On 16/09/2006, at 6:00 PM, Steven Hedgepeth wrote:
would someone please take a couple of minutes to explain why 128 bit encryption works for data but why it can't be applied to some or all of the code of an executable?

Ultimately an executable has to be executed.

At that point it has to be translated into instructions that run on the target machine. A sufficiently low-level debugger can be used to intercept these instructions.

However, the page you linked to does actually suggest this as a delaying tactic (nice link, thanks): "Use encryption of any description, a simple XOR will add about 5 minutes to a crackers progress, commercial and secure schemes like RSA/SHA/ECC etc. can add hours to a crackers progress, it is worth studying the theory of some of these algorithms if you use them and modifying them, since many of the algorithms use constants which can easily be searched for in a disassembly listing."

and, implying similar:

 "Pack your executable using a commercial or freeware packer"
_______________________________________________
Unsubscribe or switch delivery mode:
<http://www.realsoftware.com/support/listmanager/>

Search the archives of this list here:
<http://support.realsoftware.com/listarchives/lists.html>

Reply via email to