That should be strong enough against full keyspace search attack on our system. Next, we want to work with full bytes this reduces the possible serial keys to 11 byte-long numbers also we want to use 2 bytes of serial key as a key checksum this leaves us with 9 bytes, and we have 9*8 = 72-bit serial keys. Z to prevent user’s confusion let us exclude the letter O which looks like zero, so in the end we have 25 possible letters in 20 positions, that is BigInteger.Pow(25, 20) = $1D6329F1C35CA4BFABB9F561 combinations. So let us develop a serial number generation/verification system with the same usability as the one in the linked article but without any secret algorithms.įirst, our serial numbers should have the form Cryptography discourages systems based on secret algorithms, and relies on open algorithms and secret keys. I stumbled across an interesting link that made me think about a solid serial number system based on strong cryptography.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |