VSpace Encrypted Chat Note: This version of VSpace Encrypted Chat is a complimentary release and as such only provides 32-bit encryption. This version is free from use restrictions. Please contact [EMAIL PROTECTED] for information on how to obtain a 256-bit encryption release. http://www.vspacecorp.com/vschat2.zip Warning This program is not intended for use outside of the United States or by private individuals. Severe penalties will be assessed if you are investigated and found to be in possession of this Cipher System. Only approved Corporations and Government Agencies may use VSpace Encrypted Chat. VSpace Encrypted Chat is a secure communications platform that was designed to protect sensitive conversations from intelligence gathering. VSpace defines intelligence gathering as data mining by: � Hostile Governments � Foreign Armed Services � Foreign Nationals � Hostile Religious Organizations � Corporate Spies � Industrial Espionage � Russian and Ukrainian Mafia � International and Domestic Terrorists � Former Employees � Internet Hackers The threat to your security is very real. Simply inspect your firewall records to convince yourself. What makes VSpace Encrypted Chat so secure? Under the United States Federal Regulations concerning domestic encryption, all cipher systems intended for public use must be inspected and approved by a government agency. These systems must also have a documented back door so that law enforcement will be able to break the cipher. These rules do not apply for private corporations and government agencies. VSpace Encrypted Chat does not contain any back doors. This freedom from restrictions also allowed us to develop and insert into VSpace Encrypted Chat a unique implementation of the Rijndael Encryption Algorithm that defeat all known attacks. VSpace Rijndael Implementations Rijndael The default encryption algorithm that VSpace Encrypted Chat uses is straight Rijndael. This is where you supply a password at the beginning of your session and all sentences are encrypted with the same key that was generated from that password for the duration of the session. This method is very secure; especially when using 256 bit keys which is also the default. However, VSpace doesn�t like to anything normally. They set out to make it even stronger, if it were possible. Rijndael Plus This is VSpace�s proprietary implementation of the Rijndael algorithm that completely renders harmless all known attacks. This is where you supply a password at the beginning of the session and from that point on every letter that you type is treated as its own document and is encrypted with its own unique password that was spawned from the original. If your sentence contains 50 characters including spaces and periods, Rijndael Plus will produce 50 separately encrypted documents that were made from 50 separate passwords! Just trying to crack �Mary had a little lamb� this way would use more resources than the value of the data received. Imagine how difficult it would be to determine exactly where to look into a conversation between three or more individuals for the intelligence that you are seeking? Especially when the printed cipher text may be 10mb or larger? If you were to guess correctly the password, it would do you no good without knowing exactly what to do with that password now that you have it. The original password is never used to generate keys. It is used to spawn other passwords that will generate keys. The Encrypting Rijndael Algorithm - AES Rijndael algorithm The Rijndael algorithm, also known as an Advanced Encryption Standard (AES), is used for encryption and decryption of files and text. Rijndael is an iterated block cipher with a variable block length and a variable key length. The block length and the key length can be independently specified to 128, 192 or 256 bits. The Advanced Encryption Standard (AES) will be a new Federal Information Processing Standard (FIPS) Publication that will specify a cryptographic algorithm for use by U.S. Government organizations to protect sensitive (unclassified) information. NIST also anticipates that the AES will be widely used on a voluntary basis by organizations, institutions, and individuals outside of the U.S. Government - and outside of the United States - in some cases. NIST has selected Rijndael as the proposed AES algorithm. You can learn more about the Rijndael algorithm and AES at: � http://csrc.nist.gov/encryption/aes/ � http://www.nist.gov/public_affairs/releases/g00-176.htm Why did NIST select Rijndael to propose for the AES? When considered together, Rijndael's combination of security, performance, efficiency, ease of implementation and flexibility make it an appropriate selection for the AES. Specifically, Rijndael appears to consistently perform well in both hardware and software across a wide range of computing environments regardless of its use in feedback or non-feedback modes. Its key setup time is excellent, and its key agility is good. Rijndael's very low memory requirements make it very well suited for restricted-space environments, in which it also demonstrates excellent performance. Rijndael's operations are among the easiest to defend against power and timing attacks. Additionally, it appears that some defense can be provided against such attacks without significantly impacting Rijndael's performance. Rijndael is designed with some flexibility in terms of block and key sizes, and the algorithm can accommodate alterations in the number of rounds, although these features would require further study and are not being considered at this time. Finally, Rijndael's internal round structure appears to have good potential to benefit from instruction-level parallelism. AES key sizes The AES will specify three key sizes: 128, 192 and 256 bits. In decimal terms, this means that there are approximately: 3.4 x (10^38) possible 128-bit keys; 6.2 x (10^57) possible 192-bit keys; and 1.1 x (10 ^77) possible 256-bit keys. What is the chance that someone could crack an AES key? Assuming that one could build a machine that could recover 255 keys per second, then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old. What about the other four algorithms that were not selected? In terms of security, NIST states in its report that "all five algorithms appear to have adequate security for the AES." NIST is not saying that there is anything "wrong" with any of the other four algorithms. However, when all of the analysis and comments were taken into consideration, the NIST team felt that Rijndael was the best selection for the AES. Adequate security, conformed by NIST, is the reason why VSpace Encrypted Chat implements the Rijndael algorithm for its encryption.
