TheSwamp

Code Red => AutoLISP (Vanilla / Visual) => Topic started by: nonsmall on September 19, 2013, 12:46:25 AM

Title: [Original] Encrypt Lisp code!
Post by: nonsmall on September 19, 2013, 12:46:25 AM
Command : TT
then Point two points



Part of the code:
Code: [Select]
.............. (CdLbUiHq99)(GxBqQd38)(LtNpWm59)(JiOuTx51)(VkGnXaBsXk90)(LbOoIt61)(GsOtVo76)(RqXyXwMr92)(QtEmEtPg17)(VcAuFp96)(IbLbPnBe62)(PjQeLkWlBv46)(ShXyXiCw40)(ScTuAkMp82)(VbNoErXp65)(LrYmMsMdIj52)(XxXkFbXjKe29)(YnJqGf15)(YmNaJqVs33)(AyVvBhQfAk37)(CrJvUg77)(RkKrBvOy19)(MxMlKdHcSr43)(NrLqEiBpIw43)(FdFbXbPpFq68)(McUgVg77)(UcNuSrUs90)(NkTnQqJc35)(XqEeAaUjLr73)(DpLqLtSqJs17)(NsBqUkMdBs66)(VdJxWuYi42)(JrTiLiPu46)(UlBcEg25)(YrTdYsRnQj14)(NdMmDdPx56)(OlBnHa31)(SpBhEdGdWp5)(WyKsWo84)(XjDqRy71)(LmEtDxTiOm57)(FtNwVbYp79)(JrArEaYj15)(EmPaOiMpNi86)(SmMlSsCa33)(DyNaRiNcTm15)(PwFhPv77)(BuPiJpEy70)(QvMqEh53)(NrYrYfBtGl59)(XjAdBvNbUu68)(WjWmNoOb17)(FdIbUvUgTm66)(QqDnKqIiXg30)(SgHvTaNrUp91)(UmAgPkPn88)(CxKeJoKp92)(KtDgBcVdHv34)(YwCaMlMxPj9)(WjOmYwYs35)(QsGoGpXrGp20)(EaUkWyTd20)(IbQdOlOfWd59)(HrWpGwIh36)(JuYbMr23)(PrCyEo7)(XsNnNdDt92)(OgGtJuWyKd94)(WvNgPx86)(JhEvQtEcPc50)(JnPbFgWy53)(XcRkBeGs35)(KfLcPqDgRx78)(YmDfRx51)(RvBxNcJa47)(HxBlXa86)(DrHoXpVyKg77)(WrJaBm31)(QgPvIt29)(TdTlTlFg9)(KrEfIa21))
Title: Re: [Original] Encrypt Lisp code!
Post by: nonsmall on September 19, 2013, 01:02:05 AM
Another version
Increase the invalid code

Title: Re: [Original] Encrypt Lisp code!
Post by: Kerry on September 19, 2013, 01:12:22 AM

Is there a story to go with this code ??
Title: Re: [Original] Encrypt Lisp code!
Post by: MP on September 19, 2013, 01:23:07 AM

Is there a story to go with this code ??

lol, are you finding his posts cryptic? :D
Title: Re: [Original] Encrypt Lisp code!
Post by: nonsmall on September 19, 2013, 01:24:37 AM
FAS can be decompiled !!!
So I created encrypted programs.
Title: Re: [Original] Encrypt Lisp code!
Post by: Matt__W on September 19, 2013, 08:41:37 AM

Is there a story to go with this code ??

lol, are you finding his posts cryptic? :D
Title: Re: [Original] Encrypt Lisp code!
Post by: VovKa on September 19, 2013, 11:50:22 AM
FAS can be decompiled !!!
So I created encrypted programs.
goog idea
of course it won't stop a hacker but will make his work a bit more difficult
Title: Re: [Original] Encrypt Lisp code!
Post by: ChrisCarlson on September 19, 2013, 02:08:26 PM
Can someone fill me in on the advantages if any to encrypting a LISP file?

If you created it at your place of employment it's the company's property. I can see if you don't want anyone editing it but I've never heard of a coworker editing and breaking a working lisp.
Title: Re: [Original] Encrypt Lisp code!
Post by: dgorsman on September 19, 2013, 02:12:40 PM
One "problem" commonly encountered is a company spends years getting everything just-so.  A new employee comes in, then later quits and moves to another company taking that code and support files with them without asking permission.  Now the new employer is competing on the same grounds without lifting a finger.  Illegal?  Probably not.  Unethical, certainly.
Title: Re: [Original] Encrypt Lisp code!
Post by: Matt__W on September 19, 2013, 02:28:16 PM
People still use AutoCAD??
Title: Re: [Original] Encrypt Lisp code!
Post by: exmachina on September 19, 2013, 03:53:27 PM
Can someone fill me in on the advantages if any to encrypting a LISP file?
...

I can. Without any order defined:
- Protect intellectual property
- This protects the code and therefore prevents modifications
- The modification of the code without the authorization of the company represents a waste of time and money
Title: Re: [Original] Encrypt Lisp code!
Post by: exmachina on September 19, 2013, 04:03:33 PM
People still use AutoCAD??

