Free Encryption with Input Shield 2.0 Download
Current Page: Home > Security > Encryption Software >

Encryption with Input Shield 2.0 Download

Encryption with Input Shield 2.0

License: Freeware Free
Downloads:
Publisher: Alexei Korennykh
File size: 295KB
OS: Windows Vista, 2003, XP, 2000, 98, Me, NT
Date added: 2009-10-27
Homepage: http://netcpp.com
Category: Security

Encryption with Input Shield 2.0 Description

"This program will securely encrypt and decrypt data."


This program will securely Encrypt and Decrypt data. Most importantly, its True Input Shield eliminates the weakest
link in securing the data - the password entry point. By using lookup tables proposed by Florencio and
Herley, it is possible to exclude password stealing possibility altogether.
The built-in proxy emulation described in the above paper ensures that the data can be accessed
without revealing the password, even on a computer that is known to run malware and hardware designed to
steal the password during communication Between the user and the program.
1. Technologies used

1.1. Data Encryption
AES-256 method provided by the .NET framework is utilized in this program.
AES-256 is an accepted standard in cryptography and has not been compromised by anyone.
Read more on AES256 on Wikipedia website

1.1.1. Password hashing algorithm
SHA-512

1.2. True Input Shield (password stealing disablement via lookup tables)
Brute force attacks on passwords are losing their popularity to keyloggers. These programs record events on a computer including
- Mouse movement
- Keys pressed
- Screen shots
- Clipboard contents

1.3. Random Numbers
The lookup tables and many other functions of the program rely on high-quality Pseudo-random numbers.
Mersenne Twister is implemented and used in this program for pseudorandom numbers. Long
successive blocks of random numbers are prevented by frequent skips and re-seedings (hash function).

2. In use

2.1. Trusted Computer
In "Trusted Computer" mode, password for Encryption And Decryption is entered directly as plain text. Typed
text is visible when selected.

2.2. Unknown Computer
This mode assumes that computer reports every key it receives as well as other system values
(mouse motion, full screen images, clipboard content) to an Attacker. you can free download Encryption with Input Shield 2.0 now.

Encryption with Input Shield 2.0 Keywords

Encryption with Input Shield 2.0 Related Software

Encryption with Input Shield 2.0 Publisher's Software

    Popular Searches

    decrypt data

    Software by Letter

    A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

    New Release Software