[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Russian LanCrypto info
Here is some information about LanCrypto, a Russian public-key
encryption program. This one sounds interesting.
From: IN%"[email protected]" 20-OCT-1993 14:36:24.72
CRYPTO BANK
System of programms of encryption (decryption) of files
To work all users must have the files:
afina.exe - programm for generation of new public and secret keys
afinall.exe - programm for creation of a common list of public keys
vesta.exe - programm for encryption/decryption of file
NNNNN.pbl - file contains a new public key,NNNNN is a number of user
secret.new - file contains a new secret key
secret.key - file contains an old secret key
FIRST stage. Generation of new secret and public keys by user
User runs prigramm:
afina.exe
A message apears on the screen:
Press any keys
User begins to strike rand set of keys.A new secret key
writes to floppy diskette A to file sekret.new.
A public key writes to the current directory in the file
NNNNNN.pbl (NNNNNN is a number of user).
If you want to write your secret key on hard disk in
current directory you run:
afina.exe /k
Then all users of sistem exchange their public keys(files
NNNNNN.pbl.).We recommend thate users organise a CENTER .(The
CENTER collects all public keys,creates a common list of public
keys and sends it to users.)
SECOND stage. Creation and sending a list of public keys.
After exchanging of the files NNNNNN.pbl, user( CENTER )
has the files, received from his partners:
N1.pbl
N2.pbl
...
NM.pbl
To create common list of public keys , user( CENTER ) runs
the programm
afinall.exe . (dot in the end)
if files * .pbl lokate in current directory
afinall.exe [path]
if files *.pbl lokate in other directory.
Programm creates a common list and writes it to the file
publall.key.
THIRD stage. Encrypting of a file.
If user number NNNNN encrypts file for user number LLLLL
,user number NNNNN runs :
vesta.exe [path\]file_name LLLLLL [\k] (1)
(\k is a parametre, the programm vesta.exe finds a secret
key in a current directory, ;if you run vesta.exe
[path\]file_name LLLLLL ,the programm vesta.exe finds a secret
key in floppy diskette )
During the process of its work vesta.exe takes the secret
key of user number NNNNN (from current directory(if you use \k)
or from ffloppy diskette), takes the public key of user LLLLL
(from file publall.key).Useing a secret key of user NNNNN and a
public key of user LLLLL vesta.exe creats a common secret
key.Then vesta.exe generates a rand session key,useing it and
the comman secret key vesta.exe creats a secret session key and
encrypts the file. The rand session key is not secret ant it is
added to the file.
FORTH stage. Decrypting of a file
Encrypted file may be decrypted by two ways:
1. by user NNNNN, if he repeats programm (1);
2. by user LLLLL, if he runs :
vesta.exe [path\]file_name NNNNN [\k]
EXAMPLE 1 ( We have user 000(CENTER) and user 001):
User 001 runs afina.exe \k.User 001 has files secret.new
and 001.pbl in the current directory.
User 001 sends 001.pbl to user 000(CENTR).
User 000 runs afina.exe \k.User 000 has files secret.new
and 000.pbl .User 000 receivs a file 001.pbl.He has:
afinall.exe
000.pbl
001.pbl
User 000 runs afinall.exe . (dot in the end ).He has:
afinall.exe
000.pbl
001.pbl
publall.key
The file publall.key user 000(CENTER) sends to user 001.
User 000 has : ! User 001 has :
!
vesta.exe ! vesta.exe
publall.key ! publall.key
000.pbl ! 001.pbl
secret.key ! secret.key
secret.new ! secret.new
test0.txt
User 000 encrypts file test.txt for user 001 .He runs :
vesta.exe test0.txt 001 /k
User 001 receivs test0.txt and decrypts it :
vesta.exe test0.txt 000 /k
User 001 encrypts file test1.txt for user 000.He runs :
vesta.exe test.txt1 000 /k
User 000 receivs test1.txt and decrypts it:
vesta.exe test1.txt 001 /k
SIGNING AND CHECKING OF ELECTRONIC MESSAGE
To sign a message you must do:
sign.exe file
To check yoy must do:
notary.exe file
NOTALL.EXE makes men.cat(list of all public keys of signatures )
A F I N A
PUBLIC KEY GENERATION SYSTEM
AFINA is a unique package of programs for automatic generation
of a common private key for a specific commynication session between
two users.
AFINA canbe used in any data transmission system with
cryptographical protection. It rules out the need for a prior
distribution of private keys to users.
