Software Protection by Combining Hash Function with Hardware Identifications

Main Article Content

ایاد عبد القھار عبد السلام فاتن صادق خزعل

Abstract

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.

Article Details

How to Cite
“Software Protection by Combining Hash Function With Hardware Identifications”. Journal of the College of Education for Women, vol. 25, no. 2, Feb. 2019, https://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/774.
Section
Articles

How to Cite

“Software Protection by Combining Hash Function With Hardware Identifications”. Journal of the College of Education for Women, vol. 25, no. 2, Feb. 2019, https://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/774.

Publication Dates