Font Size: a A A

Design And Development Of Key Management Scheme In Software Security

Posted on:2008-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:N HuFull Text:PDF
GTID:2178360215482551Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the continuous development of computer technology and the increasing application of computer, computer software development has become a significant business which improving the economy development. Software as one class of knowledge-intensive production is also pirated in some situations. Software protection is the necessary method for protecting the benefit of software developers, and it is the important part in the software development.Nowadays, the encryption technology is the main core of the technology of software protection, which using encryption algorithms of the international standard. In modern cryptography, the security of cryptography system does not depend on the secrecy of the algorithm itself, but the secrecy of the key. Hence, the technology of key management becomes one of significant technologies for the software protection. Now, there are two main kinds of methods of key management for software protection. The first kind is hardware storage, such as floppy disk, compact disc, encryption card and encryption lock. The other one is that the key is put in the encrypted software. This paper mainly research the latter method.This thesis is arranged as follows. First of all ,different encryption systems and several basic secret sharing schemes are introduced in Chapter II and III. Moreover, several familiar protection technologies of softwares are discussed in detail, and the characters and application range of these technology methods are indicated.(see Chapter IV). In Chapter V and VI , a key management scheme in software security in connection with decompilers is designed and developed by the author and the experiment data are analyzed too. Finally, the prospects of the future development in this field are discussed.
Keywords/Search Tags:Key Management, Key Sharing, Algorithm Threshold Scheme, Security
PDF Full Text Request
Related items