Copy protection or content protection covers various mechanism, such as DRM and software license keys, used to restrict the unauthorized copying or use of software or digital media.
Questions tagged [copy-protection]
18 questions
10
votes
1 answer
Advanced Access Content System (AACS) and Subset Difference techniques for Broadcast Encryption
I'm trying to get a grasp on AACS and Subset Difference (archived version with images) for a project I'm working on and am having a hard time coming up with a technically valid layman explanation, let alone implementation.
Is it fair to say that the…
makerofthings7
- 2,631
- 1
- 22
- 37
6
votes
2 answers
Cryptographically secure product keys
I am looking for a scheme to generate and validate cryptographically secure product keys. My requirements are:
Unforgeable. It must be impossible (or at least very hard) for users to forge a product key.
Short. Users may enter product keys by…
Bill Zissimopoulos
- 163
- 4
5
votes
2 answers
Is a RSA-signature of some identifying data a safe way to implement a license key?
I have this idea of implementing a license key:
After the user downloads the program, he connects to a website and sends his Windows product ID.
The website, then, sends this back to him with a signature using a private RSA key.
The program, then,…
ispiro
- 2,085
- 2
- 18
- 29
5
votes
3 answers
Cipher for Product Registration?
I'd like to implement a "Product Registration" scheme into my software where upon initial use, the User must enter a key to unlock it.
The key they enter is compared to their encrypted Username.
They would have to acquire the key from myself if…
Anti Earth
- 153
- 3
4
votes
1 answer
Can I use SHA1 as license key?
I have recently started looking into creating secure, while not validating against an external server, software product keys.
The idea I have had is to create a key consisting of two parts firstly a section that contains some (but not all) details…
MindStormer
- 43
- 3
3
votes
2 answers
How does PUF hardware help in software activation?
I have read that one of the PUF's application is software licensing, but do not know how. I have been reading different articles and forums (such as here), but still not clear for me.
One vague point for me is that PUF is a hardware and I do not…
Shannon
- 273
- 2
- 7
3
votes
1 answer
A situation where security by obscurity might be the best solution - or am I wrong?
Imagine the following situation. There is an application for a microcontroller-driven system. The profits are made from manufacturing and selling the device itself. However, it is expected, that the users can later download software-updates from a…
vsz
- 513
- 1
- 5
- 14
3
votes
2 answers
One-time token to decrypt a local file
I am trying to achieve the following:
Encrypted files are stored on users filesystem. The user uses my client to authenticate against a server. Once he is authenticated successfully he gets a token to decrypt the files.
Things I want to ensure: the…
esskar
- 373
- 1
- 11
2
votes
2 answers
Is AES secure for java application licensing?
I have to license a java application and want to code a quick implementation, the scheme I came up with is:
The Application calculates a string X which we assume to be the md5 sum of the computer's mac address, the current date and some other…
dendini
- 123
- 1
- 3
2
votes
1 answer
Activation keys and asymmetric encryption
To me it seems that a quite safe way of creating activation keys is by using asymmetric encryption, so that the end-user could only reverse-engineer the validation method. This way the company keeps the generation algorithm (and key) safe.
Assume…
Fabi
- 123
- 3
2
votes
2 answers
Short software license keys with asymmetric verification
Would it be possible to implement a modern version of the old software license key scheme that uses an asymmetric signing approach, while keeping the length of the key short, say 40 chars of base64?
The purpose is to use license keys to unlock…
Larsp
- 23
- 2
1
vote
1 answer
AES-CBC pre-determined IV vs. null IV
Is there any security advantage to using a pre-determined IV in CBC mode over a null IV? I'm implementing a license key system similar to this article on CodeProject, but I'm confused by the authors use of a pre-determined IV embedded in the client…
Neil
- 21
- 6
0
votes
0 answers
What is the proper approach to software licensing system?
I am willing to create a server side licensing system for my commercial softwares but not really sure what cryptography method I should be using for best possible security per the standard of modern cryptography and how should I implement the…
Farukh
- 101
- 1
0
votes
0 answers
Strategies for securing public key storage on software
I´m kind of new in this so I apologize in advance for any noob mistakes (feel free to point it out)
We are developing a licensing mechanism on our software, and I would like some advice.
The software is installed on premises on the client, good…
Fedaykin
- 101
- 2
0
votes
1 answer
How to make a document truly read only
How is it possibile to cryptographically make a document truly read only? As in read only I imply that the user can obviously view it which can be achieved by coding which pixels have which colors. But how is it done in the industry? and what's more…
Samuel Allan
- 163
- 4