Quick preview: |
e-Nigma
PurposeThe e-Nigma is to protect content files (in particular, documents classified against access by third parties). The protection is realized through encryption the contents of a file with 128 bit key of RC4 algorithm, produced with the password entered by the user. In practical terms for the lack of familiarity with the 128 bit key does not allow know the content previously encrypted file. RC4 is a widely used algorithm symmetric key encryption developed by RSA Data Security Inc.. The algorithm uses a key to encrypt and decrypt information and requires a relatively small surcharge calculation. RequirementsMicrosoft Windows 95/98, Windows NT and higher derivatives (Windows 2000, XP, Vista). Internet Explorer 5.5 or higher with 128 bit encryption strength or higher, Windows Mobile 5.0. or higher. FunctionalityThe e-Nigma is integrated in Windows Explorer shell and the email program. Setting the mouse cursor to any file and click the right mouse button causes display the context menu with the command: Encrypt for files with an extension other than ".enigma" or Decrypt - for files with the extension ".enigma".
Rys. 5. Pocket PC version.
Rys. 6. Pocket PC version - integration with explorer.
Fig. 1. Windows Explorer context menu.
Fig. 2. Integration with mail program.
Fig. 3. File decryption.
Fig. 4. View of program main window. DescriptionUser selects a file to encrypt or deciphering. Enter the password confirmation. The password is hashing with MD5 algorithm. Next from the output which obtained from hash programm generate symmetric key with a length of 128 bits or 40 bits - set by the user. At the end of the content of the file is encrypted by chunks using symmetric key RC4 algorithm. The resulting file is the same size as the source. The source file after successful encryption is deleted - see deleting the source file. To restore the contents of an encrypted file you need to know the password used for encryption. Ignorance of terms - Prevents the reproduction of the content of the file. Passwords are not stored in the system. Strength of encryptionAn important issue for safety length of encrypted information is used keys (eg 128 bits). The keys are longer, the harder it is to decrypt the information. It is widely agreed that:
Violations of the key method of brute force (check the possible keys in order):
Technical Data
Encryption Algorithm: RC4.
Platform WIN32 PC:
Platform Windows Mobile 5.0: In preparationThe principles of distribution. TrademarksMicrosoft, Windows - are registered trademarks of Microsoft Corporation. Programming services - visitors: 1683372 |