Characteristics |
Typical values |
|
Speed |
approx. 100 kB text per minute |
|
Memory consumption |
approx. 20 MB for the dictionary |
|
Languages |
German, English, French |
|
Ratio data : text |
1:10 to 1:20 (worse with technical terms) |
|
Operating systems |
MS-Windows 95/98/NT, Unix (Linux, Solaris); MacOS in planning; others upon request |
|
Can be combined with |
encryption programs like PGP; TextHide has its own public-key cryptography integrated (based on RSA [4096 bit key length] and the new Twofish method [256 bit key length]) |
|
Target groups / applications: companies and private persons wishing to transfer data over insecure channels like the Internet or by wireless technology; generally all users of encryption software (data sources or possible media to hide information in: e-mails, network data communication, (chip card) secret numbers, newspaper ads, web pages, ordinary conversations) |
||
Features "TextHide Crypto" (steganography & cryptography):
|
||
Shortly available features / advantages "TextHide Crypto": |
||
Additional features / advantages "Server version": |
||
Available components |
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Per package (CD-ROM) we charge an additional $9 for international shipping & handling. This may be more if this basic charge doesn't cover the costs for shipment to remote countries. |
Data encryption software (Cryptography)
Compris Intelligence GmbH offers Twofish, the most promising candidate for the new US standard AES (Advanced Encryption Standard) for block cyphers. Twofish which was designed by a team around the crypto expert Bruce Schneier and is supposed to replace the DES (Data Encryption Standard) algorithm which roots back in the seventies. Twofish works with just a single key for encryption and decryption. For key exchange the RSA method for public key Cryptography is used in the Compris Intelligence GmbH implementation.
Known encryption methods with public keys are very slow. This is why the fast block cyphering/encryption methods are used and only their keys will be exchanged through a public key method.
Characteristics |
Typical values |
|
Speed Compression/decompression (independent of the key length) Pentium II – 400 MHz |
10 MB/second |
|
Speed comparison (basis: Twofish, 256-bit-key, 16 rounds, 8 cycles):
|
Percent worse as Twofish |
|
Memory demand |
10 kB data, 270 kB code size |
|
Technology |
Feistel network with 16 rounds (bijective function made up of 4 key dependent 8x8 bit S-boxes, as well as additional matrices and encryption functions) |
|
Mathematical security / effort needed for cracking with a 256 bit key length |
approx. 1010 years |
|
Best successful crypto attack |
5 (of 16) rounds of a Feistel network with 222,5 (= 6 million) known input plain texts with an expense of 251 (= 2,3 * 1015). Computational effort rises exponentially with each additional Feistel network |
|
Supported key lengths |
all lengths <= 256 bits, in particular: 128 bit, 192 bit, 256 bit |
|
Key exchange |
with RSA method for public key-cryptography (up to 4096 bits key length) |
|
Type of the method |
block cyphering with secure key exchange |
|
Minimal data length |
16 bytes (smaller data lengths can be brought to that minimal length by adding random data) |
|
Operating systems |
MS-Windows 95/98/NT, Unix (Linux, Solaris); MacOS in planning; others upon request |
|
Common combinations |
|
|
Features / advantages: |
||
Available programming components |
Price |
|
|
|
Abbreviations
Abbreviation |
Meaning |
AES |
Advanced Encryption Standard; adoption in the year 2001 by NIST (US National Institute of Standards and Technology) |
DES |
Data Encryption Standard; block cypher; from the seventies |
kB |
kilobyte; 210 Bytes = 1024 Bytes = 213 Bits |
MB |
Megabyte; 220 Bytes = 223 Bits |
RSA |
The public key encryption method named after their developers Rivest, Shamir and Adleman |
SDK |
Software development kit |
Reserve TextHide / Get informed when new versions are released
Information & Questions: products@compris.com
www.compris.com | | TextHide | | Contact/Map | | About Compris Intelligence GmbH |