Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 976 Categories, Downloaded 29.875.588 Times

twocrypt 2

  Date Added: February 02, 2010  |  Visits: 781

twocrypt

Report Broken Link
Printer Friendly Version


Product Homepage
Download (78 downloads)

twocrypt provides a crypto tool with a deniable encryption option. twocrypt (2c) is a tool for the ultra-paranoid, providing a traditional crypto, but also an option of deniable (subpoena-proof) encryption. It encrypts one or two files at once. Each file can be recovered with its respective passphrase, but the presence of more than one file cannot be demonstrated, and the presence of this option alone should not be a credible argument for data hiding. 2c2 is a simple symmetric file encryption utility. It comes with an interesting optional feature - it is capable to embed an additional file within an encrypted data. This is done in a way that cannot be detected without knowing the passphrase protecting the "hidden" file, even if the password for the primary file is disclosed. The design is such that the fact of using this method alone does not constitute a credible evidence of data hiding (IANALBMSUTDO). This kind of encryption is also called "subpoena-proof" or "deniable". There is some previous work in this area. There are two popular approaches, one is to throw away the encryption key, but store some information that can be used to recover the key with a considerable computation effort (several years or so). The concept seems to be risky for obvious reasons, and is also impractical if the data has to remain accessible before the projected cracking date. The other approach is to have a number of containers protected with a number of passwords, of which some but not all might be encrypted data (rubberhose does that). I think its needlessly complex, and usually applied to a storage such as a disk drive. As such, 2c would be the first tool to implement this functionality in a reasonable and practical fasion, at least I think so. Whats New in This Release: - It was possible to tell a two-file result from a single-file output, _statistically_. This does not mean the question can be answered for a particular archive, but single-file archives had a tendency to result in a slightly larger file, and if you have a number of 2c-protected files for which the primary password has been obtained, it can be told how you use 2c. The reason for that was slightly broken compressed pad length logic. Severity: medium - As a cryptographic safeguard, the random pad stream now consists of a random, compressed file of a random length, followed by true garbage. This is to mimick second file scenario more closely, so that if the encryption proves weaker than originally thought, and some statistical properties of a stream can be deduced, theres no exposure. Version 1 always used a full-length compressed pad, which was silly in that its not that common to store perfectly-fit secondary files. Severity: hypotetical issue - In v1, random chunk would seldom get compressed, because the compression algorithm resorted to storing uncompressed data if compression would result in output bigger than input. This is not a flaw per se, but defeats a minor safeguard intended to mimick a file that would often be compressible. Now, encryption of all blocks is forced, even though it might be less efficient. Severity: hypotetical issue - Input blocks are now split randomly to avoid placing compression headers and other known structures at constant locations. This is just another arbitrary safeguard for the algorithm. Severity: hypotetical issue - per Jamess suggestion, I added a counter to the PRNG generator internal state. This prevents a hypotetical (although *extremely* unlikely) generator stall scenario. This spectacularly breaks v1 compatibility, blame James ;-) Severity: low.

Requirements: No special requirements
Platforms: Linux
Keyword: Crypto Data Deniable Deniable Encryption Encryption File Miscellaneous Security Tool Twocrypt
Users rating: 0/10

