"Encrypted" stored procedures aren't really. There are several utilities and stored procedures you (and your pirate) can download to decrypt them.
From previous experience: if one tries hard to fight off piracy using encryption, keys and the like, all one gets is a product that is sometimes less efficient, usually harder to maintain, and almost certainly cracked. So... my advice is to take piracy as a
recognition of a good product, and move on.