Solved

Encryption and Decrypting Illegally

Posted on 2008-10-01
2
359 Views
Last Modified: 2010-05-18
Hey all

I seen the following link on whilst trying to find out more about encrypting:
http://www.codeproject.com/KB/vb/VB_NET_TripleDES.aspx?fid=70758&fr=26#xx0xx

Anyway, my question is how can you stop somebody creating a dummy DLL with the same naming conventions (assuming of course they havent use obfescution(sp?) to hide things), and decrypting the info with your own libraries?

Does the following section of code (when creating the keys) really help limit that?  And also I'm assuming that you can put any values in for the key and iv?  Or am I wrong?
byte[] key = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 

              13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24};

byte[] iv = {8, 7, 6, 5, 4, 3, 2, 1};

Open in new window

0
Comment
Question by:angus_young_acdc
2 Comments
 
LVL 37

Expert Comment

by:gregoryyoung
Comment Utility
1) sign your dll ... its a super pain to get around this (i.e. hacking the CLR painful)
2) use public key encryption for any data you want to keep from changing ... they will be able to view the data but not change it.
0
 
LVL 15

Accepted Solution

by:
angus_young_acdc earned 0 total points
Comment Utility
How do you go about doing 1 and 2?  Would that solve my problem of having the byte key in every form?
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

Introduction Although it is an old technology, serial ports are still being used by many hardware manufacturers. If you develop applications in C#, Microsoft .NET framework has SerialPort class to communicate with the serial ports.  I needed to…
Exception Handling is in the core of any application that is able to dignify its name. In this article, I'll guide you through the process of writing a DRY (Don't Repeat Yourself) Exception Handling mechanism, using Aspect Oriented Programming.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now