Protecting Source Code
Paul Rubin
http
Fri May 9 17:43:36 EDT 2003
"John Wilson" <tug at wilson.co.uk> writes:
> There are several solutions. One that I have used is the Dallas
> Semiconductor Crypto iButton (http://www.ibutton.com/ibuttons/java.html).
> The private key is held on the tamper proof token and *never* appears in the
> memory of the computer. The decryption occurs on the iButton and the
> cleartext comes back. The button can be programmed to destroy the private
> key after a set date, it runs its own clock off its own internal battery.
Yes, but once the attacker has obtained the cleartext, s/he doesn't
need the private key any more. You're better off running the entire
application inside the button.
More information about the Python-list
mailing list