No, I'm using SolidWorks. But your question does not make much sense, if we only need to edit/view drawings that are not geared to any specific branch of engineering, or do not need specific functions...probably enough with autocad

Anyway most Autodesk products are based on Autocad , therefore the right question is: Who does not use autocad?

sorry if I have not explained it better, but I do not speak English.
Title: Re: [Original] Encrypt Lisp code!
Post by: WILL HATCH on September 19, 2013, 04:28:16 PM
interesting.
it makes my autocad very sad however
Title: Re: [Original] Encrypt Lisp code!
Post by: nonsmall on September 19, 2013, 11:55:34 PM
Thank you for your reply, I am engaged in second development of CAD, but Mine's a free profession,

My encryption technology is my own property.

now I am  engaged in LISP training, many students worried about their programs would be decompiled,

so they asked me for help,   it is the story my encryption technology come into being.
Title: Re: [Original] Encrypt Lisp code!
Post by: andrew_nao on September 20, 2013, 09:02:57 AM

with the amount of knowledge in this forum, if anyone who knows how to code and wants to modify someone elses code, all they would have to do is come here an ask for some help and write their own code thats similar.

i fail to see the logic of coming on here, asking for, or offering help and then encrypt your code so no one else can modify it.

Title: Re: [Original] Encrypt Lisp code!
Post by: cadtag on September 20, 2013, 03:27:44 PM
One "problem" commonly encountered is a company spends years getting everything just-so.  A new employee comes in, then later quits and moves to another company taking that code and support files with them without asking permission.  Now the new employer is competing on the same grounds without lifting a finger.  Illegal?  Probably not.  Unethical, certainly.

If the code was created on company time, or using company software/hardware, then the code is company property.  under copyright law it's a 'work for hire'.  So yeah, Gieseppe Drafter taking a copy with him to his next employer is in fact illegal, and both he and the new employer are probably liable for statutory damages, and or violating trade secrets.  either can get pricy - and doubling them up is bankruptcy worthy.
Title: Re: [Original] Encrypt Lisp code!
Post by: TopoWAR on September 22, 2013, 03:51:18 PM
hello, I imagine using the method of "obfuscation" serious question: the execution of the code will be slow??? thank you very much
Title: Re: [Original] Encrypt Lisp code!
Post by: dgorsman on September 23, 2013, 10:10:10 AM
hello, I imagine using the method of "obfuscation" serious question: the execution of the code will be slow??? thank you very much

That depends on implementation e.g. decrypt to standard LSP content, load decrypted content.  Zero run-time difference to unencrypted LISP, slight delay on loading during decryption process.
Title: Re: [Original] Encrypt Lisp code!
Post by: ElpanovEvgeniy on September 26, 2013, 11:26:55 AM
Another version
Increase the invalid code
Command : TT
then Point two points



Part of the code:
Code: [Select]
.............. (CdLbUiHq99)(GxBqQd38)(LtNpWm59)(JiOuTx51)(VkGnXaBsXk90)(LbOoIt61)(GsOtVo76)(RqXyXwMr92)(QtEmEtPg17)(VcAuFp96)(IbLbPnBe62)(PjQeLkWlBv46)(ShXyXiCw40)(ScTuAkMp82)(VbNoErXp65)(LrYmMsMdIj52)(XxXkFbXjKe29)(YnJqGf15)(YmNaJqVs33)(AyVvBhQfAk37)(CrJvUg77)(RkKrBvOy19)(MxMlKdHcSr43)(NrLqEiBpIw43)(FdFbXbPpFq68)(McUgVg77)(UcNuSrUs90)(NkTnQqJc35)(XqEeAaUjLr73)(DpLqLtSqJs17)(NsBqUkMdBs66)(VdJxWuYi42)(JrTiLiPu46)(UlBcEg25)(YrTdYsRnQj14)(NdMmDdPx56)(OlBnHa31)(SpBhEdGdWp5)(WyKsWo84)(XjDqRy71)(LmEtDxTiOm57)(FtNwVbYp79)(JrArEaYj15)(EmPaOiMpNi86)(SmMlSsCa33)(DyNaRiNcTm15)(PwFhPv77)(BuPiJpEy70)(QvMqEh53)(NrYrYfBtGl59)(XjAdBvNbUu68)(WjWmNoOb17)(FdIbUvUgTm66)(QqDnKqIiXg30)(SgHvTaNrUp91)(UmAgPkPn88)(CxKeJoKp92)(KtDgBcVdHv34)(YwCaMlMxPj9)(WjOmYwYs35)(QsGoGpXrGp20)(EaUkWyTd20)(IbQdOlOfWd59)(HrWpGwIh36)(JuYbMr23)(PrCyEo7)(XsNnNdDt92)(OgGtJuWyKd94)(WvNgPx86)(JhEvQtEcPc50)(JnPbFgWy53)(XcRkBeGs35)(KfLcPqDgRx78)(YmDfRx51)(RvBxNcJa47)(HxBlXa86)(DrHoXpVyKg77)(WrJaBm31)(QgPvIt29)(TdTlTlFg9)(KrEfIa21))

I'm sorry, but this is a very weak defense.
Such protection is much weaker than the vlx and can be broken without the knowledge of AutoCAD any programmer.  I think I'll be able to remove this protection in the five lines of Lisp...  :-(

For protection, I recommend using the unique capabilities AutoCAD.
Using standard and predictable data that is generated in the program will use them as keys for decryption. for example, can be geometrically tangent or other data that are further used in the program. To break such a program would be necessary to examine her work in AutoCAD. This will require a hacker to find a unique knowledge of the designer...