Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Encryption and Decrypting Illegally

Posted on 2008-10-01
2
Medium Priority
?
394 Views
Last Modified: 2010-05-18
Hey all

I seen the following link on whilst trying to find out more about encrypting:
http://www.codeproject.com/KB/vb/VB_NET_TripleDES.aspx?fid=70758&fr=26#xx0xx

Anyway, my question is how can you stop somebody creating a dummy DLL with the same naming conventions (assuming of course they havent use obfescution(sp?) to hide things), and decrypting the info with your own libraries?

Does the following section of code (when creating the keys) really help limit that?  And also I'm assuming that you can put any values in for the key and iv?  Or am I wrong?
byte[] key = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 
              13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24};
byte[] iv = {8, 7, 6, 5, 4, 3, 2, 1};

Open in new window

0
Comment
Question by:angus_young_acdc
2 Comments
 
LVL 37

Expert Comment

by:gregoryyoung
ID: 22615557
1) sign your dll ... its a super pain to get around this (i.e. hacking the CLR painful)
2) use public key encryption for any data you want to keep from changing ... they will be able to view the data but not change it.
0
 
LVL 15

Accepted Solution

by:
angus_young_acdc earned 0 total points
ID: 22622954
How do you go about doing 1 and 2?  Would that solve my problem of having the byte key in every form?
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is for Object-Oriented Programming (OOP) beginners. An Interface contains declarations of events, indexers, methods and/or properties. Any class which implements the Interface should provide the concrete implementation for each Inter…
Article by: Nadia
Suppose you use Uber application as a rider and you request a ride to go from one place to another. Your driver just arrived at the parking lot of your place. The only thing you know about the ride is the license plate number. How do you find your U…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Screencast - Getting to Know the Pipeline
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question