필터 지우기
필터 지우기

How to create a protected file

조회 수: 13 (최근 30일)
Adrián Lascurain
Adrián Lascurain 2023년 5월 28일
댓글: Adrián Lascurain 2023년 6월 1일
I'm currently building a log in app in appdesigner and i need to manage users and passwords within the app, I already found a way to hash the passwords , I just want to know if is there some way to create a file where the hashes are stored in a secure form? like a read only file or a protected file that can not be modified.
I would appreciate your help and thanks in advance.

채택된 답변

Walter Roberson
Walter Roberson 2023년 5월 28일
Not really.
You can embed a SoC kind of computer within a tamper-resistant covering that would be likely to break with all of the common methods of removing the covering. You know the kind, ultra hard resin infused with metal flakes designed to scatter x-rays and ruin MRI. I really don't know the current technologies.
  댓글 수: 2
Walter Roberson
Walter Roberson 2023년 5월 28일
You can do something like use public key encryption of the hash file, and store the decryption key in the executable, hoping that the attackers are not able to figure out the encryption key for the file, so that if the attackers modify the (encrypted) file the program would find that the CRCs of the decrypted data do not match what is expected.
But... that process is only as secure as how hard it is to work out the encryption key, or to compromise the security of a system that has the encryption key stored.
You can store the file in Write Once Read Many (WORM) storage... but how can your program be sure that the WORM storage device has not been replaced with an in-memory copy that has been modified ? Unless, that is, you are working with hardware-encrypted storage and have some way of verifying that the hardware is working and that attackers are not injecting fake data onto the bus lines when they detect a request to read the file...
Remember that when it comes to would-be-secure systems, that sufficiently determined attackers will be willing to literally have a CPU lie to you. For example, attackers have the resources to hack Intel internal CPU serial numbers so even tying your code to specific CPUs is not enough.
Adrián Lascurain
Adrián Lascurain 2023년 6월 1일
Thanks a lot, it really help me with my problem

댓글을 달려면 로그인하십시오.

추가 답변 (0개)

카테고리

Help CenterFile Exchange에서 Programming에 대해 자세히 알아보기

제품


릴리스

R2022b

Community Treasure Hunt

Find the treasures in MATLAB Central and discover how the community can help you!

Start Hunting!

Translated by