USB-Privacy: Security To Software Using USB
Keywords:
USB (Universal Serial Bus), Machine Specific, Dongle, Piracy, VendorAbstract
The general way of providing a security to any software or application, is, a key verification. If we share this key and try to use the software on different machines. . We can create the copies of the software. This is basically known as a `piracy`. To prevent such a illegal activities, there are many security applications present in the market nowadays. But piracy prevention can be achieved by simply making it machine specific. The software is provided with USB-drive which is when connected check for the valid machine and allow using the software only on the valid machine. This paper will explain the concept in detail.
References
Cryptographic primitives. “handbook of applied cryptography” by menezes
Modern cryptosystems .Jwezy Wojdylo.September 21, 2001.Cryptography, jerzy wojdylo, 9/21/01. Overview of Classical cryptography.
Public-key cryptography processor, ieee j.Solid-state cir-cuits, vol. …Rsa and ecc Crypto processor.”
Kryptonite-A Programmable Crypto processor
Paul C. Van Oorschot Alfred J. Menezes and Scott A.Vanstone,Handbook of applied cryptography, CRC presses Inc., Florida, 1996.
Bruce schneier, applied cryptography (2nd ed.), johnwiley and sons, inc., New York, 1996.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.