Cryptography: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=204
en-us2016 Maplesoft, A Division of Waterloo Maple Inc.Maplesoft Document SystemSat, 06 Feb 2016 13:41:54 GMTSat, 06 Feb 2016 13:41:54 GMTNew applications in the Cryptography categoryhttp://www.mapleprimes.com/images/mapleapps.gifCryptography: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=204
Byte Frequency Analyzer
http://www.maplesoft.com/applications/view.aspx?SID=153920&ref=Feed
In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.<img src="/view.aspx?si=153920/bytefreq.png" alt="Byte Frequency Analyzer" align="left"/>In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.153920Thu, 12 Nov 2015 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyThe SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions
http://www.maplesoft.com/applications/view.aspx?SID=153903&ref=Feed
The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" (SHA-3) standard in August 2015. The new standard ("Federal Information Processing Standard (FIPS) 202") specifies four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, as well as two Extendable-Output Functions (XOFs), called SHAKE128 and SHAKE256. These functions are based on the Keccak sponge function, designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche. The hash functions are an essential tool for securing the integrity of electronic information and the XOFs offer the added flexibility of having a variable output length. This application contains an implementation of these functions and also of the SHA-3-based Message Authentication Code HMAC.<img src="/view.aspx?si=153903/keccak.jpg" alt="The SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions" align="left"/>The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" (SHA-3) standard in August 2015. The new standard ("Federal Information Processing Standard (FIPS) 202") specifies four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, as well as two Extendable-Output Functions (XOFs), called SHAKE128 and SHAKE256. These functions are based on the Keccak sponge function, designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche. The hash functions are an essential tool for securing the integrity of electronic information and the XOFs offer the added flexibility of having a variable output length. This application contains an implementation of these functions and also of the SHA-3-based Message Authentication Code HMAC.153903Fri, 16 Oct 2015 04:00:00 ZJosé Luis Gómez PardoJosé Luis Gómez PardoMaple Implementation of the Secure Transport Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153863&ref=Feed
An easy-to-use interactive Maple implementation of transport encryption scheme has been presented. It allows to encrypt any file with arbitrary extension stored in the used computer system and in portable memory devices. The encrypted file may contain all 7-bit characters. Therefore, the encrypted file can be securely transmitted over the internet as an e-mail enclosure. The application encrypts also the name of the plaintext file: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. On encryption/decryption in the GUI Text Area the user will see an exhaustive information about the performed task. On decryption, the encrypted file is removed. The presented applications sm128b.mw must have permission to save and remove the processed files. It is worth to know that the secret key in the application is embedded. Thus, any user can embed his own secret key in the application in many ways.<img src="/view.aspx?si=153863/transport.png" alt="Maple Implementation of the Secure Transport Encryption Scheme" align="left"/>An easy-to-use interactive Maple implementation of transport encryption scheme has been presented. It allows to encrypt any file with arbitrary extension stored in the used computer system and in portable memory devices. The encrypted file may contain all 7-bit characters. Therefore, the encrypted file can be securely transmitted over the internet as an e-mail enclosure. The application encrypts also the name of the plaintext file: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. On encryption/decryption in the GUI Text Area the user will see an exhaustive information about the performed task. On decryption, the encrypted file is removed. The presented applications sm128b.mw must have permission to save and remove the processed files. It is worth to know that the secret key in the application is embedded. Thus, any user can embed his own secret key in the application in many ways.153863Wed, 09 Sep 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of Transport Encryption Scheme Using the Secret Key of Length 479 Bits
http://www.maplesoft.com/applications/view.aspx?SID=153841&ref=Feed
