Unbreakable "top secret crypto," pseudo-random, one-time-pad

Declan McCullagh declan at well.com
Wed Jan 9 08:12:31 PST 2002


>From: "MacGregor K. Phillips" <mkp at ns2.piol.net>
>To: "Top Secret Crypto Admin" <admin at topsecretcrypto.com>
>Subject: Top Secret Crypto
>Date: Wed, 9 Jan 2002 23:48:58 +0800
>X-Mailer: Microsoft Outlook Express 6.00.2600.0000
>
>===========================================
>Press Release by TAN$TAAFL Software Company
>===========================================
>Contact Information:
>MacGregor K. Phillips
>President
>TAN$TAAFL Software Company
>14 Foster St., Banicain
>Olongapo City, Philippines 2200
>
><http://www.topsecretcrypto.com>http://www.topsecretcrypto.com
><mailto:mkp at topsecretcrypto.com>mkp at topsecretcrypto.com
>+63 (47) 222-9703
>===================================
>9 Jan 2002 - FOR IMMEDIATE RELEASE
>===================================
>TOP SECRET CRYPTO - THE ONLY DATA ENCRYPTION PROGRAM TO USE THE ONE-TIME 
>PAD SYSTEM WHICH IS UNBREAKABLE IN THEORY AND PRACTICE.
>
>With the current world situation after the 9-11 terrorist attacks, your 
>freedoms and privacy are under attack as never before by governments 
>around the world, all in the name of "safety". The Fourth Amendment to the 
>Constitution of the United States, in regards to e-mail and the Internet, 
>is being thrown out the window. Protect your right to electronic privacy 
>with Top Secret Crypto, the most powerful data  and e-mail encryption 
>program in the world. Do it now before it is too late and encryption 
>programs are made illegal worldwide.
>
>Top Secret Crypto (TSC) vs. PGP:
>
>  Maximum RSA Key Size:                       PGP: 2,048 
> bits           TSC: 8,192 bits
>  Maximum Conventional Key Size:           PGP:    128 bits           TSC: 
> 5,093 bits - Method 1
>  Maximum Conventional Key Size
>    using a One Time Pad Key 
> File:            PGP:     N/A                TSC: 20,261 bits - Method 2
>  Mximum Key Size Using a True One
>    Time Pad 
> File:                                       PGP:     N/A 
> TSC: Same size as file or e-mail message - Method 3
>
>TAN$TAAFL Software Company announces the release of Top Secret Crypto 
>v1.10 which includes the following new features (Writing, sending, 
>receiving, and reading encrypted e-mail messages just got a whole lot easier):
>
>(1) - Import and export Public Keys through the clipboard in radix-64 text 
>format.
>
>(2) - Encrypt and decrypt portions of documents, or whole documents, 
>through the clipboard.
>
>(3) - Write e-mail messages using a Rich Text Edit Box, encrypt the 
>message into a Top Secret Crypto Encrypted Message, and send it via your 
>MAPI enabled e-mail program. Include file attachments and request a read 
>receipt.
>
>(4) - View the contents of your e-mail inbox, read all messages in text 
>format, decrypt messages that are encrypted, and view the decrypted 
>message in a Rich Text Edit Box in its original format. Reply to, or 
>forward, any message.
>
>(5) - View and manage the contents of your Address Book.
>
>(6) - Send a regular e-mail message using your default e-mail program.
>
>(7) - Select a file to attach to a regular e-mail message using your 
>default e-mail program.
>
>Note: Items 4 thru 7 requires that your default e-mail program support the 
>Simple MAPI (Messaging Application Programming Interface) Protocol, which 
>is used by e-mail programs such as Outlook, Outlook Express, or Eudora. 
>AOL 4.0 and 5.0 do not support this protocol.
>
>Top Secret Crypto is also the only encryption program that lets you create 
>and use True One Time Pad Files for use in encrypting files. A True One 
>Time Pad File provides one byte of random data for every byte in the file 
>you are encrypting. The encryption key is therefore as long as the file 
>you are encrypting. This constitutes a one-time pad encryption system that 
>is unbreakable in theory and practice. Privacy maintained by mathematical 
>law is now a reality.
>
>Using removable media drives that support disk sizes up to 1, 2, 10, or 
>even 20 gigabytes of random data; you can now create your own one-time 
>pads to encrypt files with. Using a new, extremely fast algorithm to 
>generate random data, a 1 gigabyte True One Time Pad File can be created 
>in under 7 minutes on a 400 MHz Pentium II computer (22+ hours on an 
>unregistered version using the original algorithm to generate random data).
