|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
OpenPuff 4.00 - Yet not another steganography SW
|
Czech introduction by users & Internet reviews. Thanks!
Vytváření, přechovávání i posílání zašifrovaných dat může už samo o sobě představovat riziko odhalení. Alternativou je uchování v tajnosti i fakt, že se snažíte něco skrýt. OpenPuff je užitečná aplikace pro steganografii, tj. Ukrývání souborů do obrázků a digitálních fotografií ve formátech JPG, PNG a dalších.OpenPuff využívá 256 bitových šifrovacích algoritmů a přístup k datům je chráněn třemi hesly. Program používá efektivní šifrovací algoritmy (16 paralelních algoritmů) a SHA512. Pakliže by se třetí strana, která by měla zájem na vašich datech, nějakým způsobem dostala k informacím o počtu použitých nosičů, hesle apod., pořád ještě nemá vyhráno. Můžete využít dvojitého maskování (doslova "přidat návnadu").Další funkcí programu je pak vkládání ochranných vodoznaků do fotografií.Funkce OpenPuff:
Program je přenosný, není tedy nutná jeho instalace, a lze jej tedy snadno spouštět z USB klíčenek, přenosných disků a jiných přenosných paměťových zařízení. Velice jednoduše se ovládá a je možné ji užívat zcela zdarma. |
|
OpenPuff is a professional steganography tool, with unique features you won't find among any other
free or commercial software. OpenPuff is 100% free and suitable for highly sensitive data covert
transmission. Let's take a look at its features
- Carrier chains :
Data is split among many carriers. Only the correct carrier sequence enables unhiding. Moreover,
up to 256Mb can be hidden, if you have enough carriers at disposal. Last carrier will be filled with
random bits in order to make it undistinguishable from others.
- Supported formats :
Images, audios, videos, flash, adobe.
- Layers of security :
Data, before carrier injection, is encrypted (1), scrambled (2), whitened (3) and encoded (4).
- Layer 1 - Modern multi-cryptography :
A set of 16 modern 256bit open-source cryptography algorithms (chosen from
AES Process [1997-2000],
NESSIE Process [2000-2003] and
CRYPTREC Process [2000-2003])
has been joined into a doublepassword multi-cryptography algorithm (256bit+256bit)
: AES
/ Anubis
/ Camellia
/ Cast-256
/ Clefia
/ FROG
/ Hierocrypt3
/ Idea-NXT
/ MARS
/ RC6
/ Safer+
/ SC2000
/ Serpent
/ Speed
/ Twofish
/ Unicorn-A
- Layer 2 - CSPRNG based scrambling :
Encrypted data is always scrambled to break any remaining stream pattern. A new
cryptographically secure pseudo random number generator (CSPRNG) is seeded with a third
password (256bit) and data is globally shuffled with random indexes.
- Layer 3 - CSPRNG based whitening :
Scrambled data is always mixed with a high amount of noise, taken from an independent
CSPRNG seeded with hardware entropy.
- Layer 4 - Adaptive non-linear encoding :
Whitened data is always encoded using a non-linear function that takes also original carrier bits
as input. Modified carriers will need much less change and deceive many steganalysis tests
(e.g.: chi square test).
- Extra security - Deniable steganography :
Top secret data can be protected using less secret data as a decoy.
- Source code :
This program relies on the libObfuscate system-independent open-source library. Users and
developers are absolutely free to link to the core library (100% of the cryptography & obfuscation
code), read it and modify it.
- Layer 1 - Modern multi-cryptography : A set of 16 modern 256bit open-source cryptography algorithms (chosen from AES Process [1997-2000], NESSIE Process [2000-2003] and CRYPTREC Process [2000-2003]) has been joined into a doublepassword multi-cryptography algorithm (256bit+256bit) : AES / Anubis / Camellia / Cast-256 / Clefia / FROG / Hierocrypt3 / Idea-NXT / MARS / RC6 / Safer+ / SC2000 / Serpent / Speed / Twofish / Unicorn-A
- Layer 2 - CSPRNG based scrambling : Encrypted data is always scrambled to break any remaining stream pattern. A new cryptographically secure pseudo random number generator (CSPRNG) is seeded with a third password (256bit) and data is globally shuffled with random indexes.
- Layer 3 - CSPRNG based whitening : Scrambled data is always mixed with a high amount of noise, taken from an independent CSPRNG seeded with hardware entropy.
- Layer 4 - Adaptive non-linear encoding : Whitened data is always encoded using a non-linear function that takes also original carrier bits as input. Modified carriers will need much less change and deceive many steganalysis tests (e.g.: chi square test).
- Extra security - Deniable steganography :
Top secret data can be protected using less secret data as a decoy.
![]() |
|
|
|
|