Page tree
Skip to end of metadata
Go to start of metadata

This part describes the details of hardware algorithms: what methods of hacking they are meant to prevent from, how they work, how to use them for converting data and complicating the logic of dongle operation.

Important information

  1. Although hardware algorithm descriptors represent a special case of protected items, hardware algorithms are the main protection mechanism provided by dongles. Therefore, understanding of the essence of hardware algorithm operation and correct use of hardware algorithms for protecting software play the main part in building reliable protection systems and significantly increase the tamperproofness of applications.
  2. Pay special attention to the mechanism of algorithms and to the methods of data conversion using the algorithms.
  • No labels