MASTER SOFTWARE CORPORATION
59 DeGarmo Hills Road
Wappingers Falls, NY 12590
QUALITY SOFTWARE SINCE 1958
MESSAGE ENCRYPTION SYSTEM
OP-Crypt is the famous One-Time Pad message encryption system.
The One-Time Pad system uses a different key from an infinitely long
key stream for each character of your message.
A different portion of the key stream is used for each message.
These portions are never used again, so every character of every message
gets a different key.
It has been proven mathematically that this system is unbreakable.
This is because any encrypted message can stand for any text
of the same length.
Thus the 14-character message   §B%3r^4Ñ:+e8\ü
could stand for any one of
Attack at dawn countermeasure Ich bin fremde
Surrender now! microprocessor tout est perdu
Hold your fire mistranslation 3 (x+y) (z-16)
or any other 14-character word or phrase.
There is nothing in the encrypted message that makes any of these
interpretations more probable than the others.
The Master Software implementation of the One-Time Pad system
is much stronger than other versions.
Two independent keys are used for each character of the message,
and between these two separate encryptions a block encryption is
applied to the message.
So the message receives 3 encryption steps, with two of them
OP-Crypt has been designed so that a network of stations can
communicate securely without having to distribute separate keys
for every message.
Once your network is set up with a key for each station, you never need
to distribute any more keys.
You simply give each message a unique message ID, and OP-Crypt
generates secure 1920-bit keys for you.
OP-Crypt is available now for only $129.
Shipping and handling within the U.S. is included, free.
(New York state residents must add applicable sales tax.)
For more information see the
OP-Crypt User Manual
For general information about cryptography, see
A Brief Introduction to Cryptography
The author of the OP-Crypt Message Encryption System is Dr. Frank Rubin,
who has been involved with cryptography since 1957.
He is the author of more than a dozen technical papers on cryptography
(and several hobbyist articles that appeared in The Cryptogram).
He is an editor of Cryptologia, a journal devoted to cryptology
published at the United States Military Academy, West Point NY.
Several of Dr. Frank Rubin's cryptographic papers are available
on this website.
Here is a complete list of Dr. Rubin's cryptographic papers that have
appeared in refereed journals.
Computer Methods for Decrypting Multiplex Ciphers.
Cryptologia 2 (Apr. 1978), pp 152-160.
Computer Methods for Decrypting Random Stream Ciphers.
Cryptologia 2 (July 1978), pp 215-231.
Decrypting a Stream Cipher Based on J-K Flip-flops.
IEEE Trans. on Compu. 28 (July 1979), pp 483-487.
Reprinted in Cryptologia 5 (Jan. 1981), pp 51-57.
Solving a Cipher Based on Multiple Random Number Streams.
Cryptologia 3 (July 1979), pp 155-157.
Cryptographic Aspects of Data Compression Codes.
Cryptologia 3 (Oct. 1979), pp 202-205.
Foiling the Known-Plaintext Attack.
Cryptologia 10 (Oct. 1986), pp 217-222.
Foiling an Exhaustive Key-Search Attack.
Cryptologia 11 (Apr. 1987), pp 102-107.
The Cryptographic Uses of Post Tag Systems.
Cryptologia 12 (Jan. 1988), pp 25-33.
Comments on "Cryptanalysis of Knapsack Ciphers
Using Genetic Algorithms."
Cryptologia 18 (Apr. 1994), pp 153-154.
The Quadratic and Double Quadratic Residue Ciphers.
Cryptologia 19 (July 1995), pp 275-284.
Message Authentication Using Quadratic Residues.
Cryptologia 19 (Oct. 1995), pp 397-404.
Designing a High-Security Cipher.
Cryptologia 20 (July 1996), pp 247-257.
One-Time Pad Cryptography.
Cryptologia 20 (Oct. 1996), pp 359-364.
Back to MASTER SOFTWARE CORPORATION homepage
Choosing an Encryption Product
A Quick Overview of Cryptography
Send us an email for any comments or questions about the
OP-Crypt Message Encryption System.
© Copyright 2005-2007 Master Software Corporation