Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Encryption and Decrypting Illegally

Posted on 2008-10-01
2
Medium Priority
?
392 Views
Last Modified: 2010-05-18
Hey all

I seen the following link on whilst trying to find out more about encrypting:
http://www.codeproject.com/KB/vb/VB_NET_TripleDES.aspx?fid=70758&fr=26#xx0xx

Anyway, my question is how can you stop somebody creating a dummy DLL with the same naming conventions (assuming of course they havent use obfescution(sp?) to hide things), and decrypting the info with your own libraries?

Does the following section of code (when creating the keys) really help limit that?  And also I'm assuming that you can put any values in for the key and iv?  Or am I wrong?
byte[] key = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 
              13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24};
byte[] iv = {8, 7, 6, 5, 4, 3, 2, 1};

Open in new window

0
Comment
Question by:angus_young_acdc
2 Comments
 
LVL 37

Expert Comment

by:gregoryyoung
ID: 22615557
1) sign your dll ... its a super pain to get around this (i.e. hacking the CLR painful)
2) use public key encryption for any data you want to keep from changing ... they will be able to view the data but not change it.
0
 
LVL 15

Accepted Solution

by:
angus_young_acdc earned 0 total points
ID: 22622954
How do you go about doing 1 and 2?  Would that solve my problem of having the byte key in every form?
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: Nadia
Linear search (searching each index in an array one by one) works almost everywhere but it is not optimal in many cases. Let's assume, we have a book which has 42949672960 pages. We also have a table of contents. Now we want to read the content on p…
When there is a disconnect between the intentions of their creator and the recipient, when algorithms go awry, they can have disastrous consequences.
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question