An easy-to-use Maple implementation of transport encryption has been presented. It allows encrypting any file with arbitrary extension stored in the used computer system. The encrypted file contains space, alphabetic and decimal digit characters and the following special characters !#$%&'()*+,-./:;<=>?@[]^_`{|}~. These 93 printable characters can be defined by the set {32, 33, 35, seq(i, i=36 .. 91), seq(i, i=93 .. 126)} of byte values. Therefore, the encrypted file can be not only securely transmitted over the internet as an e-mail enclosure, but also protected effectively against unauthorized access. The application encrypts the name of the plaintext file as well: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. The size of the encrypted file is about 22.3% greater than the size of the plaintext file. On encryption/decryption in the GUI Text Area the user will see exhaustive information about the performed task. On decryption, the encrypted file is removed. It is worth knowing that the secret key in the application is embedded. Thus, any user can install his own secret key in the application in many ways. For example, he can change the value of the variable skc and the value of the variable seed in the procedures fne and fnd. The presented applications fed479k.mw must have permission to save and to remove the processed files. For security reason the application worksheet fed479k.mw ought to be stored in the meticulously watched over pen drive.<img src="/view.aspx?si=153841/im.jpg" alt="Maple Implementation of Transport Encryption Scheme Using the Secret Key of Length 479 Bits" align="left"/>An easy-to-use Maple implementation of transport encryption has been presented. It allows encrypting any file with arbitrary extension stored in the used computer system. The encrypted file contains space, alphabetic and decimal digit characters and the following special characters !#$%&'()*+,-./:;<=>?@[]^_`{|}~. These 93 printable characters can be defined by the set {32, 33, 35, seq(i, i=36 .. 91), seq(i, i=93 .. 126)} of byte values. Therefore, the encrypted file can be not only securely transmitted over the internet as an e-mail enclosure, but also protected effectively against unauthorized access. The application encrypts the name of the plaintext file as well: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. The size of the encrypted file is about 22.3% greater than the size of the plaintext file. On encryption/decryption in the GUI Text Area the user will see exhaustive information about the performed task. On decryption, the encrypted file is removed. It is worth knowing that the secret key in the application is embedded. Thus, any user can install his own secret key in the application in many ways. For example, he can change the value of the variable skc and the value of the variable seed in the procedures fne and fnd. The presented applications fed479k.mw must have permission to save and to remove the processed files. For security reason the application worksheet fed479k.mw ought to be stored in the meticulously watched over pen drive.153841Thu, 13 Aug 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of Transport Encoding and Transport Encrypting with the Secret Key of Length 1980 bits Using John Walker's Base 64 Encoding Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153721&ref=Feed
<p>The application uses John Walker's very useful and accessible in the Internet implementation of a fast Base 64 encoding and decoding scheme. Presented worksheet allows to perform fast transport encoding and encrypting of files of an arbitrary format. The secret key in the application is embedded. It can easily be generated using the `keygen` procedure and an arbitrary `password` string. Evidently, many procedures for key generation may be implemented. The user can also himself directly construct the global variables `b2o`, `o2b`, `f2o` and `o2f` used in the encryption/decryption procedures. The code of the application in the startup code region and in the combobox `select action` is stored.</p>
<P><B>Note:</B> For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\transport.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Maple Implementation of Transport Encoding and Transport Encrypting with the Secret Key of Length 1980 bits Using John Walker's Base 64 Encoding Scheme" align="left"/><p>The application uses John Walker's very useful and accessible in the Internet implementation of a fast Base 64 encoding and decoding scheme. Presented worksheet allows to perform fast transport encoding and encrypting of files of an arbitrary format. The secret key in the application is embedded. It can easily be generated using the `keygen` procedure and an arbitrary `password` string. Evidently, many procedures for key generation may be implemented. The user can also himself directly construct the global variables `b2o`, `o2b`, `f2o` and `o2f` used in the encryption/decryption procedures. The code of the application in the startup code region and in the combobox `select action` is stored.</p>
