MASTER SOFTWARE CORPORATION
59 DeGarmo Hills Road
Wappingers Falls, NY 12590




QUALITY SOFTWARE SINCE 1958



NS-CRYPT
MESSAGE ENCRYPTION SYSTEM

NS-Crypt is a strong encryption system for securely exchanging messages. Unlike other secret key and public key encryption methods, NS-Crypt does not require any exchange or distribution of encryption keys. The sender and the receiver of a message each have their own secret keys for the message, but neither party knows the other party's key. The keys are never transmitted or distributed.

NS-Crypt uses an advanced patent-pending double-matrix technology which is both stronger and faster than the single-matrix technology used in our N2-Crypt and N3-Crypt cryptosystems. So you get greater speed and higher security at the same time.

The new NS-Crypt Version 02 offers an optional authentication feature which protects you against imposters posing as legitimate users. Even if an opponent can forge email headers which are identical to the headers of your authorized users, the imposter cannot read any message that you send, or send you a bogus message.

Today there are two leading methods for secret communication, secret key and public key. In secret key communication, both of the parties must have a copy of the secret key or keys used for each message. Keys must be distributed to all parties who need to communicate with one another, or who might need to communicate in the future. Securely distributing keys is one of the biggest and most difficult problems in using secret key cryptography.

In public key cryptography each party has a private key, which is never distributed, and a public key which must be distributed to everyone who wishes to communicate with them. For widespread use, there must be a key-issuing authority which possesses all of the public keys, and which distributes these keys to all participants. Maintaining this system is a major task in using public key cryptography.

With NS-Crypt's new Private Key method of communication, you and you alone have your keys. Your keys are never distributed to anyone, so there is no chance that anyone will ever intercept your keys. All of your keys are locked away on your computer under control of a Master Key that you choose, and that you alone know. The Master Key is not stored or recorded on the computer, so even if someone stole your computer, or copied your hard drive, they still would not be able to get your keys or read your messages.

With NS-Crypt you can establish secure communications with anyone else who has the NS-Crypt software. You can begin immediately. There is nothing to arrange in advance, other than agreeing that the sender and the receiver both use NS-Crypt. There is no need to send or receive keys, not secret keys, and not public keys.

Even if all of your emails were being read by an eavesdropper, even if all of your encrypted messages back and forth were intercepted, even if the intruder knew that you were using NS-Crypt, and even if your opponent also had the NS-Crypt software, your messages could not be read.

NS-Crypt uses a different key for every message, so even if one of the partners with whom you communicate were an enemy, or even if a message key were extracted from a partner's computer, this would not compromise your communications with any other party. Loss of one key will reveal only the one message sent with that key. It will not reveal any other messages, or even make it easier to decrypt other messages. Loss of all the keys used by one partner will not reveal any messages sent to or from other partners.

NS-Crypt Version 01 is available now for only $169. Shipping and handling within the U.S. is included, free. (New York state residents must add applicable sales tax.) Any two people with the standard version can communicate securely with each other. Nobody else, including other owners of the standard version, can read their messages.

NS-Crypt Version 02 is available now for only $189. Shipping and handling within the U.S. is included, free. (New York state residents must add applicable sales tax.) Version 02 includes the authentication features that previously were available only in the custom version. (NOTE: there are no plans to make the authentication feature available in the standard versions of N2-Crypt or N3-Crypt. Users who want this feature should upgrade to NS-Crypt.)

The custom version of NS-Crypt is no longer offered. Users can now obtain the authentication feature of the custom version by using optional authentication keys. Previously, those keys were built into the custom version.

ORDER TODAY

For more information see the
NS-Crypt Version 01 User Manual
NS-Crypt Version 02 User Manual

For general information about cryptography, see
Choosing an Encryption Product
A Brief Introduction to Cryptography



The author of the NS-Crypt Message Encryption System is Dr. Frank Rubin, who has been involved with cryptography since 1957. He is the author of more than a dozen technical papers on cryptography (and several hobbyist articles that appeared in The Cryptogram). He was an editor of Cryptologia, a journal devoted to cryptology published at the United States Military Academy, West Point NY. Several of Frank Rubin's cryptographic papers are available on this website.

THE QUADRATIC AND DOUBLE QUADRATIC RESIDUE CIPHERS
Quadratic Residue ciphers are compared to the RSA Public Key Cryptosystem
MESSAGE AUTHENTICATION USING QUADRATIC RESIDUES
Uses a new one-way hashing function based on quadratic residues
DESIGNING A HIGH-SECURITY CIPHER
A step by step approach to designing a strong stream cipher
A MULTIPLE-SIGNATURE PROTOCOL FOR PUBLIC-KEY CRYPTOSYSTEMS
Creates a digital signature that only the authorized signers could produce
ONE-TIME PAD CRYPTOGRAPHY
A practical way to achieve near-perfect security



Here is a complete list of his cryptographic papers that have appeared in refereed journals.

Computer Methods for Decrypting Multiplex Ciphers. Cryptologia 2 (Apr. 1978), pp 152-160.

Computer Methods for Decrypting Random Stream Ciphers. Cryptologia 2 (July 1978), pp 215-231.

Decrypting a Stream Cipher Based on J-K Flip-flops. IEEE Trans. on Compu. 28 (July 1979), pp 483-487.
Reprinted in Cryptologia 5 (Jan. 1981), pp 51-57.

Solving a Cipher Based on Multiple Random Number Streams. Cryptologia 3 (July 1979), pp 155-157.

Cryptographic Aspects of Data Compression Codes. Cryptologia 3 (Oct. 1979), pp 202-205.

Foiling the Known-Plaintext Attack. Cryptologia 10 (Oct. 1986), pp 217-222.

Foiling an Exhaustive Key-Search Attack. Cryptologia 11 (Apr. 1987), pp 102-107.

The Cryptographic Uses of Post Tag Systems. Cryptologia 12 (Jan. 1988), pp 25-33.

Comments on "Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms." Cryptologia 18 (Apr. 1994), pp 153-154.

The Quadratic and Double Quadratic Residue Ciphers. Cryptologia 19 (July 1995), pp 275-284.

Message Authentication Using Quadratic Residues. Cryptologia 19 (Oct. 1995), pp 397-404.

Designing a High-Security Cipher. Cryptologia 20 (July 1996), pp 247-257.

One-Time Pad Cryptography. Cryptologia 20 (Oct. 1996), pp 359-364.


Back to MASTER SOFTWARE CORPORATION homepage


Send email Send us an email for any comments or questions about the
NS-Crypt Message Encryption System.

© Copyright 2008 Master Software Corporation