ietf-openpgp
[Top] [All Lists]

Hidden session key generation & storage

2000-06-11 19:57:22
To all,

This is only slightly related to PGP, however:

I was wondering if there is some "standard" out there that defines how a session key is stored/saved/hidden after a file is encrypted and stored on a computer system using the same key. Ideally, the only thing that *should* be able to decrypt the file is the same computer program that generated the key.

You can play around with binary files, the XOR function, CRC checks, Hashing algorithms and a host of other "tricks" to "make life very difficult" for the reverse engineer, however is there a 100% secure way for an executable to encrypt and store data (to be decrypted later on by the same program)?

TIA.


Regards



Erron Criddle
Comasp Ltd.
ACN: 089 468 682
Level 2, 45 Stirling Hwy
NEDLANDS  WA  6009
Australia

Fax: +61 8 9386 9473
Tel: +61 8 9386 9534
Mob: +414/0414 800 888

ejc(_at_)comasp(_dot_)com
http://www.comasp.com




<Prev in Thread] Current Thread [Next in Thread>