Primary Cryption*
A
proposed
new way to do Extreme Encryption.
Still being
analyzed by the experts.
If you choose to
trust it, it may be OK for only a limited time.
Or
it may be OK for quite a long time.
To be
determined....
The method typically
involves thousands of prime numbers, chosen from a library of more
than 200 million. How many different ways are there to do
that? Each prime is used in a simple way to rapidly generate
minimally "pseudorandom" numbers. These numbers are
combined in a unique way while scrambling your data, to greatly
increase the degree of randomness that any cryptanalyst will
encounter. Full details exist in the Open Source code that is
downloadable with the executables (but a great many details can also
be found here).
To try it out (for "Win32" environments
only, so far -- but that ranges from Windows 95 to Windows XP, and
WINE under Linux), first download the .zip
file. Extract the contents of that file to any directory
you like. One of the files is named "prmpress.exe".
Double-click on it to activate it; it will create the library of more
than 200 million primes (compressed). YOU WILL NEED DISK SPACE
FOR THAT
LIBRARY: One of your computer's disk drives must have about 105
megabytes of space. The library creation process generally
takes less than 15 minutes on most recent personal computers, and
only needs to be done once.
Next, run the program named "cryption.exe".
The library of primes must exist before this program can be
run -- which is a fairly simple tool to encrypt/decrypt
data files.
It will ask you to type/enter the name of a "key" file.
This can be almost any file in your computer, provided that it is
longer than 8300 bytes, and you can specify it in 48 characters of
typing. For example, a Key file cannot be located in the
directory
C:\PROGRAM FILES\ADOBE\ACROBAT
5.0\READER\PLUG_INS\
because that is too many characters.
But you can use Windows Explorer to create a C:\TMP directory, copy
any file you like to it, rename it, and then type something like
C:\TMP\ANYFILE.RND to specify it as the Key file. Well, it
still must be longer than 8300 bytes. After you do that, the
program will ask you if you want to delete the Key file -- if it is a
copy, then why not?
Then the cryption.exe program will ask
you to specify one or more files to encrypt (or decrypt). It
asks for an "extra randomizer" number, which can be
anything from 0 to 9999999 (just under ten million, no commas).
It asks for a file name (again limited to 48 characters, but again
you can copy and rename it if needed). It asks if you want to
Encrypt or Decrypt, and it asks if you want to delete the specified
file when all work is done. Yes, you can use "Decrypt"
to actually-encrypt an initial file.
When you see the option
(M)ORE/(A)CCEPT, you can either specify another file to process, or
tell the cryption.exe program to process any file(s) you have already
specified. Depending on (1) how large the Key File is, (2) how
big the Extra Randomizer(s) you chose (3) how many files you are
processing, (4) how large are those files, and (5) the speed of your
computer, the program may take anywhere from a few seconds to several
minutes or even hours to do its work (but seconds-to-minutes is
typical). It automatically exits when done. Each encrypted
file is longer than the original by about 150 bytes, and is given the
extension ".CRP". Files that are encrypted multiple times "look"
just like singly-encrypted files and do not grow in length.
Nevertheless, the program can recognize when processing has restored a
file to its original content (the added bytes are removed), and all
restored files will
also have their file-extensions restored.
To reverse the process for a
particular scrambled file (say the 3rd), you need the same Key File,
the same Extra Randomizer(s), and the same (two) predecessor-files
(with .CRP extension is OK). BE CAREFUL! You may want to
copy the predecessor files before decrypting that third file
(otherwise the predecessors may become decrypted when not desired, or
even unexpectedly doubly-encrypted -- although starting with the 1_1_0
Release of the program, a way exists to prevent that; see it for the
details). And you must specify the
opposite encryption/decryption process, of what was originally done
to that third file, of course. It is recommended that no more
than two files be processed at a time, until you become comfortable
with the way to use cryption.exe -- then feel free to scramble many
files at a time. Yes, one reason this is a SourceForge project
is to create a program to make it easier to keep track of
encryption/decryption "key" information. No estimate
is yet available, regarding the completion date of that program.
Finally, at this time the most complete
documentation available for the cryption.exe program is to be found
within the source code file "cryption.c", which you may
have noticed was included in the downloaded .zip file. There
are hundreds of lines of descriptive commentary there, distinct from
actual code. Just about every question you might have, about
cryption.exe, should have an answer somewhere in there.
Enjoy!
If proves worthy:
*The SourceForge and "Support this
Project" logos are the property of
Open Source Technology Group.
The
name "Primary Cryption", especially in the
mixed-up-numerals logo form presented on this page,
is reserved
for use ONLY in conjunction with the "cryption" program
suite (.zip
file) also described on
this page, and any
enhanced descendants.