M ASTER  S OFTWARE


QUALITY SOFTWARE SINCE 1958
 

PROTECT YOUR PRIVACY -- PROTECT YOUR SECURITY
with the strongest line of data file and message encryption software available.



          1. CHOOSING A CRYPTOGRAPHIC PRODUCT



               Master Software offers six separate cryptographic products.
          All of them are strong, all of them are reliable, all are easy to
          use, all of them are well-suited to their tasks.  How do you
          choose?


          TABLE OF CONTENTS

          1. CHOOSING A CRYPTOGRAPHIC PRODUCT
            1.1. Messages and Files
            1.2. Distributed Keys
            1.3. No Distributed Keys
            1.4. Authentication
            1.5. Time-Proven Methods
            1.6. Less Typing, Less Memorization



          1.1. Messages and Files


               The first question is, what are you trying to protect?  Are
          you protecting files on a single computer or within a local
          network, or are you protecting messages which will be sent over
          public networks such as the Internet?

               If you need to protect files on your computer, then GK-Crypt
          is the right choice.  It is easy to use, reasonably fast, and
          extremely secure.  In fact, it is the strongest file encryption
          product available outside of the military.  It is stronger than
          many of the encryption products used by foreign governments, and
          far stronger than the encryption used by banks, credit card
          companies, brokerages and similar businesses.

               If, on the other hand, you need to protect messages, we
          offer a choice of three products, MX-Crypt, NK-Crypt and
          OP-Crypt.  The one you choose depends on your setup.



          1.2. Distributed Keys


               If the people or groups who need to communicate secretly are
          already in contact, already known to one another, then OP-Crypt
          is the logical choice.  This is especially true if you already
          have a communications network set up, and you already have an
          established method for distributing secret encryption keys.

               OP-Crypt is the only cryptographic product, from any source,
          which can be considered absolutely secure.  It uses the renowned
          One-Time Pad encryption algorithm, the only algorithm that has
          ever been proven to be unbreakable.  Provided that the keys are
          never revealed, your messages will remain secure and unbreakable
          forever.

               OP-Crypt is fast and easy to use.  Its great advantage over
          all of the competing products is that there is no need to
          distribute keys for each message.  The OP-Crypt package generates
          long, secure message keys.  Only the secret network key and
          station keys need to be distributed, which needs to be done only
          once for each station.



          1.3. No Distributed Keys


               If you need to protect messages, but you do not know
          beforehand who will be communicating, if you do not have a method
          for distributing keys, if people frequently join your network
          with no previous contact with your network hub, or if you expect
          that people already in the field may need to communicate directly
          with each other, then MX-Crypt and NK-Crypt are your best
          choices.  In fact, they are your only choices.  There are no
          other products available anywhere that can establish secure
          communications without any exchange of keys.

               NK-Crypt is based on large prime numbers.  This is a
          technology that has stood the test of time.  (The patent for the
          algorithm underlying NK-Crypt expired in 1993.)  Hundreds of
          mathematicians have tried and failed to break it.  However, it is
          slow, and unsuited for sending long messages or large files.

               MX-Crypt offers the advantage of speed.  MX-Crypt is 2200
          times as fast as NK-Crypt.

               MX-Crypt is based on our exclusive matrix technology.  This
          method is so new and revolutionary that Master Software has been
          granted four US patents on our matrix encryption algorithms.
          Master Software has full confidence in the strength of these
          methods.  We have performed extensive analysis of potential
          attacks.  Over time we expect users of the old NK-Crypt to
          migrate to the newer, speedier MX-Crypt.



          1.4. Authentication


               When encryption is used to protect communications, there are
          two types of threats, passive threats and active threats.  The
          typical passive threat is wire-tapping, where an opponent obtains
          your messages, but does not add, delete or change your messages.
          All of Master Software's message encryption products provide
          strong security against these passive threats.  Normally, an
          eavesdropper will not change your message traffic, in order to
          stay undetected.

               The typical active threat is impersonation, where an
          opponent poses as a legitimate user in order to receive messages
          or to send bogus messages.  When there is a danger of
          impersonation, the legitimate users need to use message
          authentication in order to assure that they are communicating
          only with other authorized users.

               NK-Crypt provides a customized version where the users of
          the customized version can communicate only with users having
          that same version.  Users of the standard version, or users of a
          different customized version, cannot communicate with the users
          of your customized version.

               Master Software provides secure distribution of these
          customized versions.  User groups can set up any desired
          arrangement so that only authorized users can purchase a given
          customized version.  Each customized version has a name, and the
          organization can choose to have a password which must be provided
          by anyone ordering their custom version.  Other identifying
          methods can also be used.  For example, an organization could
          require that orders for their customized version be placed only
          on the company letterhead, and paid by company checks.

               Nonetheless, some organizations may not wish Master Software
          to have access to their customized version.

               MX-Crypt provides authentication in a different way.
          MX-Crypt allows users to choose their own secret authentication
          key, unknown to anyone else.  Any group that wishes to provide
          message authentication this way should use MX-Crypt.  It is the
          users' responsibility to distribute their authentication key only
          to their authorized network users.



          1.5. Time-Proven Methods


               Users who demand time-proven security can use any of
          GK-Crypt, OP-Crypt and NK-Crypt with full confidence.  They are
          designed using cryptographic techniques that have proven reliable
          over decades, even centuries of use.

               Users who want the latest cutting-edge products may choose
          GK-Crypt and NS-Crypt.  NS-Crypt uses an entirely new technology
          for which four US patents have been granted.  GK-Crypt uses
          standard cryptographic methods combined in a powerful innovative
          way where they strengthen and reinforce each other to repel every
          known type of attack.



          1.6. Less Typing, Less Memorization


               All of these formidable cryptographic techniques have been
          built into program packages designed for ease of use.  The most
          important factor is that users do not need to memorize and type
          large numbers of keys.  All of the products have Master Keys
          which must be entered when the package is started.  For GK-Crypt,
          NK-Crypt and MX-Crypt the Master Key is the only key that ever
          needs to be typed.

               OP-Crypt, however has a network key, which is typed once
          when the software is installed, and station keys which need to be
          securely distributed, and typed when new stations join the
          network.  Thus, for actively growing networks, OP-Crypt requires
          ongoing key maintenance.

Back to the MASTER SOFTWARE CORPORATION homepage
A Quick Overview of Cryptography

© Copyright 2006-2024 Master Software Corporation