>
>Top Secret crypto utilizes RSA Public Key cryptography with key sizes 
>ranging from 480 to 8,192 bits. It's conventional encryption algorithm, 
>used by Methods 1 and 2, strings together 4, 8, 16, 32, 64, or 256 pseudo 
>random number generators to provide extremely large key sizes. This is a 
>stream cipher whose output is considered a pseudo one-time pad. Method 3, 
>which encrypts with a True One Time Pad File, does not use any pseudo 
>random number generators. Each byte in the file is encrypted against one 
>byte of random data in a True One Time Pad File.
>
>Top Secret Crypto provides three methods to encrypt your files and e-mail 
>messages with, each with its own advantages and disadvantages.
>
>Method 1
>========
>A randomly produced session key for the conventional encryption algorithm 
>is encrypted within a RSA Encrypted Integer. Depending on the size of the 
>smallest RSA Key used, Top Secret Crypto will seed 4, 8, 16, 32, or 64 
>random number generators, which require 325-353, 613-669, 1189-1301, 
>2341-2565, or 4645-5093 random bits as the key. As long as the NSA cannot 
>break the RSA Public Key Encryption System, these key sizes should be 
>sufficient. I recommend a public key size of at least 4,096 bits. If you 
>have a fast computer, use 8,192 bits. This should ensure adequate security 
>for the foreseeable future.
>
>The advantages of using a randomly produced session key encrypted within a 
>RSA Encrypted Integer are (1) you can send an encrypted file to one or 
>multiple recipients at the same time and (2) no extra material, such as a 
>True One Time Pad File or One Time Pad Key File, is required to be 
>exchanged between the sender and recipient.
>
>The only disadvantage is if someone ever figures out a fast method of 
>factoring large integers into their prime components. The key to the 
>conventional encryption algorithm can then be extracted from the RSA 
>Encrypted Integer and your file can be decrypted.
>
>Method 2
>========
>A One Time Pad Key File is used to seed 256 pseudo random number 
>generators for the conventional encryption algorithm. This method provides 
>a key space of between 18,469 to 20,261 bits for the conventional 
>encryption algorithm. It is impossible for anyone to ever duplicate a key 
>space of this size. I consider this method 100% secure.
>
>The one advantage to using a One Time Pad Key File is its security. No one 
>can decrypt a file encrypted with a One Time Pad Key File unless they 
>steal a copy of the One Time Pad Key File.
>
>The disadvantages are (1) you can only send an encrypted file to one 
>recipient at a time, and (2) the sender and recipient must have a secure 
>method of exchanging One Time Pad Key Files.
>
>Method 3
>========
>A True One Time Pad File is used to encrypt your file with. This method 
>provides one byte of random data for each byte in the file you are 
>encrypting. The key space is just as long as the file. There are no pseudo 
>random number generators used, just random data. This is 100% secure and 
>cannot be broken in theory or practice.
>
>The one advantage to using a True One Time Pad File is its security. No 
>one can decrypt a file encrypted with a True One Time Pad File unless they 
>steal a copy of the True One Time Pad File.
>
>The disadvantages are (1) you can only send an encrypted file to one 
>recipient at a time, and (2) the sender and recipient must have a secure 
>method of exchanging True One Time Pad Files.
>
>Top Secret Crypto is particularly suited to businesses, (i.e. auditors, 
>newspaper reporters, agents, buyers, troubleshooters, etc.) where the True 
>One Time Pad Files, or One Time Pad Key Files, can be created in house for 
>use by individuals when they go out into the field to conduct their work. 
>They can then send back encrypted reports that are 100% secure from the 
>preying eyes of any government's intelligence agencies, here or abroad.
>
>Most individuals will find Method 1, a randomly produced session key 
>encrypted within a RSA Encrypted Integer, more convenient. After 
>exchanging Public Keys they can immediately start sending encrypted e-mail 
>and files.
>
>To download your trial version of Top Secret Crypto, visit our web site at 
><http://www.topsecretcrypto.com>http://www.topsecretcrypto.com.





More information about the cypherpunks-legacy mailing list