Public Protection of Software

Amir Herzberg, Shlomit S. Pinter

Research output: Contribution to journalArticlepeer-review

27 Scopus citations

Abstract

One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are imperfect. We present protocols that enable software protection, without causing substantial overhead in distribution and maintenance. The protocols may be implemented by a conventional cryptosystem, such as the DES, or by a public key cryptosystem, such as the RSA. Both implementations are proved to satisfy required security criteria.

Original languageEnglish
Pages (from-to)371-393
Number of pages23
JournalACM Transactions on Computer Systems
Volume5
Issue number4
DOIs
StatePublished - 1 Oct 1987
Externally publishedYes

Keywords

  • Cryptographic protocols
  • protected CPU
  • security protocols
  • single key cryptosystems
  • software authorization
  • software distribution
  • software piracy

Fingerprint

Dive into the research topics of 'Public Protection of Software'. Together they form a unique fingerprint.

Cite this