<P><B>Note:</B> For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\transport.</p>153721Tue, 16 Dec 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyA new Approach to Transport Encryption
http://www.maplesoft.com/applications/view.aspx?SID=153715&ref=Feed
<p>Living in the global surveillance era, any internet user should himself organize the secrecy of his communication. Therefore, in the submission, it is shown how to use the base conversion as an effective cryptographic transformation because the statistical structure of the encoded file is quite different from that of the input file. </p><img src="/applications/images/app_image_blank_lg.jpg" alt="A new Approach to Transport Encryption" align="left"/><p>Living in the global surveillance era, any internet user should himself organize the secrecy of his communication. Therefore, in the submission, it is shown how to use the base conversion as an effective cryptographic transformation because the statistical structure of the encoded file is quite different from that of the input file. </p>153715Wed, 03 Dec 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyStrong Cryptographic File Protection Using Base 32 Encoding Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153686&ref=Feed
<p>It has been shown how to implement user-friendly tool for strong cryptographic protection of e-mail enclosures.</p><img src="/view.aspx?si=153686/Patio.jpg" alt="Strong Cryptographic File Protection Using Base 32 Encoding Scheme" align="left"/><p>It has been shown how to implement user-friendly tool for strong cryptographic protection of e-mail enclosures.</p>153686Fri, 10 Oct 2014 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyElGamal E-mail Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153538&ref=Feed
<p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p><img src="/view.aspx?si=153538/image.PNG" alt="ElGamal E-mail Encryption Scheme" align="left"/><p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p>153538Wed, 02 Apr 2014 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyGeneralized byte-oriented fast stream cipher that is resistant to reverse engineering
http://www.maplesoft.com/applications/view.aspx?SID=153499&ref=Feed
<p>A new numerous family of strong, to reverse engineering resistant, and fast byte-oriented stream-ciphers has been presented. One ought to unpack the file gbosc.zip, open the worksheet gbosc.mw in the Maple session, read it and test the application described.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Generalized byte-oriented fast stream cipher that is resistant to reverse engineering" align="left"/><p>A new numerous family of strong, to reverse engineering resistant, and fast byte-oriented stream-ciphers has been presented. One ought to unpack the file gbosc.zip, open the worksheet gbosc.mw in the Maple session, read it and test the application described.</p>153499Tue, 28 Jan 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple `Keyless` Base b Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=149026&ref=Feed
In this submission it will be shown that the convert/base built-in function can be used to create many new tools which can encrypt or decrypt any file selected. Such a tool, named Maple "keyless` base b encryption scheme, allows to determine the admissible number of elements of the set of ASCII decimals which will be present in the encrypted file, and to choose all the elements of this set.<img src="/applications/images/app_image_blank_lg.jpg" alt="Maple `Keyless` Base b Encryption Scheme" align="left"/>In this submission it will be shown that the convert/base built-in function can be used to create many new tools which can encrypt or decrypt any file selected. Such a tool, named Maple "keyless` base b encryption scheme, allows to determine the admissible number of elements of the set of ASCII decimals which will be present in the encrypted file, and to choose all the elements of this set.149026Mon, 01 Jul 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyC64K366 "Keyless" File Encryption
http://www.maplesoft.com/applications/view.aspx?SID=147752&ref=Feed
<p>This maplet application fulfilling the role of the secret key uses base 64 encoding scheme non-linear transformations for encrypting or decrypting e-mailed files. The encrypted files with extension ".e64" contain only 64 characters belonging to the set of base 64 encoding scheme alphabet and 23 characters "()<>[]{}|-*^_!?@#$%&,:;". The application uses original encryption tool named C64K366. The number following the letter "C" means that any encrypted file contains only 64 characters with ASCII decimals belonging to the set {33, 35 .. 38, 40 .. 45, 47 .. 60, 62 .. 91, 93 .. 95, 97 .. 