VSpace Encrypted Chat

 

Note: This version of VSpace Encrypted Chat is a complimentary release and as 
such only provides 32-bit encryption. This version is free from use 
restrictions. Please contact [EMAIL PROTECTED] for information on how to 
obtain a 256-bit encryption release.

 
http://www.vspacecorp.com/vschat2.zip
 

Warning
This program is not intended for use outside of the United States or by 
private individuals. Severe penalties will be assessed if you are investigated 
and found to be in possession of this Cipher System. Only approved 
Corporations and Government Agencies may use VSpace Encrypted Chat.

 

VSpace Encrypted Chat is a secure communications platform that was designed to 
protect sensitive conversations from intelligence gathering. VSpace defines 
intelligence gathering as data mining by:

 

�         Hostile Governments

�         Foreign Armed Services

�         Foreign Nationals

�         Hostile Religious Organizations

�         Corporate Spies

�         Industrial Espionage

�         Russian and Ukrainian Mafia

�         International and Domestic Terrorists

�         Former Employees

�         Internet Hackers

 

The threat to your security is very real. Simply inspect your firewall records 
to convince yourself.

 

What makes VSpace Encrypted Chat so secure?
Under the United States Federal Regulations concerning domestic encryption, 
all cipher systems intended for public use must be inspected and approved by a 
government agency. These systems must also have a documented back door so that 
law enforcement will be able to break the cipher.

 

These rules do not apply for private corporations and government agencies. 
VSpace Encrypted Chat does not contain any back doors. This freedom from 
restrictions also allowed us to develop and insert into VSpace Encrypted Chat 
a unique implementation of the Rijndael Encryption Algorithm that defeat all 
known attacks.

 

VSpace Rijndael Implementations
 

Rijndael
The default encryption algorithm that VSpace Encrypted Chat uses is straight 
Rijndael. This is where you supply a password at the beginning of your session 
and all sentences are encrypted with the same key that was generated from that 
password for the duration of the session.

 

This method is very secure; especially when using 256 bit keys which is also 
the default. However, VSpace doesn�t like to anything normally. They set out 
to make it even stronger, if it were possible.

 

Rijndael Plus
This is VSpace�s proprietary implementation of the Rijndael algorithm that 
completely renders harmless all known attacks. This is where you supply a 
password at the beginning of the session and from that point on every letter 
that you type is treated as its own document and is encrypted with its own 
unique password that was spawned from the original. If your sentence contains 
50 characters including spaces and periods, Rijndael Plus will produce 50 
separately encrypted documents that were made from 50 separate passwords!

 

Just trying to crack �Mary had a little lamb� this way would use more 
resources than the value of the data received. Imagine how difficult it would 
be to determine exactly where to look into a conversation between three or 
more individuals for the intelligence that you are seeking? Especially when 
the printed cipher text may be 10mb or larger?

 

If you were to guess correctly the password, it would do you no good without 
knowing exactly what to do with that password now that you have it. The 
original password is never used to generate keys. It is used to spawn other 
passwords that will generate keys.

 

 

 

 

 

 

The Encrypting Rijndael Algorithm - AES

Rijndael algorithm

The Rijndael algorithm, also known as an Advanced Encryption Standard (AES), 
is used for encryption and decryption of files and text.

Rijndael is an iterated block cipher with a variable block length and a 
variable key length. The
block length and the key length can be independently specified to 128, 192 or 
256 bits.

The Advanced Encryption Standard (AES) will be a new Federal Information 
Processing Standard (FIPS) Publication that will specify a cryptographic 
algorithm for use by U.S. Government organizations to protect sensitive 
(unclassified) information. NIST also anticipates that the AES will be widely 
used on a voluntary basis by organizations, institutions, and individuals 
outside of the U.S. Government - and outside of the United States - in some 
cases. NIST has selected Rijndael as the proposed AES algorithm.

You can learn more about the Rijndael algorithm and AES at:

 

�         http://csrc.nist.gov/encryption/aes/http://www.nist.gov/public_affairs/releases/g00-176.htm

 

Why did NIST select Rijndael to propose for the AES?

When considered together, Rijndael's combination of security, performance, 
efficiency, ease of implementation and flexibility make it an appropriate 
selection for the AES. Specifically, Rijndael appears to consistently perform 
well in both hardware and software across a wide range of computing 
environments regardless of its use in feedback or non-feedback modes. Its key 
setup time is excellent, and its key agility is good. Rijndael's very low 
memory requirements make it very well suited for restricted-space 
environments, in which it also demonstrates excellent performance. Rijndael's 
operations are among the easiest to defend against power and timing attacks.

 

Additionally, it appears that some defense can be provided against such 
attacks without significantly impacting Rijndael's performance. Rijndael is 
designed with some flexibility in terms of block and key sizes, and the 
algorithm can accommodate alterations in the number of rounds, although these 
features would require further study and are not being considered at this 
time. Finally, Rijndael's internal round structure appears to have good 
potential to benefit from instruction-level parallelism.

 

AES key sizes
The AES will specify three key sizes: 128, 192 and 256 bits. In decimal terms, 
this means that there are approximately:

3.4 x (10^38) possible 128-bit keys;

6.2 x (10^57) possible 192-bit keys; and 

1.1 x (10 ^77) possible 256-bit keys.

What is the chance that someone could crack an AES key?
Assuming that one could build a machine that could recover 255 keys per 
second, then it would take that machine approximately 149 thousand-billion 
(149 trillion) years to crack a 128-bit AES key. To put that into perspective, 
the universe is believed to be less than 20 billion years old.

 

What about the other four algorithms that were not selected?

In terms of security, NIST states in its report that "all five algorithms 
appear to have adequate security for the AES." NIST is not saying that there 
is anything "wrong" with any of the other four algorithms. However, when all 
of the analysis and comments were taken into consideration, the NIST team felt 
that Rijndael was the best selection for the AES.

 

Adequate security, conformed by NIST, is the reason why VSpace Encrypted Chat 
implements the Rijndael algorithm for its encryption.

 

 


Reply via email to