FooCrypt, A Tale Of Cynical Cyclical Encryption

Provides you with the total peace of mind over the SECURITY & PRIVACY of YOUR DATA via
Cryptography & Steganography

Download FooCrypt.X.Y.Z.Core Documentation
Download FooCrypt.X.Y.Z.Core White Paper

 

FooKey_Message Decrypt

Decrypting a Message with a FooKey

Is as simple as

1. Loading your FooKey_Message into Cypher Key Control

IWMA and selecting the saved FooKey_Message
Menu Select -> Edit -> Paste

 

2. Select Your FooCrypt-Cypher

Menu Select -> Select_Cypher -> FooCrypt-a Through FooCrypt-z
[ FooCrypt-aes256 is DEFAULT ]

 

3. Select Your Message Source

Menu Select -> FooKey_Message -> Message Source
Window Memory Active Buffer
Text Window Active Data

 

4. Select Your FooKey Source

Menu Select -> FooKey_Message -> FooKey Source
Browse Saved FooKey
FooKey Memory Active Buffer : Encrypted Transfer
Window Memory Active Buffer : Encrypted Transfer
Text Window Active Data : Encrypted Transfer
Text Window Active Data : ASCII Transfer

 

5. FooKey Message Decrypt

Menu Select -> Decrypt Message

FooCrypt will then decrypt the Message Source for the number of cycles contained in the FooKey and display the decrypted message in the Log Control as a StdOutLog and in AllStdOutLog

6. Technical Specifications Of FooKey_Message

The message text source is converted to base64 data and then encrypted with the ‘Default Cypher’ using the ‘FooKey_Password’ as defined in the Preferences Window.
The ‘Default Cypher’ and ‘FooKey_Password’ must be the same cypher / password used for the FooKey.
The message is then encrypted with the FooKey and saved in BASE64 format and loaded into ‘Log Control’ with each line prefixed with :

FooCryptMsg_1_153 where :
FooCryptMsg [ FooKey_Message Identification Prefix ]
Line Number
Total Number Of Lines

The last line of a FooKey_Message contains an SHA256 checksum of the entire message which is used during decryption validation
FooCryptMsg_155_155_4617A9FC50148B9F3006C3E3C88944A1B554636F4F3BD006521C797CF05AA7B8