryption and Key Management”, Computer April 1984Google Scholar
  2. [DES77]
    National Bureau of Standard, “Data Encryption Standard”, Federal Information Processing Standard Publication 46, January 1977Google Scholar
  3. [DH76]
    W. Diffie and M. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Vol. IT-22, 1976Google Scholar
  4. [HK84]
    A. Herzberg and G. Karmi, “On Software Protection” Proc. Fourth JCIT, Jerusalem, Israel April 1984Google Scholar
  5. [HP85]
    A. Herzberg and S. Pinter, “The Transaction System Model and Security Engineering”, in preparation Google Scholar
  6. [M83]
    M.J. Merritt, “Cryptographic Protocols”, GIT-ICS-83/06, doctoral dissertation, The Georgia Institute of Technology, 1983.Google Scholar
  7. [RSA78]
    R.L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and PKCs”, Comm. ACM, Vol. 21, No. 2 (Feb. 1978).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1986

Authors and Affiliations

  • Amir Herzberg
    • 1
  • Shlomit S. Pinter
    • 1
  1. 1.Dept. of Electrical EngineeringTechnion - Israel Institute of TechnologyHaifaIsrael

Personalised recommendations