monitor file access
+ Reply to Thread
Results 1 to 12 of 12

Thread: EasyCrypt

  1. #1
    Join Date
    Apr 2002
    Posts
    180

    *6Crypt

    Hi to all


    For those of you that would like to use 'FREELY' a very strong
    Double-*6-bits-Key symmetrical block Cipher, to EnCrypt sensitive Data or simply some jpg's or whatsoever, please fell free to try this application.

    [url]http://fmk.virtualave.net/*6crypt[/url]


    take care

    ------------
    fEǚ.法Er
    Last edited by fEǚ.法Er; 07-21-2003 at 11:08 AM.

  2. #2
    Join Date
    Jun 2001
    Posts
    398
    u can use pgpi.org as its free and use public keys as if they were symmetric key wouldn't do any harm as though it is not its real purpose.

    Just keep both the keys secret

    Data.

  3. #3
    mbravo Guest
    I agree with DATA. More important, think twice before trusting your encryption to an unknown binary from the Net. Even if it's perfectly, squeaky clean from viruses and trojans and does only and exactly what it claims, there's no guarantee that the actual crypto is strong enough, since there was no peer review of the code.

  4. #4
    Join Date
    Apr 2002
    Posts
    180
    Originally posted by mbravo
    ........... there's no guarantee that the actual crypto is strong enough, since there was no peer review of the code............
    =====================================

    Hi to all

    > *6Crypt uses algos based on *DES and Rijndael.
    > Both algos are the most communly used and have established a solid rock reputation in this field.
    > *6Crypt is viruses and trojans free.
    > Although I have been writing programs for the past 20 years at a time where the Z80 assembly language was a 'big issue'. I DO NOT write viruses or trojans codes. Young kids would do it better than me.

    > If anyone has enough reading time, please have a look a this
    brief selection related to:

    Cryptographic Compendium
    [url]http://home.ecn.ab.ca/~jsavard/crypto/jscrypt.htm[/url]
    ------------------------------------------------------------------------
    AES alogo
    [url]http://csrc.nist.gov/CryptoToolkit/aes/rijndael/[/url]
    ------------------------------------------------------------------------
    Blowfish algo
    [url]http://www.counterpane.com/bfsverlag.html[/url]
    ------------------------------------------------------------------------
    DES algo
    [url]http://www.aci.net/kalliste/des.htm[/url]
    ------------------------------------------------------------------------



    > From the other hand, if anyone would like to use 'ready-made'
    cryptographic VCL (visual component library) for C++ or even Delphi and integrate them in his/her application, please check these

    [url]http://botan.randombit.net/[/url]

    [url]http://www.crypto-central.com/[/url]

    -----------------------------------------------------------------------



    Whenever I'll have more time I would post a list of more than 250 links to cryptographic issues...



    take care

    -----------
    fEǚ.法Er
    Last edited by fEǚ.法Er; 07-23-2003 at 09:00 AM.

  5. #5
    mbravo Guest
    Fever,

    thanks for the links you posted. In fact, we could assemble a reading list of links on the topic and place it somewhere on the site as a public resource, not only in the forum.

    I certainly didn't imply that your software contains viruses or trojans; I just wanted to point out that generally, an untrusted binary from unknown source is not the best idea, even in general, and even less in sensitive issues.

    Perhaps it would be a nice idea for you to digitally sign your distribution file so people could check the integrity of what they got, and at the same time who signed it. Just an idea, though.

  6. #6
    Join Date
    Apr 2002
    Posts
    180

    ../..

    Originally posted by mbravo
    ..............Perhaps it would be a nice idea for you to digitally sign your distribution file so people.....................
    Hi everyone

    I usually don't provide any external signature to simple tiny programs like this one.
    I ONLY do it if is requested by the party to whom I sell the product, to include additionally an external one.

    However, I have included in the code of *6crypt.exe my own integrity check that insures its authenticity cause the application won't run anymore once it is altered in any way.
    It won't run even if the name of the application was changed!.

    In this latest version v2.046 [url]http://fmk.virtualave.net/*6crypt[/url]
    I purposely added, for the sake of demonstration (and fun), an external signature file that should be kept in the same directory with the exe to make it run.

    After all who cares..., a "real cracker" would spend a day or so, and ends up by disassembling (almost) any application.
    No need to give any proof, just look around you and see the number of cracked applications on the net.......

    take care

    ------------
    fEǚ.法Er
    ----------------
    Last edited by fEǚ.法Er; 07-25-2003 at 11:24 AM.

  7. #7
    Unregistered Guest

    Re: ../..

    hey fever, would you release the code?

    btw, is it available for linux

    jeff

  8. #8
    Join Date
    Apr 2002
    Posts
    180

    Re: ../..

    Originally posted by Unregistered
    hey fever, would you release the code? [
    Why not!


    btw, is it available for linux

    jeff
    Whenever I have a free week or so I might compile it..

