Secret value protection using Stack Trace Hash
Original Publication Date: 2004-Jul-30
Included in the Prior Art Database: 2004-Jul-30
This article describes how it is possible to encrypt/decrypt data using the hash value (SHA-1 or MD5) of the caller stack trace. The approach is mainly based on the calculation of a polynomial that acts as encryption key generator: only those stack traces that are granted will generate the correct encryption/decryption key; any other stack trace will conduct the calculus to a wrong encryption key.