Documentation

The Documentation will be put on the web in stages.

cRrypto-Secure

Menu Level

Why Needed

Description

Bypass Key Logger
Sub
  • Trojans from Internet can insert key loggers which can read keystrokes of bank passwords or internet shop passwords
  • Find ASCII Character not on Keyboard
 



Fonts Sub-sub
This will enable the user to copy characters to clipboard
Get Window Text Sub-sub This will enable the user to copy characters to clipboard
This will enable user to put characters direct to Message or Password Entry window not using ClipBoard
Clear Clipboard Ctrl+C
There is no function to clear data copied to clipboard This clears the clipboard
Decrypt
Sub

Number of decryption functions to decrypt encrypted message
Encrypt
Sub

Number of encryption functions to ecrypt message
KeyBoard
Sub
Surveillance cameras can watch key strokes and mouse clicks and so determine entered password
  • The value of the keys can be hidden from view
  • Keyboards can be edited and saved
  • Keybords can be loaded:
    • Unaltered Saved Keyboard
    • Modified Saved Keybord
    • Modified Saved Keyboard with SHA
Log Encrypt
Sub
Files or messages sent over the internet can be changed. This can be problematic for legal documents.  An SHA1 log file of the legal documents can check integrity of legal document.  However you need to protect the integrity of the SHA1 log file.  This can be done by encrypting the SHA1 log file and sending this to the legal document recipient.
encryption functions to ecrypt SHA1 log files
Message Ctrl+M
Sub
Windows programs can save parts of entered text to disc when you do not want it to.
This enables the writing of short notes
Enables the Examination of the Clipboard
New Passwords/Dummy Encryption Files
Sub
All Encrypted files can be cracked
Create random files which look like encrypted files
Obscure Files - new routine Sub
  • All Encrypted files can be cracked
  • Server administrator needs to generate passwords for users
  • user needs to generate UN-guessable passwords
  • Different servers need different types of password
  • Modify encrypted files in a manner that can be unmodified.
  • Create lists of random passwords for different types of server
Program Processes Check Sub Need a random generator to create password.  But how unrepeatable is random generator Processes to  create random passwords can be observed for randomness
Single Password list Sub Random Passwords cannot be remembered Functions to create, save, print and copy random passwords
Two Password list Sub Password lists need a remembered password Functions to create, save, print and copy random passwords to a random password list
Write Over Memory Sub Programs work well under lots of memory.  Does it work when memory is limited? Functions to reduce memory to enable programmer to check integrity of program they are writing under conditions of operating system stress