Software encryption market demand and product interaction analysis
Source: Internet
Author: User
KeywordsSmart
Every day, the world due to software piracy caused by the loss of not less than 50 million U.S. dollars, even in the so-called legal system of the most perfect in the United States, piracy rate of up to 21 (data from IDC). Software piracy has become a major test of the survival of the software industry, and encryption has become a helpless choice. If the anti-virus technology update is driven by the virus manufacturer, then, the software encryption industry is a game with the decryption, but also promote the market demand for the development of the industry. In the initial encryption process, most of the software used in the soft encryption, the main password, software and the way to verify the way the key disk and other means of pure software. But with soft encryption technology quickly decrypted software to conquer the line of defense, in this case, hard encryption began to become popular, and became the most widely used encryption means. Encryption cards, software dogs, etc. have also become the product of the progress of decryption technology. But the struggle between encryption and decryption is endless, and soon the common hard encryption facilities are challenged, so the encryption lock technology emerged and quickly become the mainstream encryption technology. Encryption lock small, easy to learn, easy to use, but it is very high technical content, first is the encryption principle, this is the key point of encryption lock and innovation point, the enemy can win, this aspect domestic manufacturers based on local demand, obviously more competitive strength; Secondly, the reliability, stability, compatibility, transparency and so on of encryption lock, These are the basic requirements of the lock, but it is not easy to do, especially the compatibility, transparency issues, such as transparency is not allowed to work in the mouth of the lock affect the original equipment of the normal work, if not the standard will bring a lot of inconvenience to the work. Therefore, the encryption lock in the balance of requirements, experienced veteran manufacturers still have certain advantages. Into the 21st century, the general encryption lock again defeated the next, facing the elimination dilemma. What is the reason for this? Let's uncover the battles. Cause and Effect: Fixed algorithm encryption lock is not good: This type of encryption lock the biggest flaw is the algorithm does not disclose to the software manufacturer, the lock in the transformation algorithm in the factory has been fixed, software encryption can only set the parameters of the algorithm. This limits the vendor's use of the algorithm, either by pre-recorded the algorithm results and then checking (using the Code table) in the software runtime, or at least two times in the software and then comparing the results. If the decryption person intercepts the data, through statistics, analysis can achieve the decryption purpose. Programmable encryption Lock short: "Programmable" encryption lock the biggest feature is to allow users to design a dedicated algorithm. Its emergence is indeed a development of software encryption technology, however, due to cost restrictions, this type of encryption locks can only be used 10~20 yuan of low-grade single-chip computer This gives "programmable" encryption lock caused a lot of limitations, mainly in: 1, the complexity of the algorithm transformation is not high enough, 2, instruction coding space is small, 3, The space in the program area is small. These limitations make it impossible for users to use "programmable" encryption lock to achieve the ideal high intensity encryption scheme, but "programmable" encryption lock after allA feasible scheme is proposed for the cryptographic industry. The fragility of the hardware itself: with the development of integrated circuit design and production technology, the hardware of the core chip of security products is more and more likely to be attacked, and the typical hardware attack means electronic detection attack (such as spa and DPA) and physical attack (detection, such as using Sishell technology), Using the chip test interface of the manufacturer, it is easy to read the information through special burning time sequence and data. After encountering the challenge of decryption technology, the cryptographic software industry pushes encryption technology to a new level. The new generation of software encryption protection systems built on smart card technology in 2002 has completely reversed the position of encryption technology in the struggle. The iconic product of this technology upgrade is the smart dog that is thinking about Locke's elite type IV encryption lock and the American Rainbow World Company (now the American Rover). We take the domestic elite type IV as an example to introduce the technology to deal with the decryption four key technical means. One, the important software code completely porting to the hardware to run on the basis of hardware system security, the Elite IV uses the breakthrough plan to the user's key code and the data carries on the strong protection. Elite IV provides up to 32~64k byte of program and data space, can accommodate nearly million lines of C language code, software developers can be a piece of software or a few pieces of critical code into the Elite IV lock to run, or the software to run the key data required to save in the lock, External software accesses key code or data in the hardware through an interface function. Because the code and data do not exist on the PC side, the decryption is unable to guess the algorithm or steal the data, thus greatly guaranteeing the security of the whole software system. Two, the powerful operation processing ability uses the smart card technology to construct the Elite IV encryption lock to have the formidable computation and the data processing ability, can support the floating-point operation Storehouse, the mathematics function storehouse, the Security Service storehouse, the standard input and the output storehouse and so on, these has the vital function to the enhancement encryption strength. Third, smart card chip has a very high security card chip has a high degree of integration, and ordinary low-grade SCM, smart card chip can effectively withstand the electronic detection attacks (SPA and DPA) and physical attacks (Sishell), which in the hardware design phase provides a sound security protection measures At the same time, the smart card chip provides the hardware random number generator, under the CPU control, each chip and the outside data transmission, the random number can guarantee the data not to repeat. Iv. the core of smart card technology-operating system Coscos (Card keyboard-based System) on smart card chip, is a relatively small but very complete, rigorous system. Cos manages every move of smart cards, smart card system security in addition to a part of the chip design manufacturers to ensure that most of the implementation by COS developers. Using smart card technology to develop software encryption protection products, from security, efficiency, stabilityQualitative, reliability and other aspects, the core COS system must have independent copyright and fully comply with international standards ISO7816. The core--xcos of the elite Type IV encryption lock is to ponder the independent development of Locke with complete independent intellectual property rights, fully meet the smart card ISO7816 standard. At present, the use of smart card technology to develop software encryption protection products, from the security, efficiency, stability, reliability and other aspects have unparalleled competitive advantage, software encryption "Terminator" said. However, the progress of technology is often unpredictable and it is difficult to predict where the gap will be broken. Encryption and decryption game will continue, if we do not consider moral and legal issues, only from the technical point of view, the struggle is not an effective means of promoting it? Responsible Editor Zhao Zhaoyi@51cto.com TEL: (010) 68476636-8001 to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passed (0 Votes) The original text: Software encryption market demand and product interaction analysis return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.