125}. K366 means that the secret key length equals to 366 bits. For proper functioning of the application, the c64k366.maplet must be saved in a location with no spaces in the path name. </p><img src="/applications/images/app_image_blank_lg.jpg" alt="C64K366 "Keyless" File Encryption" align="left"/><p>This maplet application fulfilling the role of the secret key uses base 64 encoding scheme non-linear transformations for encrypting or decrypting e-mailed files. The encrypted files with extension ".e64" contain only 64 characters belonging to the set of base 64 encoding scheme alphabet and 23 characters "()<>[]{}|-*^_!?@#$%&,:;". The application uses original encryption tool named C64K366. The number following the letter "C" means that any encrypted file contains only 64 characters with ASCII decimals belonging to the set {33, 35 .. 38, 40 .. 45, 47 .. 60, 62 .. 91, 93 .. 95, 97 .. 125}. K366 means that the secret key length equals to 366 bits. For proper functioning of the application, the c64k366.maplet must be saved in a location with no spaces in the path name. </p>147752Mon, 27 May 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyBase 64 "Keyless" File Encryption
http://www.maplesoft.com/applications/view.aspx?SID=145918&ref=Feed
Abstract: A "keyless" cipher not using complex mathematical formulas but applying non-linear transformations of base 64 encoding scheme has been described. The word "keyless" means that the encrypting/decrypting application itself fulfills the role of the secret key and should be carefully watched and stored. Presented tool is mainly suitable for cryptographic protection of e-mail enclosures.<BR>
<P>
Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\keyless.<img src="/applications/images/app_image_blank_lg.jpg" alt="Base 64 "Keyless" File Encryption" align="left"/>Abstract: A "keyless" cipher not using complex mathematical formulas but applying non-linear transformations of base 64 encoding scheme has been described. The word "keyless" means that the encrypting/decrypting application itself fulfills the role of the secret key and should be carefully watched and stored. Presented tool is mainly suitable for cryptographic protection of e-mail enclosures.<BR>
<P>
Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\keyless.145918Mon, 15 Apr 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnySafe AES CBC mode directory encryption/decryption
http://www.maplesoft.com/applications/view.aspx?SID=129678&ref=Feed
<p>Meaningful number of people believe that in AES is a secret backdoor (e.g. http://forums.hak5.org/index.php?showtopic=13355, http://www.infoworld.com/d/security/aes-proved-vulnerable-microsoft-researchers-170218). It may be supposed that the backdoor can be generated by the KeyExpansion routine and by the process of executing many times cryptographic transformations. As it is known, the element of the AES algorithm, KeyExpansion routine, processes an entered by the user secret key of 4*Nk bytes, Nk equal either 4, 6 or 8 and generates an expanded key w containing 16*(Nr+1) bytes, Nr denoting the number of so-called rounds equal 10 if Nk = 4, equal 12 in case Nk=6 and equal 14 in case Nk is 8. Such intentional manipulation on the secret key can breed the elimination of many of its bytes, and the eliminated bytes of the secret key may be replaced by the values known to initiates. In the presented application this hypothetic thread is entirely eliminated: the KeyExpansion routine is not used, the value of Nr is equal to 1, thus, the expanded key w contains 32 random bytes, dependent on the user password only. This way the presented implementation can be considered as a secure AES with 256 bit key, which is many times more faster than the conventional algorithm. </p><img src="/view.aspx?si=129678/428741\81fabfc30943ffa4aec8aaff414e3de3.gif" alt="Safe AES CBC mode directory encryption/decryption" align="left"/><p>Meaningful number of people believe that in AES is a secret backdoor (e.g. http://forums.hak5.org/index.php?showtopic=13355, http://www.infoworld.com/d/security/aes-proved-vulnerable-microsoft-researchers-170218). It may be supposed that the backdoor can be generated by the KeyExpansion routine and by the process of executing many times cryptographic transformations. As it is known, the element of the AES algorithm, KeyExpansion routine, processes an entered by the user secret key of 4*Nk bytes, Nk equal either 4, 6 or 8 and generates an expanded key w containing 16*(Nr+1) bytes, Nr denoting the number of so-called rounds equal 10 if Nk = 4, equal 12 in case Nk=6 and equal 14 in case Nk is 8. Such intentional manipulation on the secret key can breed the elimination of many of its bytes, and the eliminated bytes of the secret key may be replaced by the values known to initiates. In the presented application this hypothetic thread is entirely eliminated: the KeyExpansion routine is not used, the value of Nr is equal to 1, thus, the expanded key w contains 32 random bytes, dependent on the user password only. This way the presented implementation can be considered as a secure AES with 256 bit key, which is many times more faster than the conventional algorithm. </p>129678Mon, 16 Jan 2012 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyCBC Mode Fast AES Directory Encryption/Decryption
