Here are the basic steps to creating a unique key:
The key consists of several parts, separated by a special symbol to facilitate parsing, the meaning of which is hidden from the end user and understandable only to the application. The table below shows the name and purpose of these parts.
Part | Description |
---|---|
Data | Content of encrypted expiration date and application data (optional). This embedded data can be recovered after successful key verification. |
Hash | Checksum of key expiration date, encrypted application data, and environment identifiers. Ensures the validity of the key during verification. |
Seed | The initialization value that was used to encrypt the data. Allows to generate unique keys every time to increase cryptographic strength. |
Here a tutorial: https://github.com/ng256/Activation-Key