MASTER SOFTWARE CORPORATION
59 DeGarmo Hills Road
Wappingers Falls, NY 12590




QUALITY SOFTWARE SINCE 1958



OP-CRYPT
MESSAGE ENCRYPTION SYSTEM


       OP-Crypt is the famous One-Time Pad message encryption system. The One-Time Pad system uses a different key from an infinitely long key stream for each character of your message. A different portion of the key stream is used for each message. These portions are never used again, so every character of every message gets a different key.

       It has been proven mathematically that this system is unbreakable. This is because any encrypted message can stand for any text of the same length. Thus the 14-character message   §B%3r^4Ñ:+e8\ü   could stand for any one of
     Attack at dawn     countermeasure     Ich bin fremde
     Surrender now!     microprocessor     tout est perdu
     Hold your fire     mistranslation     3 (x+y) (z-16)
or any other 14-character word or phrase. There is nothing in the encrypted message that makes any of these interpretations more probable than the others.

       The Master Software implementation of the One-Time Pad system is much stronger than other versions. Two independent keys are used for each character of the message, and between these two separate encryptions a block encryption is applied to the message. So the message receives 3 encryption steps, with two of them provably unbreakable.

       OP-Crypt has been designed so that a network of stations can communicate securely without having to distribute separate keys for every message. Once your network is set up with a key for each station, you never need to distribute any more keys. You simply give each message a unique message ID, and OP-Crypt generates secure 1920-bit keys for you.

OP-Crypt is available now for only $129. Shipping and handling within the U.S. is included, free. (New York state residents must add applicable sales tax.)

ORDER TODAY

For more information see the
OP-Crypt User Manual

For general information about cryptography, see
A Brief Introduction to Cryptography



The author of the OP-Crypt Message Encryption System is Dr. Frank Rubin, who has been involved with cryptography since 1957. He is the author of more than a dozen technical papers on cryptography (and several hobbyist articles that appeared in The Cryptogram). He is an editor of Cryptologia, a journal devoted to cryptology published at the United States Military Academy, West Point NY. Several of Dr. Frank Rubin's cryptographic papers are available on this website.

THE QUADRATIC AND DOUBLE QUADRATIC RESIDUE CIPHERS
Quadratic Residue ciphers are compared to the RSA Public Key Cryptosystem
MESSAGE AUTHENTICATION USING QUADRATIC RESIDUES
Uses a new one-way hashing function based on quadratic residues
DESIGNING A HIGH-SECURITY CIPHER
A step by step approach to designing a strong stream cipher
A MULTIPLE-SIGNATURE PROTOCOL FOR PUBLIC-KEY CRYPTOSYSTEMS
Creates a digital signature that only the authorized signers could produce
ONE-TIME PAD CRYPTOGRAPHY
A practical way to achieve near-perfect security



Here is a complete list of Dr. Rubin's cryptographic papers that have appeared in refereed journals.

Computer Methods for Decrypting Multiplex Ciphers. Cryptologia 2 (Apr. 1978), pp 152-160.

Computer Methods for Decrypting Random Stream Ciphers. Cryptologia 2 (July 1978), pp 215-231.

Decrypting a Stream Cipher Based on J-K Flip-flops. IEEE Trans. on Compu. 28 (July 1979), pp 483-487.
Reprinted in Cryptologia 5 (Jan. 1981), pp 51-57.

Solving a Cipher Based on Multiple Random Number Streams. Cryptologia 3 (July 1979), pp 155-157.

Cryptographic Aspects of Data Compression Codes. Cryptologia 3 (Oct. 1979), pp 202-205.

Foiling the Known-Plaintext Attack. Cryptologia 10 (Oct. 1986), pp 217-222.

Foiling an Exhaustive Key-Search Attack. Cryptologia 11 (Apr. 1987), pp 102-107.

The Cryptographic Uses of Post Tag Systems. Cryptologia 12 (Jan. 1988), pp 25-33.

Comments on "Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms." Cryptologia 18 (Apr. 1994), pp 153-154.

The Quadratic and Double Quadratic Residue Ciphers. Cryptologia 19 (July 1995), pp 275-284.

Message Authentication Using Quadratic Residues. Cryptologia 19 (Oct. 1995), pp 397-404.

Designing a High-Security Cipher. Cryptologia 20 (July 1996), pp 247-257.

One-Time Pad Cryptography. Cryptologia 20 (Oct. 1996), pp 359-364.


Back to MASTER SOFTWARE CORPORATION homepage
Choosing an Encryption Product
A Quick Overview of Cryptography


Send email Send us an email for any comments or questions about the
OP-Crypt Message Encryption System.

© Copyright 2005-2007 Master Software Corporation