- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
软件加密技术及实现.
软件技术及实现
摘 要 关键词 Software Protection technique and its realization
LEI Peng
( GuiLin Institute of Electronic Technology . The Depatment of Computing )
Abstract flooding of pirate software has been a calamity of our national software industry . In order to prevent software from pirate , and protect the profit of the software developer , they must encrypt their software to get a protection . There are several software protection tools in the market currently , but these tools were standalone nine tenths , and they only used simple encryption algorithms , so they could be cracked easily by the crackers .
This thesis describes a perfect software encryption and protection scheme which integrate the encryption and electronic register . This scheme is based on multiple reliable cryptographic algorithms such as symmetric encryption algorithm , digital signature , hashing and key exchange . The PE file format (Portable Executable File Format) and its loading mechanism under Windows are dissected thoroughly in this thesis . Then these cryptographic algorithms and several anti-crack method are used gracefully to encrypt and protect the PE file .
Within the realization of this scheme , the RSA digital signature algorithm , RC2 and RC4 encryption algorithm , SHA hasing algorithm etc in MicroSoft CryptoAPI are used . In order to increase the performace of caculate the digest of large number of data, MD5 hashing algorithm was rewritten . WinSocket API is used as the network interface . The blend of C++ and assembly are used for easily contoling the bottom layer of the system and simplify the programming . The anti-crack method consits the integralization of the file checking , the integralization of the code checking , and anti-debug , anti-disassembly , anti-dump and code metamorphose etc .
The reliable cyrpto algorithms guarantee the crypto strength . As a result of online register , the retail users and the software developers get convenience .
Key words Encrypt
您可能关注的文档
最近下载
- 第一单元第2课《缤纷的世界美术流派》 课件+-2025-2026学年人美版(2024)初中美术八年级上册.pptx VIP
- 《UI界面设计》教学课件.pptx VIP
- AP1000缩略词及系统缩写.pdf VIP
- 电子教案-《自我管理》(第二单元第一课走近时间管理)-5.pdf VIP
- Dell戴尔显示器E1715S用户手册.pdf
- 七律.长征原版五线谱钢琴谱正谱乐谱.pdf VIP
- 部编版小学二年级上册道德与法治全册教案(含教学反思).pdf VIP
- 植物营养与施肥的基本原理.ppt VIP
- GB50052-2009 供配电系统设计规范.pdf VIP
- 2025年教科版(2024)小学科学二年级上册(全册)教学设计(附目录).docx
文档评论(0)