http://www.maplesoft.com/applications/view.aspx?SID=129039&ref=Feed
<p>The application shows how to implement a Maple wrapper for a binary file executing the AES algorithm about 5 000 times faster than two Maple implementations of this algorithm published in Maple Application Center.</p><img src="/view.aspx?si=129039/CBCdirect_sm.jpg" alt="CBC Mode Fast AES Directory Encryption/Decryption" align="left"/><p>The application shows how to implement a Maple wrapper for a binary file executing the AES algorithm about 5 000 times faster than two Maple implementations of this algorithm published in Maple Application Center.</p>129039Fri, 23 Dec 2011 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyThe Advanced Encryption Standard and its modes of operation
http://www.maplesoft.com/applications/view.aspx?SID=6618&ref=Feed
<p>This is an update, labeled version 1.1, to the existing application The Advanced Encryption Standard and its modes of operation.</p>
<p>Version 1.1: Key generation function and related functions updated to facilitate the use of externally generated seeds. Some minor changes to presentation.</p>
<p>Version 1.0: Implementation of encryption and authentication schemes that use the Advanced Encryption Standard (AES) as their underlying block cipher. These schemes are constructed by using all the modes of operation for block ciphers so far approved by NIST (the US National Institute of Standards of Technology), namely, the five confidentiality modes: ECB, CBC, CFB, OFB and CTR, the authentication mode CMAC, and the "authenticated encryption" modes CCM and GCM/GMAC. The implementation is able to encrypt/decrypt and/or authenticate messages in several formats, including binary files, and we use it to explore the basic properties of these schemes. The implementation contains also detailed explanations of all the procedures used, including the lower level ones, and discusses both the programming and the cryptographic aspects involved.</p><img src="/view.aspx?si=6618/AES_1608.gif" alt="The Advanced Encryption Standard and its modes of operation" align="left"/><p>This is an update, labeled version 1.1, to the existing application The Advanced Encryption Standard and its modes of operation.</p>
<p>Version 1.1: Key generation function and related functions updated to facilitate the use of externally generated seeds. Some minor changes to presentation.</p>
<p>Version 1.0: Implementation of encryption and authentication schemes that use the Advanced Encryption Standard (AES) as their underlying block cipher. These schemes are constructed by using all the modes of operation for block ciphers so far approved by NIST (the US National Institute of Standards of Technology), namely, the five confidentiality modes: ECB, CBC, CFB, OFB and CTR, the authentication mode CMAC, and the "authenticated encryption" modes CCM and GCM/GMAC. The implementation is able to encrypt/decrypt and/or authenticate messages in several formats, including binary files, and we use it to explore the basic properties of these schemes. The implementation contains also detailed explanations of all the procedures used, including the lower level ones, and discusses both the programming and the cryptographic aspects involved.</p>6618Mon, 20 Jun 2011 04:00:00 ZJosé Luis Gómez PardoJosé Luis Gómez PardoMasquerade Mode Protection of Disk Files
http://www.maplesoft.com/applications/view.aspx?SID=102979&ref=Feed
<p> An unbreakable protection system of disk files against unauthorized access has been presented. The system consists in replacing the protected files with an arbitrary file which plays a role of cryptogram and hence MASQUERADE MODE PROTECTION OF DISK FILES has been named.</p><img src="/view.aspx?si=102979/322396\mpdf/mpf/jpgfile.jpg" alt="Masquerade Mode Protection of Disk Files" align="left"/><p> An unbreakable protection system of disk files against unauthorized access has been presented. The system consists in replacing the protected files with an arbitrary file which plays a role of cryptogram and hence MASQUERADE MODE PROTECTION OF DISK FILES has been named.</p>102979Fri, 25 Mar 2011 04:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyColor Image Cryptosteganography
http://www.maplesoft.com/applications/view.aspx?SID=102316&ref=Feed
