02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Tips and Tricks<br />

Contents Glossary Index Troubleshooting<br />

Encrypt Critical Data Used by the Application<br />

All applications at some point require data to operate. Encrypt important<br />

data files or constants used by your program so it will only operate properly<br />

with the <strong>Sentinel</strong> Key attached.<br />

Verify Data Integrity Using ECC Signing and Verification<br />

ECC is a public key algorithm (uses public and private key pairs) based on<br />

discrete logarithms that are much more difficult to challenge at equivalent<br />

key lengths. You can use the ECC algorithm to implement security checks in<br />

the application as follows:<br />

1. Generate a random message.<br />

2. Call the SFNTSign API function to sign this message using the private<br />

key is stored secretly in the <strong>Sentinel</strong> Key.<br />

3. Call the SFNTVerify API function to verifies the signature using the<br />

known public key of the token. If the function returns success, the<br />

correct <strong>Sentinel</strong> Key is assumed to be present.<br />

<strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong> 177

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!