| The research and development of coal mine safety training system takes the teama lot of time and manpower, which is the crystallization of knowledge, experience,methods, and wisdom. However, the software piracy is rampant throughout the world.We can find a lot of software’s registration codes, crack file, and so on, whichseriously infringe the intellectual property rights of software development, causingirreparable damage to the software developers. Because the use of pirated software isrelated to a wide range of users, intellectual property rights protection has little effecton the protection of software. In order to protect their own rights and interests,software developers must study and develop the software encryption technologyactively, increasing the difficulty of cracking the software.Software encryption technology can be divided into two main categories:software encryption and hardware encryption. Software encryption protects softwarewith specific encryption algorithm by some kind of software protection technology(such as serial number protection). Hardware encryption depends on the specifichardware (such as encryption dog and encryption card) to implement the encryption.Considering the higher cost of the hardware encryption, the vast majority of softwareis encrypted by the software encryption.Based on extensive reading a large number of papers about the softwareencryption at home and abroad, this thesis analyzes the characteristics of commonsoftware protection technology, and focuses on the symmetric encryption algorithmDES and RSA asymmetric encryption algorithms’ principle, concrete implementationas well as their advantages and disadvantages. Specifically, with the full considerationof software serial number protection technology, a method to extract themultidimensional user feature for software registration using the RSA algorithm isproposed in the coal mine safety training software. The DES encryption algorithm hasgood encryption speed and is suitable for encryption chunks of data, while the RSAencryption algorithm is simple and suitable for the key transmission, distribution, andmanagement. Combining these two encryption algorithms will well encrypt thecommunication information between software vendors and users. On the basis of userregistration and authentication, the XOR shift algorithm is further proposed for theflash video encryption protection. Theoretical and experimental results show that theproposed algorithms are accurate, efficient, simple, and practical, playing a very good software system protection effect.Finally, the innovations and deficiencies of this thesis, as well as the future workon software encryption algorithm, are summarized. |