License: Freeware Size: 13.31 KB
TWOCRYPT RELATED
Book Collection Managers  -  File Attributes Reset Tool 1.6.0
File Attributes Reset Tool is a tiny tool to reset and unhide file attributes on you USB Drive. Sometimes computer viruses hit your USB drives and reset file attributes in your USB drive. You can't find your files and folders anymore. You need...
2.44 MB  
Security Tools  -  Eureka Encryption Global Edition 6.0
Eureka Encryption Global Edition contains file encryption, multiple encryption, merge encryption, multiple file encryption, embedded applications (Crypt Words, Steganographer, Interface) and other tools such as a file shredder and scrambler....
5.5 MB  
File Security  -  USB Flash Security 4.1.12.17
Add encryption to USB Flash Drive on the market. It locks by the password by only removing! Data in a USB Flash Drive is protected by a password.Useful Security Tool. Features: [Install on USB Flash Drive] Install the tool which is for unlocking...
8.79 MB  
Libraries  -  Kettle 2.5.0
Kettle comes from Kettle ETTL Environment is a meta-data driven ETTL (Extraction, Transformation, Transportation, and Loading) tool. This means that no code has to be written to perform complex data transformations. It is possible to create...
69.2 MB  
Utilities  -  Advanced File-system Editing Tool (AFET) 1.0
The AFET (Advanced File-system Editing Tool)uses Java regular expressions to modify a File-system.
1.2 MB  
File Security  -  Cryptainer LE Free Encryption Software 10.0.0
Cryptainer LE totally free 448 bit disk encryption software. Simple, easy to use free encryption software that creates encrypted "vaults". One can store any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any...
7.33 MB  
Backup Utilities  -  MEO File Encryption Software 2.12
MEO is a powerful data encryption software to encrypt or decrypt files of any type, including Microsoft Word, Excel and PDF documents. MEO allows you to protect your sensitive data against un-authorized viewers and is completely free for...
473.09 KB  
Security Tools  -  Cryptainer LE Encryption Software 9.1.0
Cryptainer LE Ttotally free 128 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any...
7.17 MB  
File Security  -  Cypherix LE Free Encryption Software 11.7.0.0
Cypherix LE Ttotally free 448 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cypherix LE allows you to encrypt any file or folder on any Windows...
18.84 MB  
File Security  -  Cypherix LE Encryption Software 10.0.0
Cypherix LE Ttotally free 448 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cypherix LE allows you to encrypt any file or folder on any Windows...
8.21 MB  
NEW DOWNLOADS IN LINUX SOFTWARE, SECURITY TOOLS
Linux Software  -  Polling Autodialer Software 3.4
ICTBroadcast Auto Dialer software has a survey campaign for telephone surveys and polls. This auto dialer software automatically dials a list of numbers and asks them a set of questions that they can respond to, by using their telephone keypad....
488 B  
Linux Software  -  Total Video Converter Mac Free 3.5.5
Total Video Converter Mac Free developed by EffectMatrix Ltd is the official legal version of Total Video Converter which was a globally recognized brand since 2006. Total Video Converter Mac Free is a free but powerful all-in-one video...
17.7 MB  
Linux Software  -  Skeith mod_log_sql Analyzer 2.10beta2
Skeith is a php based front end for analyzing logs for Apache using mod_log_sql.
47.5 KB  
Linux Software  -  SLAX 6.0+
Slax is a modern, portable, small and fast Linux operating system with a modular approach and outstanding design. Despite its small size, Slax provides a wide collection of pre-installed software for daily use, including a well organized graphical...
190 KB  
Linux Software  -  GTK+ 2.5
GTK+, which stands for the GIMP Toolkit, is a library for creating graphical user interfaces for the X Window System. It is designed to be small, efficient, and flexible. GTK+ is written in C with a very object-oriented approach. Language bindings...
60 MB  
Security Tools  -  Free AntiSpyware 7.2.5
As powerful and professional anti-spyware software, Free AntiSpyware has ability to detect & stop the latest and most malicious programs that are doing harm to your computer and breaking your privacy. This free spyware remover software helps...
128.08 MB  
Security Tools  -  paraproxy 1.1
paraproxy is a supplement library for paramiko which adds support for SSH2 proxy commands. #md5=0c7041e8d2d7e49b09df526bba3efb28 #md5=1fbb4f888f40a01439ff27458c6210eb #md5=493c0f426e376427c30f3f39ebc8dac1
20.48 KB  
Security Tools  -  pam_smxs 1.6
pam_smxs is a PAM module that authenticates a user using challenge-response. All tokens that support ANSI X9.9 are currently supported and it provides full support for CryptoCard RB1 tokens.
522.24 KB  
Security Tools  -  DoudouLinux 2011-11
DoudouLinux [1] is a system specially designed for children to make computer use as easy and pleasant as possible for them (and for their parents too! [2]). DoudouLinux provides tens of applications that suit children from 2 to 12 years and tries...
964.17 MB  
Security Tools  -  django-auth-ldap 1.0.19
This authentication backend enables a Django project to authenticate against any LDAP server. To use it, add django_auth_ldap.backend.LDAPBackend to AUTHENTICATION_BACKENDS. It is not necessary to add django_auth_ldap to INSTALLED_APPLICATIONS...
30.72 KB