MASTER SOFTWARE CORPORATION
59 DeGarmo Hills Road
Wappingers Falls, NY 12590




QUALITY SOFTWARE SINCE 1958



GK-CRYPT
DATA SECURITY PACKAGE
VERSION 03 IS NOW AVAILABLE

GK-Crypt is the strongest data security package you can buy. Your data remains 640-bit secure on your computer. Nobody can read your files unless you give them the key. GK-Crypt is far stronger than any other commercial file encryption product in the world, and stronger than nearly all of the world's diplomatic and military encryption packages, whether hardware, software or any combination. GK-Crypt is strong enough so that governments could use it for their most sensitive data.

GK-Crypt could insure the privacy of your computer files even if an opponent had available all of the computing power in the entire world. And, your files will stay private for decades to come. Even if computers increased in power over the next 50 years by the same factor that they improved over the past 50 years, your files would still remain secure.

GK-Crypt is also the safest privacy product you can buy. It has numerous safety features to prevent loss of data and other problems that are common with lesser data security packages.

GK-Crypt is easy to use. You can encrypt hundreds of files with a single command, without needing to generate or remember any of the file keys. You can not only encrypt an entire folder or directory with one command, you can even encrypt all of its enclosed folders or subdirectories, all with just one command. And, you can decrypt all of those files with a single keystroke.

GK-Crypt can run completely automatically, generating a different secure key for every file, and remembering all of the keys for you. You never need to write down the file keys, or entrust them to another person.

The new Version 03 is now available. Version 03 lets you decrypt multiple files with a single keystroke. It also lets you define shortcuts for the names of files and directories, so you have less to type. With Version 03 you need only one copy of GK-Crypt on your computer, which you can run from anywhere on any file.

GK-Crypt Version 03 may be purchased now for only $249. Owners of Version 02 may obtain upgrades for only $39. GK-Crypt Version 02 and Version 01 are available now at the new reduced prices of only $219 and $199. Shipping and handling within the U.S. is included, free. (New York state residents must add applicable sales tax.)

Now you can be certain that your files are totally safe and secure. No matter what you keep on your computer, nobody can see it or read it unless you give them the keys. Even if your entire computer were taken to the FBI or NSA laboratory, your files would remain inviolate.

ORDER TODAY

Click here for more information
GK-Crypt Version 01 User Manual
GK-Crypt Version 02 User Manual
GK-Crypt Version 03 User Manual

For general information about cryptography, see
Choosing an Encryption Product
A Quick Overview of Cryptography



The author of the GK-Crypt Data Security Package is Dr. Frank Rubin, who has been involved with cryptography since 1957. He is the author of more than a dozen technical papers on cryptography (and several hobbyist articles that appeared in The Cryptogram). He was an editor of Cryptologia, a journal devoted to cryptology published at the United States Military Academy, West Point NY. Several of Frank Rubin's cryptographic papers are available on this website.

THE QUADRATIC AND DOUBLE QUADRATIC RESIDUE CIPHERS
Quadratic Residue ciphers are compared to the RSA Public Key Cryptosystem
MESSAGE AUTHENTICATION USING QUADRATIC RESIDUES
Uses a new one-way hashing function based on quadratic residues
DESIGNING A HIGH-SECURITY CIPHER
A step by step approach to designing a strong stream cipher
A MULTIPLE-SIGNATURE PROTOCOL FOR PUBLIC-KEY CRYPTOSYSTEMS
Creates a digital signature that only the authorized signers could produce
ONE-TIME PAD CRYPTOGRAPHY
A practical way to achieve near-perfect security



Here is a complete list of his cryptographic papers that have appeared in refereed journals.

Computer Methods for Decrypting Multiplex Ciphers. Cryptologia 2 (Apr. 1978), pp 152-160.

Computer Methods for Decrypting Random Stream Ciphers. Cryptologia 2 (July 1978), pp 215-231.

Decrypting a Stream Cipher Based on J-K Flip-flops. IEEE Trans. on Compu. 28 (July 1979), pp 483-487.
Reprinted in Cryptologia 5 (Jan. 1981), pp 51-57.

Solving a Cipher Based on Multiple Random Number Streams. Cryptologia 3 (July 1979), pp 155-157.

Cryptographic Aspects of Data Compression Codes. Cryptologia 3 (Oct. 1979), pp 202-205.

Foiling the Known-Plaintext Attack. Cryptologia 10 (Oct. 1986), pp 217-222.

Foiling an Exhaustive Key-Search Attack. Cryptologia 11 (Apr. 1987), pp 102-107.

The Cryptographic Uses of Post Tag Systems. Cryptologia 12 (Jan. 1988), pp 25-33.

Comments on "Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms." Cryptologia 18 (Apr. 1994), pp 153-154.

The Quadratic and Double Quadratic Residue Ciphers. Cryptologia 19 (July 1995), pp 275-284.

Message Authentication Using Quadratic Residues. Cryptologia 19 (Oct. 1995), pp 397-404.

Designing a High-Security Cipher. Cryptologia 20 (July 1996), pp 247-257.

One-Time Pad Cryptography. Cryptologia 20 (Oct. 1996), pp 359-364.


Back to MASTER SOFTWARE CORPORATION homepage


Send email Send us an email for any comments or questions about the
GK-Crypt Data Security Package.

© Copyright 2005-2007 Master Software Corporation