Product Registration Key Generation Techniques

803 Words2 Pages

Introduction

Think about the last time you installed software on your computer. At some point during the installation, did it ask you to enter a special code? That code is called a product registration key. The code must be entered to prove who bought the software. If no one had to enter a product registration key, nothing would stop a person from uploading the software onto the internet to allow anyone and everyone to download that software and install it for free. A question that is rarely asked is, “How do the companies come up with all those keys?” There are two primary ways of creating product registration keys: session keys and pre-generated keys.

Session Keys

Session keys are a common technique to generate keys for software that is downloaded from the internet or special ordered. For these types of software, one must register for the software, and the information that was entered during the registration session is used to generate the product registration key. Each piece of information that is entered during the registration session is called a session variable. Those session variables are then entered into a cryptographic hash function. A cryptographic hash function is a one-way mathematical function (meaning from the result it is impossible to determine the input) that takes in a string of characters of any length and puts out a string of characters of a fixed length. Ideally, a cryptographic hash function should always generate the same output given the same input, and two different inputs should never generate the same output. The National Security Agency developed a popular cryptographic hash called SHA-1 that was used by the U.S. Government to encrypt sensitive information. If two user names, regardles...

... middle of paper ...

...thod can be used for any type of software, but there are certain situations that each one is better suited for. When users must register before receiving the software sessions keys are usually easier to generate, whereas if the user is buying mass produced software from a retail store, pre-generated keys are going to be easier to implement. However product registration keys alone are not enough to ensure that no one steals a copy of software. A fundamental rule in computer security is that security is multi-level. So to truly protect software product registration keys are just a single layer of many.

Works Cited
[1] Functions Online, “SHA1,” [Online] Available: http://www.functions-online.com/sha1.html Accessed January 26, 2010.

[2] Cirticom Corp., “ECC Tutorial,” [Online] Available: http://www.certicom.com/index.php/10-introduction. Accessed January 26, 2010.

More about Product Registration Key Generation Techniques

Open Document