We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is a Crypto-Box?

John Lister
By
Updated: May 16, 2024

Crypto-box® is the name of a product produced by Marx Software Security, plus the associated security system. The product is a USB stick that contains encrypt and decrypt security keys that allow software to be used. The system requires the key to physically be in place for the software to operate. The Crypto-box name was previously used for an open source project along the same lines.

The principle of Crypto-box® is a combination of encryption built into software and decryption via a physical USB stick. In effect, the USB stick acts as a key that is needed to unlock the software. Software developers can encrypt their application and supply the USB stick to customers.

The main advantage of Crypto-box® is that it is extremely difficult, if not impossible, to run illegal copies of the software it protects. The design of the USB stick means that the stick itself cannot be copied. This means that even if somebody copies the software, it will effectively be useless to them.

Another advantage of the system is that it is easier to control licensing. Many software applications are sold with a license to use on one machine at any time, but can be legitimately copied onto multiple machines, such as a home desktop PC and a notebook. With Crypto-box, the need to have the USB stick in the machine makes it physically impossible to run the software on two machines simultaneously. Where software is licensed for use across a company, the system can be customized so that a single USB stick can allow the software to work across a corporate network.

The Crypto-box® system uses the Advanced Encryption Standard. This is an extremely secure encryption system that is not only the standard system for US federal government agencies, but is the first publicly available system approved for use with classified documents. AES uses three separate keys, which are 128, 192, and 256 bits long respectively. Each additional bit makes the encryption twice as hard to bypass through sheer guesswork.

The name Crypto-box was once used for an open source project designed to allow either an external hard drive or a second PC to store the data used on a primary PC. The software from the project acts as a barrier between the two devices and allows an extra layer of protection and encryption to prevent unauthorized access. This project was renamed CryptoNAS in 2007 because of trademark issues.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
John Lister
By John Lister
John Lister, an experienced freelance writer, excels in crafting compelling copy, web content, articles, and more. With a relevant degree, John brings a keen eye for detail, a strong understanding of content strategy, and an ability to adapt to different writing styles and formats to ensure that his work meets the highest standards.
Discussion Comments
By NathanG — On Dec 02, 2011

@MrMoody - I think the Crypto-box is useful for its encryption standard alone. Judging from the article, it uses a very high encryption standard. I don’t think any hacker could break it. I don’t know what the standards are for the soft keys, but I think that degree of encryption plus the fact that it’s a physical device make it a perfect solution.

By MrMoody — On Dec 02, 2011

@allenJo - The main reason, I believe, is that these devices have to be shipped to the end user, whereas the software itself can be downloaded easily off the Internet.

That’s a double edged sword actually. On the one hand, you want to be able to make software accessible over the Internet, so that potentially millions of people can download it. On the other hand, they can’t use it without the hardware key, which can’t be downloaded over the Internet.

So what do you do? You bypass the hardware key and go with the soft key approach. It’s a necessary evil for most software developers unfortunately.

By allenJo — On Dec 01, 2011

@everetra - I think it’s a great concept. Frankly, I don’t know why every single software manufacturer on the market doesn’t use dongles.

It’s impossible to emulate USB dongle keys, whereas it’s very easy to create duplicate soft licenses. There are actually key generators on the Internet that will let you create soft licenses for software products.

It’s the reason that software piracy is so rampant and it costs billions of dollars a year. So I ask the obvious question – why doesn’t everyone use dongles?

By everetra — On Nov 30, 2011

I have to say, I have never heard the term “Crypto-box” before. However, I am very familiar with the concept, as I work in the software industry.

It’s a USB key for software, and the generic term for it is “dongle.” It’s a funny name, I know, but that’s what it’s called. It’s a foolproof method for securing your software.

Anyone who uses your product must have the dongle otherwise the software won’t work. We use dongles for our main product line, and if customers want additional licenses for the product, they have to order more keys.

We charge a unit cost for each of these keys and make a little extra gravy money on the side that way too – although the keys themselves don’t cost that much. We buy them from a supplier of dongle keys.

John Lister
John Lister
John Lister, an experienced freelance writer, excels in crafting compelling copy, web content, articles, and more. With...
Learn more
Share
https://www.easytechjunkie.com/what-is-a-crypto-box.htm
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.