ticalc.org
Basics Archives Community Services Programming
Hardware Help About Search Your Account
   Home :: Archives :: File Archives :: Encrypted Organizer v2.0
Encrypted Organizer v2.0

FILE INFORMATION

Ranked as 26401 on our all-time top downloads list with 2231 downloads.
Ranked as 21906 on our top downloads list for the past seven days with 1 downloads.

organize2.zip
Filename organize2.zip (Download)
Title Encrypted Organizer v2.0
Description Encrypted Organizer 2.0 is a fully featured address and contact book that incorportates on the fly encryption of its contents to keep prying eyes away. Features G-Crypt encryption for much better security than other TI encryption routines while maintaining fast speed and low overhead. New features include faster algorithms for encryption, encryption on the fly, interface upgrades, and much more....
Author Garrett Rowe (garrettrowe@yahoo.com)
Category TI-92 BASIC Educational Programs
File Size 27,816 bytes
File Date and Time Tue Apr 4 20:14:45 2000
Documentation Included? Yes

SCREEN SHOTS

REVIEWS

Review
Review by  Alex Ponebshek
Reviewed on 2008-06-13
Alex's Crypto Security Audit

Warning: this review covers only security, and is not concerned with interface, usability, and other issues.

Algorithm Security:

The program encrypts each character by rotating it by a corresponding character in the password (starting over from the beginning of the password when it gets to the end). It also obfuscates each character by probabilistically turning it into two characters, but this process is trivially reversible, and adds nothing to security. An attacker could easily retrieve the key if he knows part of the message, and could use linguistic analysis to easily crack the key if the message is longer than the key or a key is used multiple times.

Key Security:

The key is used in a very simple way, with the effect that if the key has low entropy (as most passwords do), it introduces severe weaknesses that could allow an attacker to guess at the key and message.

Side-channels:

This program uses local variables for sensitive data and cleans up after itself well, leaving no traces that would compromise it's security.

Overall:

Not recommended. While this program employs an algorithm that is good for one-time-pad encryption, it does not employ it in a secure way. An attacker who gains access to your data vault could retrieve it's contents and your key with ease.


LEAVE FEEDBACK

Questions, comments, and problems regarding the file itself should be sent directly to the author(s) listed above.

Write a review for this file (requires a free account)

Report inappropriate or miscategorized file (requires an account; or you may email us directly)

If you have downloaded and tried this program, please rate it on the scale below
BadGood
1  2  3  4  5  6  7  8  9  10  

ARCHIVE CONTENTS

Archive Contents
Name Size
SEARCH.BMP   4286
DECRYPT.BMP   4286
LOGON.BMP   4286
MAIN.BMP   4286
ORGANIZE.9XP   17136
Encrypted Organizer.doc   325632

  Copyright © 1996-2019, the ticalc.org project. All rights reserved. | Contact Us | Disclaimer