FooCrypt, A Tale Of Cynical Cyclical Encryption

Provides you with the total peace of mind over the SECURITY & PRIVACY of YOUR DATA via
Cryptography & Steganography

Download FooCrypt.X.Y.Z.Core Documentation
Download FooCrypt.X.Y.Z.Core White Paper

 

Executive Summary

 

Cryptopocalypse’s FooCrypt, A Tale Of Cynical Cyclical Encryption toolkit, is a Post-Quantum Cryptography Quantum+ Proof / Secure software solution via Cryptography and Steganography that provides you with the total peace of mind over the SECURITY & PRIVACY of YOUR DATA, whether it is sitting in situ on a MEDIA DEVICE or in TRANSIT.

Post-Quantum Cryptography ( PQC ) is about designing cryptographic solutions that can be used by today’s [non-quantum] computers and that are resistant to both conventional and quantum cryptanalysis.

There is an age old comic by XKCD regarding the ‘Security’ of Data, and Brute Force Attacks :

XKCD Security

https://imgs.xkcd.com/comics/security.png
https://xkcd.com/538/

FooCrypt, A Tale Of Cynical Cyclical Encryption Makes In-Secure & Secure Symmetric Algorithms Quantum+ Proof / Secure, via Cryptography & Steganography, since May, 2019 via FooCrypt.2.2.0.Core.

With the current emergence of Quantum Computing, the Crypto Nerds imagination has become a reality, one that is expected to occur between 2025 – 2030, because If you encrypt data that needs to be kept confidential for more than 10 years and an adversary could gain access to the encrypted data ( cypher text ), you need to take action now to protect your data. Otherwise, your security will be compromised as soon as an adversary gains access to a large quantum computer.

The reality of human brute force attacks, is a never ending battle that all those who have access to the passwords which protect the sensitive data and the encrypted data ( cypher text ), deal with on a daily basis. The advisories may be in person or via the more common electronic means ( Hacking Groups / MALWare / Virus’s / Worms, Etc ).

Resilience is the key to data protection and data security, and utilising a Post-Quantum Cryptography solution to protect and secure your data, guarantees, that in a worst case scenario where your encrypted data is obtained by an adversary, it remains theoretically secured and protected for the longest amount of time.

The Quantum Mitigation conundrum, exists on a speculative timeline, where the actual Quantum Resistance of an algorithm, is unknown, due to the speculative impacts of Quantum and Quantum+ technologies, side channel attacks, etc over the next 99 years.

Therefore, the question that Cryptopocalypse proposes on the Quantum Mitigation conundrum and that all entities need to enforce into their Cyber Security Ecosystem is:

‘if the protected blob of data, is harvested by an advisory today, will it still be protected, by a Quantum and/or Quantum+ technology solution, in 99 years time ?’

Recent cryptanalysis advancements, place grave doubts on whether or not, the current Advanced Encryption Standard ( Rijndael ) Algorithm, ( AES-256 ), will survive the next 10 years on the timeline, let alone the 99 year litmus test.

 

FooCrypt, A Tale Of Cynical Cyclical Encryption

  • Removes the Common Flaws in all encryption technologies

  • FooCrypt ensures current algorithms have their strength increased to be Quantum+ Proof / Secure

  • Maximises the password length for each encryption cycle

  • Applies <= 200 layers of encryption, per FooKey

  • Maximises the time it would take an adversary to decrypt the encrypted data

  • FooSteg ( Steganography ) obtains infinite protection of your Data, when the Data Image is in-transit and/or sitting in-situ on a storage device, independent of the Source Image

  • FooSteg enables Deniable Encryption

  • FooStegCypher enhances the strength of a Data Image when it is in-transit and/or sitting in-situ on a storage device, with the Source Image

  • FooKey_Message enhances the strength of your messaging

  • A FooKey can be created from any commonly sourced file or multiple random data sources ( Pseudo and True )

  • FooCrypt can be configured so that end users never know the actual password characters utilised to encrypt the data

  • Adheres to Standard Business Security Policies and Implementations

  • Can be transparently integrated with any Business’s

    • Security Systems

    • Document Control Systems

    • Email Systems

    • Messaging Systems

    • Storage Systems

      • SMB ( CIFS )

      • NFS

      • Disk Sharing

      • Etc

    • Etc

  • Will be undergoing Common Criteria EAL2+ and FIPS-140-3 Certifications

  • Engines

  • Platforms

    • macOS 13+ ( Ventura+ ) 64-bit Intel & ARM

    • Linux Debian & RPM packaging formats ( Ubuntu, Fedora, CentOS, RHEL, etc )

    • Live ISO based on Ubuntu 22.04.05 LTS

    • SunOS Solaris PKG Archive, 10u10+

    • Windows WSL2+ running Linux ( Ubuntu, Fedora, CentOS, RHEL, etc )

  • Licensing

    • Demonstration License is for a period of 14 calendar days, personal and commercial use allowed.

    • Educational License is for a period of 371 calendar days, personal use allowed, restricted to Students enrolled at a Government recognised Education Facility, allowed to be purchased and/or controlled by a Parent and/or Guardian of the Student.

    • Yearly License is for a period of 371 calendar days, personal and commercial use allowed.

    • Perpetual License is for an indefinite period ( does not expire ), personal and commercial use allowed.

 

References and Recommended further reading