    Did you have a look at the new plugin that I've added to v2.048
    [url=http://fever.resourcez.com]*6crypt[/url]
    A simple right click in windows explorer you can directly encrypt/decrypt any file.
    also now it comes with an auto-installer..


    take care
    -----------
    fEǚ.法Er
    Last edited by fEǚ.法Er; 11-09-2003 at 06:23 PM.

  9. #9
    Join Date
    Jun 2001
    Posts
    398
    HI Fever,


    I was lookin at *6crypt.

    Firstly I would like to thank you for writing free software :-)

    There are a few things that may be improved.

    Firstly so many polynomial codes have been implemented for crc-why dont you use just one-whick uses the highest degree polynomail with many ploynomial coeffecients.

    Secondly-the user friendlyness of the program is less-it appears only to be for geeks.

    it is perhaps better to remove all the CRC checkings from the fore ground and do it in the background and when the file is decrypted just check for the crc.If the file is corrupted display an error message to the user and discard the file.

    May be it is also good if you go through some Software Engineering books as you are into making software.
    here is one by ian somerville-it is a pretty good read.

    [url]http://www.amazon.co.uk/exec/obidos/ASIN/020***8*5X/ref%*Dbr%5Flf%5Fw%5Fh%5F%5F*7/202-2825*26-88806*6[/url]

    You may also like to look at digisecrets front end design.It is very navigable and easy to understand.


    Storing passwords in files is a very bad idea.i think that should be looked into carefully.If the password is just stored along with the encrypted data some body can easily retreive the password.It really is not recommded to do password saving and retreival from hard disk.

    Pls make the front end more user friendly.it will be a better product.There is also much more you can do with time.

    Good luck with it.

    I also love that enlarged picture in about

    Regards Data.

  10. #10
    Join Date
    Apr 2002
    Posts
    180
    Hi to everyone

    Was on vacation, sorry for late answering.

    Thank you DATA for your comments, they were very instructive and usefull.

    Originally posted by DATA
    HI Fever,

    ......Firstly so many polynomial codes have been implemented for crc-why dont you use just one-whick uses the highest degree polynomail with many ploynomial coeffecients.
    As you know, *6Crypt (as well as SYMPA) use several protocols in checking CRCs, the user would select the desired protocol for the CRC checking.
    Amongsts those INDUSTRY standards protocols, you can find CCITT X.25, Ethernet, Military Standard *88/*84, ATM, BiSynch, SDLC, HDLC, etc.. They all describe the generator polynomial using a common mathematical representation.

    YOU CANNOT change the polynomial when dealing with INDUSTRY standard protcols, you need to stick to the given protocol including the polynomial and the mask generator otherwise you will get wrong results.

    Besides, all the common generator polynomials used in these INDUSTRY standards protocols have the following properties (Tannenbaum):

    Detect all single bit errors.
    Detect all occurrences of two single-bit errors for frames less than 2n-* bits in length.
    Detect all odd number of bits errors.
    Detect all burst errors with a length less the n.
    Detect all but */2n-* burst errors of length n + *.
    Detect all but */2n other errors.
    (Where n = number of bits in CRC.)

    After all, why worry about the polynomial when you can calculate on the fly with *6CRypt the CRC*6, CRC*2 and the validation all together, for hundreds of files in few seconds?


    Secondly-the user friendlyness of the program is less-it appears only to be for geeks........
    ..........You may also like to look at digisecrets front end design.It is very navigable and easy to understand.
    Tastes, colors, shapes are very subjective topics, you might adore what I dislike and vice versa..

    Do you really think that *6Crypt appears to be for geeks?
    What would you say when you deal with AUTO CAD, MS VISUAL C or some other fine softwares that doesn't have the ugly stereotype look of outlook express?


    Storing passwords in files is a very bad idea.i think that should be looked into carefully.If the password is just stored along with the encrypted data some body can easily retreive the password.It really is not recommded to do password saving and retreival from hard disk.
    Who said that *6Crypt stores the password in the file??

    You can use a passphrase (provided it's >> that 7 Chars and with mixed digits alpha/numeric) or you can use a file as password (provided the file's length L is 7Byte < L < 2.5MByte

    You can simply notice that when you use a file of let's say 2Mb size as a password, *6Crypt does NOT store 2 additional MByte in the EnCrypted file.

    As a matter of fact, irrelevant of the used passphrase length or the password file size, the EnCrypted file will maintain the same length.


    I was very happy answering you DATA, hope you too had a nice vacation after your exams..


    take care
    ------------
    fEǚ.法Er

  11. #11
    Join Date
    Nov 2003
    Posts
    1
    Your url was no good:


    Directory has no index file.
    Browsing this site or directory without an index file is prohibited.

  12. #12
    Join Date
    Apr 2002
    Posts
    180
    Originally posted by Eldridge
    Your url was no good:


    Directory has no index file.
    Browsing this site or directory without an index file is prohibited.
    =================================
    Oops..
    You were trying in nov 200* a url posted end of july 200*.
    things change, they get better hopefully.
    This is a working link for [url=http://fever.resourcez.com]*6Crypt[/url]

    [url=http://fever.resourcez.com]fEǚ.法Er[/url]

+ Reply to Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts