Encryption with Input Shield 2.0
Downloads:
Publisher: Alexei Korennykh
File size: 295KB
OS: Windows Vista, 2003, XP, 2000, 98, Me, NT
Date added: 2009-10-27
Homepage: http://netcpp.com
Category: Security
Encryption with Input Shield 2.0 Description
"This program will securely encrypt and decrypt data."
This program will securely Encrypt and Decrypt data. Most importantly, its True Input Shield eliminates the weakest
link in securing the data - the password entry point. By using lookup tables proposed by Florencio and
Herley, it is possible to exclude password stealing possibility altogether.
The built-in proxy emulation described in the above paper ensures that the data can be accessed
without revealing the password, even on a computer that is known to run malware and hardware designed to
steal the password during communication Between the user and the program.
1. Technologies used
1.1. Data Encryption
AES-256 method provided by the .NET framework is utilized in this program.
AES-256 is an accepted standard in cryptography and has not been compromised by anyone.
Read more on AES256 on Wikipedia website
1.1.1. Password hashing algorithm
SHA-512
1.2. True Input Shield (password stealing disablement via lookup tables)
Brute force attacks on passwords are losing their popularity to keyloggers. These programs record events on a computer including
- Mouse movement
- Keys pressed
- Screen shots
- Clipboard contents
1.3. Random Numbers
The lookup tables and many other functions of the program rely on high-quality Pseudo-random numbers.
Mersenne Twister is implemented and used in this program for pseudorandom numbers. Long
successive blocks of random numbers are prevented by frequent skips and re-seedings (hash function).
2. In use
2.1. Trusted Computer
In "Trusted Computer" mode, password for Encryption And Decryption is entered directly as plain text. Typed
text is visible when selected.
2.2. Unknown Computer
This mode assumes that computer reports every key it receives as well as other system values
(mouse motion, full screen images, clipboard content) to an Attacker. you can free download Encryption with Input Shield 2.0 now.
Encryption with Input Shield 2.0 Keywords
Encryption with Input Shield 2.0 Related Software
- BestCrypt Volume Encryption
BestCrypt Volume Encryption software provides transparent encryption. - IP Address Shield
Hide your IP address while browsing the Internet and protect your identity. - Advanced Encryption Package 2009 Pro
128-2048 bit file encryption, secure file deletion, self-decrypting files - Rohos Disk Encryption
Powerfull and user friendly Disk encryption software - NETCPPcrypt
Encrypt and Decrypt files with AES-256. - Encryption with Input Shield
This program will securely encrypt and decrypt data. - Decimal Watch
Decimal Watch is an interesting application that will display the time - Biochem Lab Solutions
This a complete and secure replacement for a paper laboratory notebook. - AES-256 STRONG Encryption
This program will securely encrypt and decrypt data.
Encryption with Input Shield 2.0 Publisher's Software
Popular Searches
Hot Downloads Software
New Release Software