Re: UnShroud

new topic     » goto parent     » topic index » view thread      » older message » newer message

At 11:02 5/07/97 -0700, you wrote:
>---------------------- Information from the mail header -----------------------
>Sender:       luciuslhilleyiii at JUNO.COM>
>Poster:       Lucius L Hilley III
>Subject:      Re: UnShroud
>-------------------------------------------------------------------------------
>
>I also have to agree with Ralf.
>
>I have an idea on shrouding the code THEN
>Encyrpting the shrouded code.
>
>At execution time the coded would be decrypted
>for use but would still be shrouded. The code
>would never be COMPLETELY vulnerable.
>
>I will not be releasing any encryption techniques
>that I design and use.
>
>--Lucius Lamar Hilley III

Hi Lucius,

I have been thinking along similar lines myself. The decryption program would
have to be written in a different language or someone could easily unshroud it,
edit it ,use it to decrypt the main program, then in turn unshroud that. The
only way i can think of to make the decryption program edit proof would be to
make the encryption key some checksum generated from the decryption code itself.
For this it would have to be a bit self aware and know where abouts it is
stored in memory as it is executed so it can 'peek' at itself and generate the
decryption key as it runs. If it had been edited at all, the wrong key would
be generated.

I have no idea if this is possible.

What do you think?

Cheers,

Graeme Burke.

new topic     » goto parent     » topic index » view thread      » older message » newer message

Search



Quick Links

User menu

Not signed in.

Misc Menu