??? 04/03/04 07:52 Read: times |
#67844 - RE: Code security and reflashing P89C51RB2 Responding to: ???'s previous message |
The better way I was thinking about last night is to hash from a serial number,date.etc.
generating your 128 bit key,then you can use a symetric cipher such as aes in cbc mode or blowfish even.Trouble is you are going to spend more time trouble is you are going to spend more time doing the decrytion than anything else.Or you do it in hardware with an fpga,128 bit blowfish in cbc mode is equivelent to 168 bit triple des and is a lot faster.There is no known crack for blowfish so brute force would take on average 100x10^21 years at one key test per microsecond.Which is conciderably longer than current estimates for the age of the universe. |
Topic | Author | Date |
Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 | |
Simpler method is better | 01/01/70 00:00 | |
RE: Simpler method is better | 01/01/70 00:00 | |
RE: Simpler method is better![]() | 01/01/70 00:00 | |
RE: Code security and reflashing P89C51RB2 | 01/01/70 00:00 |