MASTER SOFTWARE CORPORATION
59 DeGarmo Hills Road
Wappingers Falls, NY 12590




QUALITY SOFTWARE SINCE 1958



EC-CRYPT
FILE ENCRYPTION PACKAGE


       EC-Crypt is an economical option for people who need to encrypt just a few data files or messages at a time. EC-Crypt is a medium-security package that will stand up against any attack using a PC, even if the opponent is willing to devote years of computer time.

       EC-Crypt is fast. For ordinary files, the encryption or decryption will be finished before you take your finger off the Enter key.

       EC-Crypt is simple to use. Just type ECCRYPT and your computer will prompt you for the password and file name.

       EC-Crypt is safe. EC-Crypt has a built-in safety feature to prevent you from using the wrong password.

EC-Crypt is available now for only $19.95. Shipping and handling within the U.S. is included, free. (New York state residents must add applicable sales tax.)

ORDER TODAY

For more information see the
EC-Crypt User Manual

For general information about cryptography, see
A Brief Introduction to Cryptography



The author of the EC-Crypt File Encryption Package is Dr. Frank Rubin, who has been involved with cryptography since 1957. He is the author of more than a dozen technical papers on cryptography (and several hobbyist articles that appeared in The Cryptogram). He is an editor of Cryptologia, a journal devoted to cryptology published at the United States Military Academy, West Point NY. Several of Dr. Frank Rubin's cryptographic papers are available on this website.

THE QUADRATIC AND DOUBLE QUADRATIC RESIDUE CIPHERS
Quadratic Residue ciphers are compared to the RSA Public Key Cryptosystem
MESSAGE AUTHENTICATION USING QUADRATIC RESIDUES
Uses a new one-way hashing function based on quadratic residues
DESIGNING A HIGH-SECURITY CIPHER
A step by step approach to designing a strong stream cipher
A MULTIPLE-SIGNATURE PROTOCOL FOR PUBLIC-KEY CRYPTOSYSTEMS
Creates a digital signature that only the authorized signers could produce
ONE-TIME PAD CRYPTOGRAPHY
A practical way to achieve near-perfect security



Here is a complete list of Dr. Rubin's cryptographic papers that have appeared in refereed journals.

Computer Methods for Decrypting Multiplex Ciphers. Cryptologia 2 (Apr. 1978), pp 152-160.

Computer Methods for Decrypting Random Stream Ciphers. Cryptologia 2 (July 1978), pp 215-231.

Decrypting a Stream Cipher Based on J-K Flip-flops. IEEE Trans. on Compu. 28 (July 1979), pp 483-487.
Reprinted in Cryptologia 5 (Jan. 1981), pp 51-57.

Solving a Cipher Based on Multiple Random Number Streams. Cryptologia 3 (July 1979), pp 155-157.

Cryptographic Aspects of Data Compression Codes. Cryptologia 3 (Oct. 1979), pp 202-205.

Foiling the Known-Plaintext Attack. Cryptologia 10 (Oct. 1986), pp 217-222.

Foiling an Exhaustive Key-Search Attack. Cryptologia 11 (Apr. 1987), pp 102-107.

The Cryptographic Uses of Post Tag Systems. Cryptologia 12 (Jan. 1988), pp 25-33.

Comments on "Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms." Cryptologia 18 (Apr. 1994), pp 153-154.

The Quadratic and Double Quadratic Residue Ciphers. Cryptologia 19 (July 1995), pp 275-284.

Message Authentication Using Quadratic Residues. Cryptologia 19 (Oct. 1995), pp 397-404.

Designing a High-Security Cipher. Cryptologia 20 (July 1996), pp 247-257.

One-Time Pad Cryptography. Cryptologia 20 (Oct. 1996), pp 359-364.


Back to MASTER SOFTWARE CORPORATION homepage
Choosing an Encryption Product
A Quick Overview of Cryptography


Send email Send us an email for any comments or questions about the
EC-Crypt File Encryption Package.

© Copyright 2012 Master Software Corporation