<p> The application presented allows Maple users to protect<br />files saved in the selected directory against unauthorized <br />access and intentional damage by generating cryptosteganograms<br />which are regular image files of BMP or TIFF format. <br />Unpack the icss.zip file, open the file icssabout.mw<br />and use the application.</p><img src="/view.aspx?si=102316/CS.jpg" alt="Color Image Cryptosteganography" align="left"/><p> The application presented allows Maple users to protect<br />files saved in the selected directory against unauthorized <br />access and intentional damage by generating cryptosteganograms<br />which are regular image files of BMP or TIFF format. <br />Unpack the icss.zip file, open the file icssabout.mw<br />and use the application.</p>102316Tue, 08 Mar 2011 05:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyWAVE Stereo Cryptosteganography
http://www.maplesoft.com/applications/view.aspx?SID=102153&ref=Feed
<p> All contemporary cryptographic algorithms generate cryptogram files containing almost random sequences of characters. This way, any cryptogram file is easy to identify and is susceptible to intentional modification or damage. It is possible to minimize this threat by using mimesis known in nature, namely, by making encrypted files similar to useful plaintext files. The application presented allows Maple users to protect files saved in the selected directory against modification, damage and unauthorized access, generating cryptosteganograms which are regular PCM and ADPCM stereo WAVE files. As it is known, traditional steganography replaces bits of useless or unused data in arbitrary computer files (such as graphics, sound, text, HTML, and so on) with bits of different, invisible secret information. The size of a secret plaintext, hidden in the file, in this case equals to no more than several percents of the size of the file, in which the secret plaintext in embedded. The method presented is much more effective because the embedded information equals to 24.999 % of the size of file in which the plaintext is covered up. Furthermore, the plaintext files are encrypted by means of simple, yet strong stream cipher over GF(256) before conversion into cryptosteganogram.</p><img src="/view.aspx?si=102153/wscsi.jpg" alt="WAVE Stereo Cryptosteganography" align="left"/><p> All contemporary cryptographic algorithms generate cryptogram files containing almost random sequences of characters. This way, any cryptogram file is easy to identify and is susceptible to intentional modification or damage. It is possible to minimize this threat by using mimesis known in nature, namely, by making encrypted files similar to useful plaintext files. The application presented allows Maple users to protect files saved in the selected directory against modification, damage and unauthorized access, generating cryptosteganograms which are regular PCM and ADPCM stereo WAVE files. As it is known, traditional steganography replaces bits of useless or unused data in arbitrary computer files (such as graphics, sound, text, HTML, and so on) with bits of different, invisible secret information. The size of a secret plaintext, hidden in the file, in this case equals to no more than several percents of the size of the file, in which the secret plaintext in embedded. The method presented is much more effective because the embedded information equals to 24.999 % of the size of file in which the plaintext is covered up. Furthermore, the plaintext files are encrypted by means of simple, yet strong stream cipher over GF(256) before conversion into cryptosteganogram.</p>102153Wed, 02 Mar 2011 05:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyUser Friendly Maple Tools for Preliminary Cryptanalysis
http://www.maplesoft.com/applications/view.aspx?SID=98016&ref=Feed
<p>In this application the easy to use tool has been presented. The user can generate histograms, visualizing the main statistical properties of a selected disk file, by means of the mouse only.</p><img src="/view.aspx?si=98016/maple_icon.jpg" alt="User Friendly Maple Tools for Preliminary Cryptanalysis" align="left"/><p>In this application the easy to use tool has been presented. The user can generate histograms, visualizing the main statistical properties of a selected disk file, by means of the mouse only.</p>98016Thu, 21 Oct 2010 04:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyMaplets for Using and Exploring a Symmetric-Key Block Cipher Generating Cryptograms with Defined Set of Characters
http://www.maplesoft.com/applications/view.aspx?SID=34939&ref=Feed
<p>Maplets for Using and Exploring a Symmetric-Key Block Cipher Generating Cryptograms with Defined Set of Characters.</p>
<p>Unpack the file foac.zip, open the file foap.mw and explore the cipher.</p><img src="/view.aspx?si=34939/0\foac/ptf/m.jpg" alt="Maplets for Using and Exploring a Symmetric-Key Block Cipher Generating Cryptograms with Defined Set of Characters" align="left"/><p>Maplets for Using and Exploring a Symmetric-Key Block Cipher Generating Cryptograms with Defined Set of Characters.</p>
<p>Unpack the file foac.zip, open the file foap.mw and explore the cipher.</p>34939Wed, 09 Dec 2009 05:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw Koscielny