AFINA uses the best methods of public key generation between
two users that have been tested and widely aookied by Western
governments and commercial ventyres.
Oyr original algorithm and programs have a four-fold increase in
the speed of generating a public key compared to the best known
standards while also improving data protection 100-fold.
Having purchased the AFINA program, you will become fully
independent of any key supplying service. AFINA automatically
generates common private key for communication sessions with any user
in several seconds. You can choose the key length.
It will take two users less than 3 seconds to generate a common
private key of 256 bits useng an AT 286 pc operating at 16 MHg.
AFINA uses the disk operating system MS DOS 3.30 + and needs
32K of RAM memory. Any CGA, EGA or VGA graphic adapter can be used. A
hard disk is desirable to speed up processing.
Delivery: AFINA software on 5.25 DS/DD or installation by
LAN-Ctypto. LAN-Cryoto provides guides and after-sales (warranty and
post-warranty) service of the installed products as well as uodated
versions and supplies them on favourable terms.
V E S T A
File encryption system
VESTA is a package of programs providing the encryption of files
on a user's disk.
VESTA employs the most secure methods of cryptographic data
protection such as the Data Encryption Standart (DES), a universally
recognized system endrosed by Western goverments and commercial
institutions, GOST 28147-89, national data encryption standards in
computer networks as well as two LAN-Crypto algorithms for data
encryption providing processing speed of 200 Kbyte/sec. on AT-286 (12
Mhz) PC. This is a record time for encryption programs.
VESTA will allow you to assure your PC's data integrity, provide
raw a "transparent" mode of exchange with a hard disk without
delaying data processing. By choosing the appropriate VESTA
encryption algorithm, you will be able to have secure exchange of
information with most encryption programm users in this country and
abroad. Encryption key input can be carried out both from magnetic
mediums or keyboard.
The number of keys of VESTA for cryptographic algorithms:
18
- DES 10
77
- GOST 28147-89 10
77
- VESTA 1 10
77
- VESTA 2 10
The low boundary of the encryption security is determined by the
DES algoritm.
For users of IBM PC , and compatibles, VESTA provides
man-machine communicatin through the Disk Operating System MS DOS
3.30+.
Program size of VESTA package:
DES - 6 Kb
GOST 28146-89 - 2 Kb
VESTA 1 - 2 Kb
VESTA 2 - 2 Kb
VESTA provides friendly interface and detailed help.
DELIVERY: VESTA software on 5.25 DS/DD or installation by
LAN-Crypto, guides.
LAN-Crypto provides after-sales (warranty and post-warranty)
service of the installed products and information on updated versions
of programms and makes them available on favourable terms. The
extrended reference services.
NOTARY
SECURE ELECTRONIC SIGNATURE SYSTEM
NOTARY is a system for generating electronic signature for PC
files assuring their integrity and providing the ability to verify
the identy of the author of the data auhor. You can use Notarius
while storing information distributing floppy disks, or transmitting
information throw public communication chanel. "Digital (electronic)
signature" is a full analogue of a handwritten signature.
The NOTARY " digital signature " employs two algorithms: one
which produces the signature is kept secret, while the other, which
verifies the identity of the author, is disseminated to recipients of
of the signed documents.
The NOTARY "digital signature" procedure employs the program
"SIGNATUR" to "sign" a document file and creates a signature file
which impossible to forge.
The NOTARY checking programm analysizes the contents of
document file and quickly and securely checks that the signature is
authentic.
NOTARY allows you to quickly and effectively introduce
paperless processing into offices, local networks, banking systems,
exchanges system, data communication networks, etc.
NOTARY employs more advanced method of "electronic signature"
than widely recognized RSA Digital Signature, which has been endorsed
by commercial and goverment institotions in the United States.
NOTARY's original algorithms and programm solutions allow the
user to speed up the operation of signing documents four-fold
compared with best known standarts.
NOTARY employs the Disk Operating System MS DOS 3.30+ on IBM
PC, and compatibles with the graphic adapter EGA (VGA).
NOTARY needs 15 KB of RAM and offers a friendly interface and
detalied help.
Delivery: NOTARY software comes on 5.25 DS/DD or can be
installed by "LAN Crypto", stuff we also provide documentation.
"LAN Crytpo" provides warranty and post-warranty service of
the installation products and information on updated versions of
programs when avaiilable offers them on favourable terms to current
users.
Best regards.
Alex Smirnov