Version: 1.0
Size:
631KB
Requirements:
No special requirements
No special requirements
Price:
$10.00
$10.00
System:
Windows 7/Vista/XP
Windows 7/Vista/XP
Rating:
4.4
4.4
License:
Shareware
Shareware
java download smartphone sex pose ebook facebook chat software computer recipe book dvdfab platinum 3.1.8.0 acer 6678 owe anapod explorer 9.0.6
Description - Prunes
In order to help people to protect the privacy of information transfer, through in-depth study of modern Cryptography, the author has programmed prunes software dedicated to private information transfer. The prunes software use the existing instant messaging software such as MSN, ICQ, QQ, e-mail, etc, as the transmission of information channels, then its message is to be encrypted or decrypted, the needs of people passing the privacy of information on the Internet in this way is solved, thus personal privacy is protected.
The prunes software use modern cryptography theory, including:
Key Distribution: Use of public key cryptographic algorithms (asymmetric cryptography Algorithm), Each user is randomly generated a public key and a private secret key. After exchanged public keys, then prunes can calculate the same encryption key. Then encrypt information and pass it on the Internet, its cryptographic strength has reached 256 bits. According to the existing conditions of the calculation, due to the algorithm is not reversible, general individual and the organization is almost no way to crack and listen.
Message encryption: by using the principle of symmetric algorithm (DES), and improve it for private, non-standard DES algorithm to encrypt all the information. The algorithm is fast, high Efficiency and high strength, the cryptographic strength has reached 224 bits, almost no one can crack.
Marks processing: the prunes process all the information and behavior without any retention. And every time it generate random dynamic key, Ensure that each generated session key is different, The key is calculated, not transmitted in the network, and maximum guarantee the security of the key.
The prunes software use modern cryptography theory, including:
Key Distribution: Use of public key cryptographic algorithms (asymmetric cryptography Algorithm), Each user is randomly generated a public key and a private secret key. After exchanged public keys, then prunes can calculate the same encryption key. Then encrypt information and pass it on the Internet, its cryptographic strength has reached 256 bits. According to the existing conditions of the calculation, due to the algorithm is not reversible, general individual and the organization is almost no way to crack and listen.
Message encryption: by using the principle of symmetric algorithm (DES), and improve it for private, non-standard DES algorithm to encrypt all the information. The algorithm is fast, high Efficiency and high strength, the cryptographic strength has reached 224 bits, almost no one can crack.
Marks processing: the prunes process all the information and behavior without any retention. And every time it generate random dynamic key, Ensure that each generated session key is different, The key is calculated, not transmitted in the network, and maximum guarantee the security of the key.