[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Executing Encrypted Code



At 12:08 PM -0800 12/19/96, Peter Hendrickson wrote:
>If each chip has a unique public/secret key pair, and executes
>authenticated code only, there are some interesting implications.
>
>Software piracy becomes difficult, if not impossible.  Code is sold
>on a processor by processor basis.  Code for a different physical
>processor cannot be decrypted or executed.

This makes backup hard.  That is the rock the routine copy protection hit
up against.  There were many, me included, who simply said, "If your
product is copy protected then I will buy from your competitor."


>Viruses are not feasible if the authentication is strong.

So is user written code, public domain code etc.  If there is an
un-encrypted mode for that kind of code, then viruses again become possible.


-------------------------------------------------------------------------
Bill Frantz       | I still read when I should | Periwinkle -- Consulting
(408)356-8506     | be doing something else.   | 16345 Englewood Ave.
[email protected] | It's a vice. - R. Heinlein | Los Gatos, CA 95032, USA