Executing Encrypted Code

Bill Frantz frantz at netcom.com
Thu Dec 19 21:48:42 PST 1996


At 12:08 PM -0800 12/19/96, Peter Hendrickson wrote:
>If each chip has a unique public/secret key pair, and executes
>authenticated code only, there are some interesting implications.
>
>Software piracy becomes difficult, if not impossible.  Code is sold
>on a processor by processor basis.  Code for a different physical
>processor cannot be decrypted or executed.

This makes backup hard.  That is the rock the routine copy protection hit
up against.  There were many, me included, who simply said, "If your
product is copy protected then I will buy from your competitor."


>Viruses are not feasible if the authentication is strong.

So is user written code, public domain code etc.  If there is an
un-encrypted mode for that kind of code, then viruses again become possible.


-------------------------------------------------------------------------
Bill Frantz       | I still read when I should | Periwinkle -- Consulting
(408)356-8506     | be doing something else.   | 16345 Englewood Ave.
frantz at netcom.com | It's a vice. - R. Heinlein | Los Gatos, CA 95032, USA








More information about the cypherpunks-legacy mailing list