Messages - Crush [ switch to compact view ]

Pages: prev1 ... 31 32 33 34 35 [36] 37 38 39 40 41 ... 81next
176
N.A.N.Y. 2009 / Re: NANY 2009 Release: Crush Cryptonizer
« on: February 27, 2009, 10:02 AM »
Thank you for your hint, Andr3w! I´m only a funcoder who wanted to release just in time some small utils for the NANY challenge and in this phase codechanges can result in problems like this. Coders are still human.
Why don´t you tell me in your first post about this memory-problem :huh:?

After decoding for checking the results I forgot to release them again ... a rather silly error that didn´t influenced the functuality or security, because I filled it with zeroes. I repaired this now in the new release Crush Cryptonizer V1.1b and inserted some other small fixes and security features like the standard keylength setted to a prime number, a shorted output message (only the first 256 Bytes of the file datas are shown). The OTP now deactivates the password field and doesn´t stays in memory till direct deletion. In further releases the OTP can be combined with it. If you selected an OTP and want to release the password field again you only have to press escape in the OTP fileselection dialogue or endecode something with it.

When you aren´t a coder why are you so hot on looking at the full source? Your most important questions should be answered with the encryption routine. I´d say the source declares all impotant by itself. Some variables are created with the dialog and are static as long as it´s not closed again. Functions fill them with file information and endecrypted code. Other tables like the random-number-table of random.org or the calculated salt are directly allocated with new and delete, capsulated in an own class that is directly created before and after endecryption. There´s no magic inside the code :)

I also don´t think I created something new ... all you see is still standard encryptions like +-*/ xors, swaps and shifts .. nothing special, right? I decided not to use fixed slide and coding matrices (that are much faster compared to this with the focus on realtime cryptography) to get some other advantages that I´m paying with a rather slow speed. I only broke all predefined rules of standard encryption routines and so rise the ladder of security.

177
During the last 8 years I get my full versions another way:
Microsoft makes launch-conferences at the release for different product-lines each 2-3 years (developers - all programming languages, website creators and designers and project & business management software). If you visit them you often get expensive new products with full commercial licences for free (sometimes including updates) with additional DVDs containing nearly all powerpoints and videos of all developer-tracks. The only important rule: You aren´t allowed to sell the software, but you can install as example the visual studio up to 5 different computers! Ok, you have to pay a rather small fee to enter them - its cheaper than the products alone - but registering can be only a few 100$ if you get the early-bird registrations some months before.

Not everybody can achieve the BizSpark program, because it´s only for startups and there are some other rules, but i also want to get additional software-support this way if possible :)

178
N.A.N.Y. 2009 / Re: NANY 2009 Release: Crush Cryptonizer
« on: February 26, 2009, 03:11 AM »
Thank you for using Cryptonizer! ;)

I´m still working on many code improvements like a more effective encryption algorithm (there have been some little flaws and especially a bit self modifying algorithm depending on your password), an included memory and filewiper, a new random-number generator, an OTP-Password combiner and I ´m also keeping contacts to other crypto-coders changing ideas. Don´t expect something incredible big from the sourcecode ... I like it simple - you´d be astonished how short it is (take a look at the main enryption loop of Cryptonizer 1.1 in the spoiler - I removed notices, Traces/Testers and alternative code). Don´t think your password/key contains the original OTP/ASCII-code - it´s changed by the random number generator. The code for the key/salt/PW generation is much bigger than this. I know you could make it much faster using modulo masking but then you´ve to use 2^x fixed ranges and don´t take care of odd divisors that makes it easier to bruteforce-crack code. You can read the most important functions in the technical description at the beginning of this thread. I´m actually starting a company and don´t have much time to work on it - but Cryptonizer has a high priority because I also use it for my commercial products licence generator. It´s also taking a lot of time to measure the encryption-strength with crypto-testing-tools. So the new release could take a while.

If you´re a coder: I´m open for each new idea and suggestions!

One thing you should know is that the new version will not be compatible with the actual one.

A little thing I didn´t mention till now and haven´t included in the standard settings:
If you use Cryptonizer for sensitive datas you can improve the actual security by selecting an odd and rather big Key length - this isn´t influencing the encoding/decoding time too much compared to more iterations and the security rises with every single extra character.

Spoiler
for (itercnt=0; itercnt < iteration; itercnt++)
{
 for (int x=0; x<loop; x++)
 {
  swap(ptxt[x % len], ptxt[u % len]);
  swap(ptxt[x % len], Key[u % Keylen]);

  ptxt[u % len] ^= u>>ror1;
  ptxt[x % len] ^= u>>ror2;
  Key[x % Keylen] ^= u>>ror3;
  Key[u % Keylen] ^= u>>ror4;

  ptxt[x % len] ^= Key[(x+u) % Keylen];
  ptxt[x % len] -= Key[(x+(u>>ror9)) % Keylen];
  ptxt[x % len] ^= Key[x % Keylen] ^ u;

  swap(Key[(x+(u>>ror6)) % Keylen], Key[(x-(u>>ror7)) % Keylen]);

  Key[x % Keylen] ^= ptxt[(x-(u>>ror8)) % len];
  Key[x % Keylen] -= ptxt[(x-u) % len];
  Key[x % Keylen] ^= ptxt[x % len];

  u ^= ((unsigned int)Key[(x-iteration^(ptxt[x%len])) % Keylen] ^ PW[((x-Key[x % Keylen]-PWlen) % PWlen)]) * 7 / 3 ^ PW[x % PWlen];
  _asm rol u,ror5
 }
}


179
Post New Requests Here / Re: IDEA: File/Folder Password Encryption
« on: February 23, 2009, 07:42 PM »
You can use for single files Crush Cryptonizer  :-[

180
Living Room / Re: Stop-motion videos
« on: February 23, 2009, 07:39 PM »
I´d say it´s a difference to paint each frame with oil colors. The movie is impressive.

Pages: prev1 ... 31 32 33 34 35 [36] 37 38 39 40 41 ... 81next
Go to full version