Encryption Software offers backward security and recovery.

Press Release Summary:



EndCryptor Crypto Station v2.0 email encryption solution offers automatic restoration of security by recovering from attack as soon as new encrypted file from victim is received. Sent/Received messages are stored on user's computer with industry-standard 256 bit AES encryption key. Encryption keys of digitally signed traversing messages are determined using elliptic curve public key technology, however, no public key infrastructure is required.



Original Press Release:



New Version 2.0 of EndCryptor Crypto Station Released



Unlike Other Email Encryption Solutions It Provides Backward Security and Fast Recovery from Hacker's Spying Attack

TAMMISAARI, Finland, Feb. 27 / -- EndCryptor Crypto Station offers features that are new on the email encryption software market: backward security and fast recovery from an attack. In the current computer environment with many security holes where worms, viruses and spyware try to access every computer in the net, it is essential to have an encryption solution that is prepared to face spying attacks.

Developed by Enternet, Inc., EndCryptor Crypto Station is a solution that considers the unwanted but realistic possibility that at some point in time the most valuable security data - the secret private encryption keys - are revealed to an adversary. This possibility must be taken into account if the data is to be protected in reality. Enternet's aim is to minimize the amount of the exposed data even in case of a successful attack.

"Without backward security and recovery from attack a single successful spying attack into a computer leads to the exposure of all previous and future encrypted communication sent to the computer. In some cryptosystems also all communication sent from the victim is exposed," says Enternet President Pentti Vataja. "For example, the well-known PGP family of products: PGP, OpenPGP, GnuPG, etc., do not offer backward security; they provide recovery when new public keys are taken into use. This usually happens at predetermined intervals - after several months or even years. EndCryptor, however, recovers from the attack when the next new encrypted file from the victim has been received. This automatic restoration of security is important since the victim of intrusion may be totally unaware of the adversary's activities."

The protocol that provides these new features has been published under the Patent Cooperation Treaty.

Key Product Features:

o Easy to use - no knowledge of cryptography is required;

o User can type messages, attach files;

o Automatic sending and receiving for Microsoft Outlook users;

o A message may have more than one receiver. Contacts can be grouped;

o The sent and received messages are stored in encrypted form on a user's
computer;

o Backward security;

o Recovery from an attack;

o Identity hijacking will be revealed;

o Protection against replay attack where an adversary captures and copies
an encrypted message and later resends it;

o Encryption is done using the industry standard AES, using key length of
256 bits;

o Encryption keys of traversing messages are determined using elliptic
curve public key technology; however, no public key infrastructure is
required;

o Each message is digitally signed;

o After decryption the correctness of the plaintext is verified using
message authentication code;

o File wiping, calculation of a cryptographic hash value (checksum) of a
file;

o Compression of plaintext;

o It is possible to use EndCryptor both from office and laptop computers.

System Requirements: Windows XP

Pricing:

Number of licenses: 1 - 9, unit price USD 177; for other numbers of
licenses see the website.

FOR EVALUATION COPY:

Download it from http://www.endcryptor.com/.

CONTACT:

Mr. Pentti Vataja
President
Enternet, Inc.
Phone: +358 50 5500131
E-mail: info@endcryptor.com
http://www.endcryptor.com/

Source: Enternet, Inc.

All Topics