Software Protection by Combining Hash Function with Hardware Identifications

  • ایاد عبد القھار عبد السلام فاتن صادق خزعل

Abstract

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.

Downloads

Download data is not yet available.
Published
2019-02-08
How to Cite
فاتن صادق خزعلا. ع. ا. ع. ا. “Software Protection by Combining Hash Function With Hardware Identifications”. Journal of the College of Education for Women, Vol. 25, no. 2, Feb. 2019, http://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/774.
Section
Articles