Abstract
One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are imperfect. We present protocols that enable software protection, without causing substantial overhead in distribution and maintenance. The protocols may be implemented by a conventional cryptosystem, such as the DES, or by a public key cryptosystem, such as the RSA. Both implementations are proved to satisfy required security criteria.
Original language | English |
---|---|
Pages (from-to) | 371-393 |
Number of pages | 23 |
Journal | ACM Transactions on Computer Systems |
Volume | 5 |
Issue number | 4 |
DOIs | |
State | Published - 1 Oct 1987 |
Externally published | Yes |
Keywords
- Cryptographic protocols
- protected CPU
- security protocols
- single key cryptosystems
- software authorization
- software distribution
- software piracy