0 Reviews
FREE
License
PAID
Version
Infinite One-Time Pad 1.0.1.2
LatestUpdate
Last updated
OS
Language
EN
Infinite One-Time Pad is an advanced text encryption and decryption application. It implements the concept of the true One-Time Pad to produce a ciphertext that is unbreakable. This software solves the problem of key distribution and random key generation.
Instead of using a perfect random key, the key material is obtained from any file of your choice. An image file of size 300 KB (jpg) for example is more than enough for most messages. Infinite One-Time Pad uses series of different irreversible algorithms to transform the extracted key.
The calculations cannot be reversed and the transformed key has high unpredictability similar to a perfect random key. The transformation depends on the secret code and the password used. Infinite number of keys can be generated from a single key file by using different passwords. This is why it is called Infinite One-Time Pad. It has the strength of the True One-Time Pad and yet, easier to use and implement.
There are 5 protections available. Those in red font are under your control.
Compression - The plain text is compressed in memory to eliminate regularities. This eliminates patterns in the frequency of the occurrence of a specific character in the text.
Secret Key File - You can use any file as a source of key material. The software extracts the non-redundant characters and applies irreversible algorithms to produce a unique key with high entropy that is equal in length with the compressed text.
Secret Code - You can create a new secret code so that the software will use this value every time you encrypt a text. The secret code is used to transform the input text and the key. Every single character of the secret code is used in the transformation. The number of transformations is equal to the length of the secret code.
Key Modification - You can insert words or characters to the key for additional protection.
Password - The password transforms the input text and the key. Every single character of the password is used in the transformation. The number of transformations is equal to the length of the password.
No reviews found
SoftPas is a platform that provides you with the latest software and technology news, reviews, and guides. We also provide you with the latest software and technology trends.
Subscribe to newsletter
© Copyright 2024, All Rights Reserved by SoftPas