Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Encryption and Decrypting Illegally

Posted on 2008-10-01
2
369 Views
Last Modified: 2010-05-18
Hey all

I seen the following link on whilst trying to find out more about encrypting:
http://www.codeproject.com/KB/vb/VB_NET_TripleDES.aspx?fid=70758&fr=26#xx0xx

Anyway, my question is how can you stop somebody creating a dummy DLL with the same naming conventions (assuming of course they havent use obfescution(sp?) to hide things), and decrypting the info with your own libraries?

Does the following section of code (when creating the keys) really help limit that?  And also I'm assuming that you can put any values in for the key and iv?  Or am I wrong?
byte[] key = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 
              13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24};
byte[] iv = {8, 7, 6, 5, 4, 3, 2, 1};

Open in new window

0
Comment
Question by:angus_young_acdc
2 Comments
 
LVL 37

Expert Comment

by:gregoryyoung
ID: 22615557
1) sign your dll ... its a super pain to get around this (i.e. hacking the CLR painful)
2) use public key encryption for any data you want to keep from changing ... they will be able to view the data but not change it.
0
 
LVL 15

Accepted Solution

by:
angus_young_acdc earned 0 total points
ID: 22622954
How do you go about doing 1 and 2?  Would that solve my problem of having the byte key in every form?
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction Hi all and welcome to my first article on Experts Exchange. A while ago, someone asked me if i could do some tutorials on object oriented programming. I decided to do them on C#. Now you may ask me, why's that? Well, one of the re…
One of Google's most recent algorithm changes affecting local searches is entitled "The Pigeon Update." This update has dramatically enhanced search inquires for the keyword "Yelp." Google searches with the word "Yelp" included will now yield Yelp a…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question