FooCrypt, A Tale Of Cynical Cyclical Encryption

Provides you with the total peace of mind over the SECURITY & PRIVACY of YOUR DATA via Cryptography & Steganography….

Creating A FooKey

Download FooCrypt.X.Y.Z.Core Documentation

Download FooCrypt.X.Y.Z.Core White Paper


Creating a FooKey is fun, exciting, and has endless possibilities for you to think about

The Key to a FooKey, is best described in the following steps

​1. Decide on the source of the characters for your FooKey

  • Random data via the menu option ‘Create :: Random Data Memory’ which will read the selected random data source as defined in the Preferences, for the selected number of characters defined in preferences. 24250 is the DEFAULT number of characters which will in turn, allow you to create a FooKey, which contains 50 cycles of encryption, with a ARG_MAX length of 512 characters.


  • /dev/random
  • /dev/urandom
  • /FooCrypt/Internal
  • /FooCrypt/Piper


  • Import Window Memory Binary, will allow you to source sequential characters into the Window Memory for use in creating a FooKey. The options for selecting a binary source for input are endless and can something as simple as a Photo or Music or Document


  • Import Window Memory ASCII, will allow you to read into FooCrypt, a pre existing string of ASCII characters which can be utilised as a FooKey. Sources of ASCII for import are also endless, and can be something as simple as the UNIX man command piped to a text file, which is then imported into FooCrypt. ​​For Example [ man openssl > openssl.txt ]

2. Once you have primed either the Random Data Memory or Window Memory with the source for your FooKey, creating a FooKey is as simple as hitting the ‘CFK’ button, or hitting the ‘CFK [ 1 – 5 ]s’

  • FooCrypt will automatically create the FooKey based on the configuration options defend in Preferences.


  • FooKey_LCS
  • FooKey_ARG_MAX




3. And FooCrypt will automatically load the FooKey into the current Active Buffer FooKey Memory or the ‘CFK [ 1 – 5]’ FooKey Memory Active Buffer


Example FooKey Containing 24250 characters



4. You can save the FooKey into a file which will be protected automatically in a single layer of encryption, utilising the ‘MASTER_PASWORD’ as the password source


  • It is recommended that you store your FooKey’s on an encrypted media device.




Command Line Example

Available in FooCrypt.X.Y.Z

[ *Quoted Full Path To FooCrypt ]/FooCrypt \
-C FooKey_ARG_MAX,FooKey_Seek,FooKey_Count \
-a FooCrypt-aes256 \
-F [*Quoted Full Path To Create FooKey File ]


Encrypted & ASCII FooKey will be saved as

${KeyHome}/${Date}_$( basename “${CreateFooKeyFile}” ).FooKey
${KeyHome}/${Date}_$( basename “${CreateFooKeyFile}” )-ASCII.FooKey


*Quoted Full Paths are only required when special characters are contained within the PATH

ie :