You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Symmetric hardware algorithms GSII64 and AES128 are implemented in Guardant dongles. They perform hardware encryption of small volumes of data (Small size of converted data is based on the relatively low speed of hardware algorithm operation. Big size of data can significantly slow down protected application.). See Section Hardware Algorithms for more information on symmetric algorithms.

Previously encrypted data can be stored in a protected application or separate files and decrypted right before use.

GrdCrypt function is used for calling a symmetric algorithm from within the application. See Guardant API help system (GrdAPI.chm) for more information on Guardant API operations.

GrdUtil.exe provides an easy-to-use service for preparing the encryption data in advance. You can encrypt and decrypt information using this utility. The prepared data is further used for application protection.


Preparation of data for encryption

Select the required symmetric algorithm from the list of fields of Mask Editor and execute command Dongle | Encryption. Encryption by algorithm No.N (N is the index number of GSII64 algorithm) dialog box will appear on the screen:

PICTURE

Define the following parameters in the dialog box:

  • Input data and their type
  • Initialization vector
  • Output data and their type
  • Direction and method of encryption
  • Programming language (if output data are presented as source code)

Input data

Initialization vector

Output data

[Execute] button

Programming language

Encryption and decryption

Encryption Method

 


Performing encryption

Clicking [Execute] button located in the top part of the dialog box initiates the encryption.

Writing mask data into dongle memory

The utility requests for confirmation of writing the mask data into the dongle before the encryption is initiated:

PICTURE

Preliminary writing of mask into dongle is required if a new algorithm is used or an algorithm with changed determinant. 

Saving report

After that the encryption report saving dialog box will appear on the screen where filename (report.rep by default) and path should be specified.

The encryption report is a text file generated according to the syntax rules of the selected programming language. The report contains statistical information on encryption parameters & sets password in the form of array:

PICTURE 

Process of encryption

After saving the report a progress bar will appear on the screen.

The encrypted data are saved in the specified file in the form of array or sequence of bytes.  


Decryption

The process of decryption is similar to the process of encryption (see above). The input data here is a file with encrypted data. The direction of encryption is changed to decryption (Command list).

Important information

For correct decryption of data you need to use the same algorithm, an initialization vector and method of encryption that were used for encryption.

  • No labels