![]() |
M ASTER  S OFTWARE QUALITY SOFTWARE SINCE 1958 |
  | |
|
PROTECT YOUR PRIVACY -- PROTECT YOUR SECURITY
with the strongest line of data file and message encryption software available. |
1. CHOOSING A CRYPTOGRAPHIC PRODUCT
Master Software offers six separate cryptographic products.
All of them are strong, all of them are reliable, all are easy to
use, all of them are well-suited to their tasks. How do you
choose?
TABLE OF CONTENTS
1. CHOOSING A CRYPTOGRAPHIC PRODUCT
1.1. Messages and Files
1.2. Distributed Keys
1.3. No Distributed Keys
1.4. Authentication
1.5. Time-Proven Methods
1.6. Less Typing, Less Memorization
1.1. Messages and Files
The first question is, what are you trying to protect? Are
you protecting files on a single computer or within a local
network, or are you protecting messages which will be sent over
public networks such as the Internet?
If you need to protect files on your computer, then GK-Crypt
is the right choice. It is easy to use, reasonably fast, and
extremely secure. In fact, it is the strongest file encryption
product available outside of the military. It is stronger than
many of the encryption products used by foreign governments, and
far stronger than the encryption used by banks, credit card
companies, brokerages and similar businesses.
If, on the other hand, you need to protect messages, we
offer a choice of three products, MX-Crypt, NK-Crypt and
OP-Crypt. The one you choose depends on your setup.
1.2. Distributed Keys
If the people or groups who need to communicate secretly are
already in contact, already known to one another, then OP-Crypt
is the logical choice. This is especially true if you already
have a communications network set up, and you already have an
established method for distributing secret encryption keys.
OP-Crypt is the only cryptographic product, from any source,
which can be considered absolutely secure. It uses the renowned
One-Time Pad encryption algorithm, the only algorithm that has
ever been proven to be unbreakable. Provided that the keys are
never revealed, your messages will remain secure and unbreakable
forever.
OP-Crypt is fast and easy to use. Its great advantage over
all of the competing products is that there is no need to
distribute keys for each message. The OP-Crypt package generates
long, secure message keys. Only the secret network key and
station keys need to be distributed, which needs to be done only
once for each station.
1.3. No Distributed Keys
If you need to protect messages, but you do not know
beforehand who will be communicating, if you do not have a method
for distributing keys, if people frequently join your network
with no previous contact with your network hub, or if you expect
that people already in the field may need to communicate directly
with each other, then MX-Crypt and NK-Crypt are your best
choices. In fact, they are your only choices. There are no
other products available anywhere that can establish secure
communications without any exchange of keys.
NK-Crypt is based on large prime numbers. This is a
technology that has stood the test of time. (The patent for the
algorithm underlying NK-Crypt expired in 1993.) Hundreds of
mathematicians have tried and failed to break it. However, it is
slow, and unsuited for sending long messages or large files.
MX-Crypt offers the advantage of speed. MX-Crypt is 2200
times as fast as NK-Crypt.
MX-Crypt is based on our exclusive matrix technology. This
method is so new and revolutionary that Master Software has been
granted four US patents on our matrix encryption algorithms.
Master Software has full confidence in the strength of these
methods. We have performed extensive analysis of potential
attacks. Over time we expect users of the old NK-Crypt to
migrate to the newer, speedier MX-Crypt.
1.4. Authentication
When encryption is used to protect communications, there are
two types of threats, passive threats and active threats. The
typical passive threat is wire-tapping, where an opponent obtains
your messages, but does not add, delete or change your messages.
All of Master Software's message encryption products provide
strong security against these passive threats. Normally, an
eavesdropper will not change your message traffic, in order to
stay undetected.
The typical active threat is impersonation, where an
opponent poses as a legitimate user in order to receive messages
or to send bogus messages. When there is a danger of
impersonation, the legitimate users need to use message
authentication in order to assure that they are communicating
only with other authorized users.
NK-Crypt provides a customized version where the users of
the customized version can communicate only with users having
that same version. Users of the standard version, or users of a
different customized version, cannot communicate with the users
of your customized version.
Master Software provides secure distribution of these
customized versions. User groups can set up any desired
arrangement so that only authorized users can purchase a given
customized version. Each customized version has a name, and the
organization can choose to have a password which must be provided
by anyone ordering their custom version. Other identifying
methods can also be used. For example, an organization could
require that orders for their customized version be placed only
on the company letterhead, and paid by company checks.
Nonetheless, some organizations may not wish Master Software
to have access to their customized version.
MX-Crypt provides authentication in a different way.
MX-Crypt allows users to choose their own secret authentication
key, unknown to anyone else. Any group that wishes to provide
message authentication this way should use MX-Crypt. It is the
users' responsibility to distribute their authentication key only
to their authorized network users.
1.5. Time-Proven Methods
Users who demand time-proven security can use any of
GK-Crypt, OP-Crypt and NK-Crypt with full confidence. They are
designed using cryptographic techniques that have proven reliable
over decades, even centuries of use.
Users who want the latest cutting-edge products may choose
GK-Crypt and NS-Crypt. NS-Crypt uses an entirely new technology
for which four US patents have been granted. GK-Crypt uses
standard cryptographic methods combined in a powerful innovative
way where they strengthen and reinforce each other to repel every
known type of attack.
1.6. Less Typing, Less Memorization
All of these formidable cryptographic techniques have been
built into program packages designed for ease of use. The most
important factor is that users do not need to memorize and type
large numbers of keys. All of the products have Master Keys
which must be entered when the package is started. For GK-Crypt,
NK-Crypt and MX-Crypt the Master Key is the only key that ever
needs to be typed.
OP-Crypt, however has a network key, which is typed once
when the software is installed, and station keys which need to be
securely distributed, and typed when new stations join the
network. Thus, for actively growing networks, OP-Crypt requires
ongoing key maintenance.