Hardware Protection Against Software Piracy

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

MANINDER KAUR Maninder Kaur 1
Ch-11 Project Execution and Termination. System Testing This involves two different phases with two different outputs First phase is system test planning.
Systems Analysis and Design in a Changing World, Fifth Edition
Chapter 10 The Traditional Approach to Design
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Chapter 3 Encryption Algorithms & Systems (Part C)
Pipelining By Toan Nguyen.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Topics Introduction Hardware and Software How Computers Store Data
ECE 371 Microprocessor Interfacing Unit 4 - Introduction to Memory Interfacing.
Hardware Protection Against Software Piracy Tim Maude and Derwent Maude Communication of the ACM September 1984 Presentation by Gayathri Ramakrishnan.
Cosc 2150: Computer Organization
Computer Architecture And Organization UNIT-II Multilevel View Point Of A Machine.
Objective At the conclusion of this chapter you will be able to:
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
An Efficient Software Protection Scheme Antonio Maña, Ernesto Pimentel Antonio Maña, Ernesto Pimentel University of Málaga, SPAIN in Trusted Information:
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Attacking an obfuscated cipher by injecting faults Matthias Jacob Dan Boneh Edward.
Information Systems Design and Development Security Precautions Computing Science.
Systems Analysis and Design in a Changing World, Fourth Edition
Systems Architecture Receiver Anonymity Matthias Füssel, Dennis Schneider June 5, 2007.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
BY S.S.SUDHEER VARMA (13NT1D5816)
CPU Lesson 2.
INTRODUCTION TO ROBOTICS Part 5: Programming
Software Hardware refers to the physical devices of a computer system.
Microprocessor and Microcontroller Fundamentals
Computer Organization and Architecture + Networks
Hardware Protection Against Software Piracy
Public-Key Cryptography and Message Authentication
Topics Introduction Hardware and Software How Computers Store Data
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
Microcontroller Based Digital Code Lock
System Design.
nZDC: A compiler technique for near-Zero silent Data Corruption
Encrypting Databases to Mitigate Server Breaches
8085 microprocessor.
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Presented by: Dr. Munam Ali Shah
Design of the Control Unit for Single-Cycle Instruction Execution
Interfacing Memory Interfacing.
Computer Science 210 Computer Organization
Number Representations and Basic Processor Architecture
COP 5611: Operating Systems
PART VII Security.
Secure Execution Crypto Microprocessor
A Multiple Clock Cycle Instruction Implementation
MARIE: An Introduction to a Simple Computer
Topics Introduction Hardware and Software How Computers Store Data
Block Ciphers and the Data Encryption Standard (DES)
Chapter 1 Introduction(1.1)
Chapter 1 Introduction.
Security.
Principles of Programming Languages
MANINDER KAUR Maninder Kaur 1
Keypad Source: under under
ECE 352 Digital System Fundamentals
Keypad Source: under under
Paper by D.L Parnas And D.P.Siewiorek Prepared by Xi Chen May 16,2003
Operating System Concepts
Calculate 81 ÷ 3 = 27 3 x 3 x 3 3 x 3 x 3 x 3 ÷ 3 = This could be written as
Internal components of a computer.
Advanced Encryption Standard
Digital Signature Standard (DSS)
How to Use Charm Crypto Lib
Presentation transcript:

Hardware Protection Against Software Piracy Written by TIM MAUDE and DERWENT MAUDE, “Hardware protection against software piracy”, Communications of the ACM,27(9):950—959, September 1984 Summary: The system of software protection consists of modified software in conjunction with a hardware public key cryptogram system which is implemented by a small microprocessor-based security unit that attaches to an input-output port. Presented by Qiang Liu

Outline of the System The principle of the scheme is that portions of the program code are encrypted. Each computer would be provided with its own pair of public and private keys. Hardware Implementation: Each computer is provided with a hardware component, consisting mainly of a microprocessor, which is connected to an input-output port. Program modification: First, divide the program into some parts. Second, put the coding of these parts into a form so that they may be deciphered by a particular security unit.

Example Program prime4 ………//main program Section1: call point=unit(1,j) case point OF 1: Goto 4; 2: Goto 9; 3:Goto 6;…… Section2: …… …… Function unit (inst,value){ Case inst OF: 1: Begin store:=value; unit:=3; 2: IF store<=value Then unit:=3 Else unit:=1; 8: unit:=2; }

Appreciative Comments The system makes illicit duplication of proprietary software much harder. (customized programs) Divide program into sections and rearrange them randomly( branches, jumps, GOTO statements) Security unit steers sections to execute in their specified order. (No one knows which section will be executed next.)

Critical Comment “decoding key”: In its “Cryptographic considerations” section for the MITRE system: “Once the key component receives the public key [ɑM]from the program, it takes a few seconds for a standard microprocessor such as a Z80 to work out the 127 bits of ɑMN. This 127-bit sequence forms the ‘decoding key’ for the second cryptogram”( So ɑMN is calculated from ɑM and ɑN which is from key component.) “At program start-up, a ‘decoding key’ is passed from the program to the unit.” In this scheme the decoding key, which is passed, is encrypted using the security unit’s public key cryptogram.)

Figures Security unit ( work out decoding key) decrypt Security unit Decoding key encrypted using security unit’s public key cryptogram decrypt Security unit ( work out decoding key) A value from a program Security unit value to determine to which section return

Question If we could build the security unit onto the chip of the computer, then would you think that it is good to prevent software piracy?