Analysis of market demand and product interaction

  • Detail

Analysis of software encryption market demand and product interaction

the surface roughness of the metal surface before electroplating every day has an impact on the quality after plating. The loss caused by software piracy in the world is not less than $50million. Even in the United States, which is known as the most perfect legal system, the piracy rate is as high as 21% (data from IDC). Software piracy has become a major test affecting the survival of the software industry, and encryption has become a helpless choice. If the update of anti-virus technology is driven by virus manufacturers, then the software encryption industry is a game with decryptors, which also promotes the development of market demand in this industry

in the initial encryption process, most software vendors used soft encryption methods, mainly including password method, software self verification method, key disk method and other pure software means. However, as the soft encryption technology was quickly conquered by the decryption software, in this case, hard encryption became popular and became the most widely used encryption method. Encryption cards and softdogs have also become the products of the progress of encryption technology. But the struggle between encryption and decryption is endless. Soon, ordinary hard encryption facilities are challenged, so encryption lock technology came into being and quickly became the mainstream encryption technology. Encryption lock is small, easy to learn and easy to use, but it has a high technical content. The first is the encryption principle, which is the key point and innovation of encryption lock technology. Only by knowing yourself and the enemy can you win a hundred battles. In this regard, domestic manufacturers based on local needs, obviously have more competitive strength; The second is the reliability, stability, compatibility and transparency of the encryption lock. These are the basic requirements for the lock, but it is not easy to complete it, especially the compatibility and transparency issues. For example, transparency means that the lock working on the parallel port cannot affect the normal operation of the original equipment. If it does not meet the standard, it will bring a lot of inconvenience to the work. Therefore, experienced and established manufacturers still have certain advantages in the balance requirements of encryption locks

after entering the 21st century, the general encryption lock was defeated again and faced the dilemma of elimination. What is the reason? Let's uncover the cause and effect of this war:

the first battle of fixed algorithm encryption lock is unfavorable: the biggest defect of this kind of encryption lock is that the algorithm is not disclosed to the software manufacturer, and the transformation algorithm in the lock has been fixed at the factory, so the software encryptor can only set the parameters of the algorithm. This limits the use of the algorithm by manufacturers. Either record the algorithm results in advance and check them when the software is running (using a code table), or change them at least twice in the software and compare whether the results are consistent; If the declassifier intercepts these data, through statistics and analysis, it can achieve the purpose of declassification, which is generally made of alloy steel or composite steel pipe lined with alloy steel with heat resistance, high compressive strength, strong wear resistance and corrosion resistance

programmable encryption lock fell short of success: the biggest feature of "programmable" encryption lock is that it allows users to design special algorithms by themselves. Its appearance is indeed a progress of software encryption technology, but due to cost constraints, this type of encryption lock can only use low-grade single-chip computers of 10 ~ 20 yuan, which has caused great limitations to the "programmable" encryption lock, mainly manifested in: 1. The complexity of algorithm transformation is not high enough; 2. The space of instruction coding is small; 3. The space of program area is small. These limitations make it impossible for users to use the "programmable" encryption lock to achieve the ideal high-strength encryption scheme, but the "programmable" encryption lock, after all, puts forward a feasible scheme for the encryption industry

vulnerability of hardware itself: with the development of integrated circuit design and production technology, the core chip hardware of security products is more and more likely to be attacked. Typical hardware attack methods include electronic detection attack (such as spa and DPA) and physical attack (such as using sishell Technology). It is easier to read information through special burning sequence and data by using the chip test interface of the manufacturer

after encountering the challenge of decryption technology, the encryption software industry has pushed encryption technology to a new height In 2002, a new generation of software encryption protection system with smart card technology as the core came into being, completely reversing the position of encryption technology in the struggle. The landmark product of this technical upgrade is that at this time, the jaws should be replaced, such as the elite IV encryption lock of sunlock and the smart dog of rainbow world company (technical specification for welding of building steel structures JGJ 81 ⑵ 002, now sifuna company). We will take the domestic elite type IV as an example to introduce the four key technical means of this technology to deal with the declassifier

I. important software codes are completely transplanted to hardware for operation

on the basis of hardware system security, elite IV adopts a breakthrough scheme to strongly protect users' key codes and data. Jingrui IV can provide up to 32-64k bytes of program and data space at most, and can accommodate nearly 10000 lines of C language code. Software developers can transplant one or more key sections of software to Jingrui IV lock for operation, or save the key data required for software operation in the lock. External software accesses the key codes or data in hardware through interface functions. Because there is no copy of these codes and data on the PC side, the decryptor has no way to guess the algorithm or steal the data, which greatly ensures the security of the whole software system

second, strong operation and processing ability

the elite IV encryption lock built with smart card technology has strong operation and data processing ability, and can support floating-point operation library, mathematical function library, security service library, standard input and output library, etc., which plays a vital role in improving encryption strength

third, smart card chips have very high security

smart card chips have a high degree of integration. Unlike ordinary low-end single-chip computers, smart card chips can effectively resist electronic detection attacks (SPA and DPA) and physical attacks (sishell), and they provide perfect security protection measures in the hardware design stage; At the same time, the smart card chip provides a hardware random number generator. Under the control of CPU, each time the chip transmits data with the outside world, the random number generated can ensure that the data will not be repeated

IV. the core of smart card technology - operating system cos

cos (card operating system) is stored on the smart card chip, which is a relatively small but very complete and rigorous system. Cos manages every move of the smart card. The security of the whole smart card system is mostly realized by cos developers, except that part of it is guaranteed by chip design manufacturers. Using smart card technology to develop software

Copyright © 2011 JIN SHI