To all,
This is only slightly related to PGP, however:
I was wondering if there is some "standard" out there that defines how a
session key is stored/saved/hidden after a file is encrypted and stored on
a computer system using the same key. Ideally, the only thing that *should*
be able to decrypt the file is the same computer program that generated the
key.
You can play around with binary files, the XOR function, CRC checks,
Hashing algorithms and a host of other "tricks" to "make life very
difficult" for the reverse engineer, however is there a 100% secure way for
an executable to encrypt and store data (to be decrypted later on by the
same program)?
TIA.
Regards
Erron Criddle
Comasp Ltd.
ACN: 089 468 682
Level 2, 45 Stirling Hwy
NEDLANDS WA 6009
Australia
Fax: +61 8 9386 9473
Tel: +61 8 9386 9534
Mob: +414/0414 800 888
ejc(_at_)comasp(_dot_)com
http://www.comasp.com