您好,欢迎访问三七文档
软件加壳技术及实现摘要当今盗版软件的泛滥成灾几乎已经成为了我们中国民族软件的灾难,为了防止软件的非法复制、盗版,保护软件开发商的利益,就必须对软件进行加密保护。现在市面上有许多反盗版软件,但这类软件多是单机处理,并且只使用简单的加密手段,很容易被解密者破解。本文描述了一个通过Internet,集加密和电子注册于一身的完善的软件保护方案。该方案基于多种密码学意义上可靠的算法,如对称加密算法,散列算法,数字签名,密钥交换等等。通过对Windows下PE可执行文件的结构及载入机制进行深刻的剖析,巧妙的使用这些密码学算法及多种反破解方案对PE文件进行加密保护。在该方案的实现中,使用CryptoAPI中的数字签名算法RSA,加密算法RC2和RC4,散列算法SHA,同时自己编写了使用了MD5算法用于快速计算大量数据的摘要;网络接口使用WinSocket;编程语言选用汇编语言和C++混合编程方式;反破解方案有检测文件完整性、检测代码完整性、反跟踪、反-反汇编、反Dump、代码变形等等。由于使用了可靠的密码学算法,使软件加密的强度大大提高;由于使用了Internet在线注册方式,用户使用也非常方便。关键词加密;数字签名;散列;反跟踪;电子注册SoftwareProtectiontechniqueanditsrealizationLEIPeng(GuiLinInstituteofElectronicTechnology.TheDepartmentofComputing)AbstractThefloodingofpiratesoftwarehasbeenacalamityofournationalsoftwareindustry.Inordertopreventsoftwarefrompirate,andprotecttheprofitofthesoftwaredeveloper,theymustencrypttheirsoftwaretogetaprotection.Thereareseveralsoftwareprotectiontoolsinthemarketcurrently,butthesetoolswerestandaloneninetenths,andtheyonlyusedsimpleencryptionalgorithms,sotheycouldbecrackedeasilybythecrackers.Thisthesisdescribesaperfectsoftwareencryptionandprotectionschemewhichintegratetheencryptionandelectronicregister.Thisschemeisbasedonmultiplereliablecryptographicalgorithmssuchassymmetricencryptionalgorithm,digitalsignature,hashingandkeyexchange.ThePEfileformat(PortableExecutableFileFormat)anditsloadingmechanismunderWindowsaredissectedthoroughlyinthisthesis.Thenthesecryptographicalgorithmsandseveralanti-crackmethodareusedgracefullytoencryptandprotectthePEfile.Withintherealizationofthisscheme,theRSAdigitalsignaturealgorithm,RC2andRC4encryptionalgorithm,SHAhasingalgorithmetcinMicroSoftCryptoAPIareused.Inordertoincreasetheperformaceofcaculatethedigestoflargenumberofdata,MD5hashingalgorithmwasrewritten.WinSocketAPIisusedasthenetworkinterface.TheblendofC++andassemblyareusedforeasilycontolingthebottomlayerofthesystemandsimplifytheprogramming.Theanti-crackmethodconsitstheintegralizationofthefilechecking,theintegralizationofthecodechecking,andanti-debug,anti-disassembly,anti-dumpandcodemetamorphoseetc.Thereliablecyrptoalgorithmsguaranteethecryptostrength.Asaresultofonlineregister,theretailusersandthesoftwaredevelopersgetconvenience.KeywordsEncrypt;DigitalSignature;Hashing;Anti-Debug;ElectronicRegister目录第一章概述.....................................................................................................................................3第二章密码学简介.........................................................................................................................42.1概念....................................................................................................................................42.2对称密码算法....................................................................................................................52.3公开密码算法....................................................................................................................52.4单向散列函数....................................................................................................................62.5数字签名............................................................................................................................6第三章Windows环境下PE文件简介.......................................................................................73.1WIN32与PE基本概念..................................................................................................73.2PE首部...............................................................................................................................83.3PE文件的导入表...............................................................................................................8第四章当前流行的一些软件保护技术.......................................................................................114.1序列号保护......................................................................................................................114.2时间限制..........................................................................................................................114.3KeyFile保护...................................................................................................................114.4CD-check..........................................................................................................................124.5反跟踪技术(Anti-Debug)...........................................................................................124.6反-反汇编技术(Anti-Disassmbly)..........................................................................124.7软件狗..............................................................................................................................134.8Vbox保护技术................................................................................................................134.9SalesAgent保护技术......................................................................................................134.10SecuROM保护技术......................................................................................................134.11软盘加密......................
本文标题:软件加壳技术及实现
链接地址:https://www.777doc.com/doc-3373664 .html