Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.4.87

The Secure Chip for Software Illegal Copy Protection  

오명신 (전남대학교병원 의공학과)
한승조 (조선대학교 전자정보통신공학부)
Abstract
Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.
Keywords
crypto-chip;
Citations & Related Records
연도 인용수 순위
  • Reference
1 On the disign of S-boxes /
[ A.F.Webster;S.E.Tavares ] / CRYPTO'85
2 /
[ O.Goldreich;R.Ostrovsky ] / Software protection and simulation on oblivious RAMs(Revised)
3 A software protection scheme /
[ G.B.Purdy;G.J.Simmons;J.A.Studier ] / In Proc.1982 Symp.Security and Privacy
4 Design of Extended DES cryptography /
[ S.J.Han;H.S.Oh ] / Proceeding of the IEEE International Sympsium on Information Theory
5 Improved-DES Cryptosystem Design /
[ S.J.Han ] / Journal of Kiss
6 Structured Design of Substitution Permutation Encryption Networks /
[ J.B.Kam;G.I.Davida ] / IEEE Trans.on Comput   DOI   ScienceOn
7 Computer systems to inhibit unauthorized copying, unauthorized software /
[ M.G.Arnold;Mark D.Winkel ] / U.S.Patent No.4,558,176
8 On software protection /
[ A.Herzberg;G.Karmi ] / In Proc. Fourth JCIT
9 Design concepts for tamper responding system /
[ D.Chaumm;D.Chaum(ed) ] / In Advances in Cryptology:Proc. Crypto 83
10 The Improvement Data Encryption Standard(DES) Algorithm /
[ S.J.Han ] / Proceedings of ISSSTA '96,IEEE
11 Tamper resistant software /
[ David Aucsmith ] / Information Hiding-Proceedings of the First International Workshop
12 How disks are padlocked /
[ J.Voelker;P.Walich ] / IEEE Spectrum
13 Public protection of software /
[ A.Herzberg;S.S.Pinter;H.C.Williams(ed) ] / In Advances in Cryptology, Proc Crypto 85