Re: UnShroud
- Posted by "Graeme." <graemejb at PRONET.NET.AU> Jul 06, 1997
- 670 views
At 11:02 5/07/97 -0700, you wrote: >---------------------- Information from the mail header ----------------------- >Sender: luciuslhilleyiii at JUNO.COM> >Poster: Lucius L Hilley III >Subject: Re: UnShroud >------------------------------------------------------------------------------- > >I also have to agree with Ralf. > >I have an idea on shrouding the code THEN >Encyrpting the shrouded code. > >At execution time the coded would be decrypted >for use but would still be shrouded. The code >would never be COMPLETELY vulnerable. > >I will not be releasing any encryption techniques >that I design and use. > >--Lucius Lamar Hilley III Hi Lucius, I have been thinking along similar lines myself. The decryption program would have to be written in a different language or someone could easily unshroud it, edit it ,use it to decrypt the main program, then in turn unshroud that. The only way i can think of to make the decryption program edit proof would be to make the encryption key some checksum generated from the decryption code itself. For this it would have to be a bit self aware and know where abouts it is stored in memory as it is executed so it can 'peek' at itself and generate the decryption key as it runs. If it had been edited at all, the wrong key would be generated. I have no idea if this is possible. What do you think? Cheers, Graeme Burke.