
Other than the fact it is probably from a front for one of Dan Lassiters' Little Rock companies, now owned by Alltel, it's worth a read. large scale enigma encoding is not bullet proof, but it can make your life miserable. I did not take the time to calculate the permutations... I wonder if anyone told them the data recovery teams can pull multiple layers of data off a disc after it has been stripped? FYR, the explanatory text from their front page is below. -- Cyberspace and Information are Freedom! FUCK your WIPO, too. -attila ====================== forwarded message ====================== <HTML><HEAD><TITLE>Enigma Welcome Page</TITLE></HEAD> <CENTER> <IMG SRC="eng2.gif"><BR><BR> </CENTER><CLEAR=ALL><HR><BR> <CENTER><B>Welcome to Enigma & Co.!</B></CENTER><BR> The following text contains various terms that you may not be familiar with. Please refer to the Glossary section for a description of those terms, or feel free to call us for more detailed information on how we can help you with your data security needs.<BR> <BR> A data protection system for businesses and individuals, the Enigma & Co. related products offers security with the means to create personalized encryption schemes in an infinite variety. In addition, the versions include a complete package of security management tools to enable it to be used in a business or office environment under the oversight of authorized administrators. It also provides routines to handle binary encryption and decryption of both text and non text files as well as all the capabilities needed to accommodate BBS, E-Mail and Internet communications. It is for these reasons plus many more which you will discover in using the software why our users think it is the finest cryptographic software ever produced.<BR><BR> In addition, unlike public key and other mathmatical cryptographic programs, there is nothing in the messages and files you encrypt that aids in the deciphering of your data. If you encrypt twenty bytes, then the encrypted file is twenty bytes, containing no clue on how to decipher it.<BR><BR> <B><CENTER> About Enigma & Co.'s Cryptography Products</B></CENTER><BR> Here's some insight into the enormous power and security offered by Enigma & Company's products. You do not need to know all the in's and out's of these features to use it effectively. We've designed our systems to be extremely easy to use. Some of the main features are:<BR><BR> <B>Wheels:</B><BR> Our Enigma's can use from three up to eight wheels at a time. A Wheel is a scrambled dataset of characters that is used by the Enigma systems that your computer randomly creates. There are no limit to the number of WheelSets (datasets of wheels) that you can create. <BR><BR> <B>Usable Characters:</B><BR> Our Enigma uses 83 characters on its text wheels and 256 on its binary wheels. This gives the Enigma user more than six billion more starting text wheel configurations ("shifts") to choose from, each one of which will produce an entirely different encryption. The use of all eight binary wheels, of course, exceeds this number tremendously. <BR><BR> <B>Indicator Word:</B><BR> To make the enciphered message even more difficult to break, our software provides another feature which allows the sender to enter a word or a simple phrase that has the effect of adding a virtual ninth wheel to the text enciphering combination.<BR><BR> <B>Multiple Cryptions:</B><BR> Probably one of the best features of the Enigma products, you have the means of storing your personalized WheelSets and your Schemes and then do cryptions in a multiple fashion, using different WheelSets, different Schemes, and if in text mode, different Indicator words. You can also Cross Crypt, that is encrypting in text (83 character) and then in binary (256 characters). <BR><BR> <B>Parameters:</B><BR>We created even more power over the cryptive process by adding parameters for both Text and Binary which allow the user to define the direction the wheel in each slot will rotate, and the number of turns before it triggers the next wheel to rotate in its predetermined direction. Predefined WheelSets and Schemes are also included as well as data files to save and restore parameter settings. <BR><BR> <B>Passes:</B><BR> The Enigma systems allow the passing each character back and forth as many as 99 times, a device which effectively turns an eight wheel encryption to a 792 wheel encryption or a 891 wheel encryption with an Indicator Word. <BR><BR> <B>Personal Schemes:</B><BR> Added to the above, the Enigma user is not confined to the wheel "wirings" that come with this software. He or she is encouraged to create personalized wheels and schemes, setups that can be tailored for groups of correspondents or individuals. And to avoid the possibility of using the wrong scheme with the wrong person, Enigma allows each special setup to be given a separate file name for later recall.<BR><BR> <B>Slots and Shifts:</B><BR> Each user has the ability of placing different wheels into the slots in whatever order they prefer and then shifting them prior to the cryption process. The act of shifting can in effect create a totally different wheel from the original positions of that wheel.<BR><BR> <B>Shift Ratios:</B><BR> To further complicate the encryption process you can specify the number of shifts the wheels will rotate when it is triggered instead of only one rotation.<BR><BR> <B>System Files:</B>All your system files can be removed (cannot be recovered), transferred and restored either all at once or individually. The system files consist of WheelSets, Schemes, Parameters and Code Book data. <BR><BR> <CENTER><B> About Enigma & Company's Ultra Enigma</B></CENTER><BR> The Ultra Enigma system evolved by the addition of a ten numeric input 'key' in the parameter screen. These ten sets of numbers are used to 'shotgun' the original message anywhere between eight and five hundred plus times its size, depending on the values in those ten 'key' inputs. Ultra hides your data in a sea of data, thus making decoding by brute force an absolute nightmare. <BR><BR> As our system evolved, three modes of cryption were developed and all three are present in Ultra Enigma and can be utilized as part of the operating system. Styles 1 and 2 are one-to-one processing (files are not expanded).<BR><BR> In addition, all sensitive data files used by Ultra Enigma can be Transferred, Restored and Killed (unrecovering them are impossible) leaving your computer useless to theft and misuse.<BR><BR> </BODY></HTML>