home *** CD-ROM | disk | FTP | other *** search
- <html>
-
- <head>
- <meta http-equiv="Content-Language" content="de">
- <meta name="GENERATOR" content="Microsoft FrontPage 5.0">
- <meta name="ProgId" content="FrontPage.Editor.Document">
- <meta name="keywords" content="polymorphic cipher encryption cryptography bpp disk">
- <title>PMC Ciphers Polymorphic Encryption</title>
- <style>
- <!--
- table.MsoNormalTable
- {mso-style-parent:"";
- font-size:10.0pt;
- font-family:"Times New Roman"}
- -->
- </style>
- </head>
-
- <body bgcolor="#FFFFFF" text="#000000" link="#000080" vlink="#4040C0" alink="#0000FF">
-
- <basefont face="Arial" color="#000000" size="2">
- <table border="0" cellpadding="0" cellspacing="0" align="left">
- <tr>
- <td colspan="2">
- <table border="0" cellpadding="0" cellspacing="0" style="border-collapse: collapse" width="1024">
- <tr>
- <td><a href="http://www.pmc-ciphers.com/index.php">
- <img alt="pmc-ciphers.com" border="0" src="img/header_up.jpg" width="1024" height="87"></a></td>
- </tr>
- <tr>
- <td background="img/header_down.jpg" width="1024" height="24">
- <table border="0" cellpadding="0" cellspacing="0" align="left">
- <tr>
- <td width="160"></td>
- <td width="100" align="center">
- <a href="http://www.pmc-ciphers.com/index.php">
- <font face="Arial" size="2"><b>Home</b></font></a> </td>
- <td width="100" align="center">
- <a href="http://www.pmc-ciphers.com/products/index.php">
- <font face="Arial" size="2"><b>Products</b></font></a> </td>
- <td width="140" align="center">
- <a href="http://www.pmc-ciphers.com/technology/index.php">
- <font face="Arial" size="2"><b>PMC Technology</b></font></a> </td>
- <td width="160" align="center">
- <a href="http://www.pmc-ciphers.com/services/index.php">
- <font face="Arial" size="2"><b>Services & Capabilities</b></font></a>
- </td>
- <td width="100" align="center">
- <a href="http://www.pmc-ciphers.com/partners/index.php">
- <font face="Arial" size="2"><b>Partners</b></font></a> </td>
- <td width="100" align="center">
- <a href="http://www.pmc-ciphers.com/dev/index.php">
- <font face="Arial" size="2"><b>Developers</b></font></a> </td>
- <td width="100" align="center">
- <a href="http://www.pmc-ciphers.com/company/index.php">
- <font face="Arial" size="2"><b>Contact us</b></font></a> </td>
- <td width="80" align="center">
- <a href="http://www.pmc-ciphers.com/sitemap.php">
- <font face="Arial" size="2"><b>Sitemap</b></font></a> </td>
- </tr>
- </table>
- </td>
- </tr>
- </table>
- </td>
- </tr>
- <tr>
- <td width="164" bgcolor="#D0D0E0" valign="top">
- <table bgcolor="#D0D0E0" border="0" cellpadding="0" cellspacing="0" align="left" style="border-collapse: collapse" bordercolor="#111111" height="387">
- <tr>
- <td align="center" valign="top" width="150" height="33"><b>
- <font color="#666666" face="Arial" size="2">BPP Disk Encryption Help</font></b>
- <hr color="#9999CC" size="1"></td>
- <td bgcolor="#D0D0E0" width="10" height="33"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2"><b>
- <a href="bpp_disk_installation_en.html">Installation and deinstallation</a></b></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2"><b>
- <a href="bpp_disk_main_en.html">BPP Disk Encryption Manual</a></b></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2"><b>
- <a href="bpp_disk_shell_extension_en.html">BPP Shell Extension Manual</a></b></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><a href="full_versions_en.html">
- <font face="Arial" size="2"><b>Full versions</b></font></a></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><hr></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td align="center" valign="top" width="150" height="33"><b>
- <font color="#666666" face="Arial" size="2">White Papers about BPP Disk
- Encryption</font></b><hr color="#9999CC" size="1"></td>
- <td bgcolor="#D0D0E0" width="10" height="33"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2"><b>
- <img border="0" src="img/pdf_small.gif" width="24" height="24"><a href="bpp_disk_mode_of_operation_en.pdf">BPP
- Disk: Mode of operation (Abobe PDF document)</a></b></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2"><b>
- <img border="0" src="img/pdf_small.gif" width="24" height="24"><a href="bpp_disk_white_paper_en.pdf">BPP
- Disk: White Paper (Abobe PDF document)</a></b></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><hr></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td align="center" valign="top" width="150" height="33"><b>
- <font color="#666666" face="Arial" size="2">Polymorphic Cipher: Theory
- and test results</font></b> <hr color="#9999CC" size="1"></td>
- <td bgcolor="#D0D0E0" width="10" height="33"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2"><b>
- <a href="polymorphic_cipher.html">The Polymorphic Cipher</a><br>
- <img border="0" src="img/pdf_small.gif" width="24" height="24"><a href="description_polymorphic_cryptography.pdf">Abobe
- PDF version</a></b></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2"><b>
- <img border="0" src="img/pdf_small.gif" width="24" height="24"><a href="pmc_fact_sheet.pdf">Polymorphic
- Cipher Fact Sheet (Abobe PDF document)</a></b></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2"><b>
- <img border="0" src="img/pdf_small.gif" width="24" height="24"><a href="roellgen02generalizedPMCmodel.pdf">Polymorphic
- Cipher theory (Abobe PDF document)</a></b></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2"><b>
- <img border="0" src="img/pdf_small.gif" width="24" height="24"><a href="512bit_block_pmc_disk_encryption_diehard_test_en.pdf">512
- bit Block PMC Diehard Test Results (Abobe PDF document)</a><br>
- </b></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><br>
- <i><font face="Arial" size="2"><b>
- <a href="http://www.adobe.com/products/acrobat/readstep2.html">Download
- Adobe PDF Reader from www.adobe.com</a></b></font></i></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><hr></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td align="center" valign="top" width="150" height="33"><b>
- <font color="#666666" face="Arial" size="2">BPP Disk webpages</font></b><hr color="#9999CC" size="1">
- </td>
- <td bgcolor="#D0D0E0" width="10" height="33"> </td>
- </tr>
- <tr>
- <td height="48" width="150"><font face="Arial" size="2"><b>
- <a href="http://www.pmc-ciphers.com/technology/index.php">All about
- Polymorphic Encryption at www.pmc-ciphers.com</a></b></font><br>
- </td>
- <td bgcolor="#D0D0E0" width="10" height="48"> </td>
- </tr>
- <tr>
- <td height="40" width="150"><font face="Arial" size="2">
- <a href="http://www.pmc-ciphers.com/products/bpp_disk.php"><b>BPP Disk
- at www.pmc-ciphers.com</b></a></font></td>
- <td bgcolor="#D0D0E0" width="10" height="40"> </td>
- </tr>
- <tr>
- <td width="150" valign="bottom" height="66"><font face="Arial" size="1">
- (c) 1999-2004<br>
- PMC Ciphers, Inc.</font></td>
- <td bgcolor="#D0D0E0" width="10" height="66"> </td>
- </tr>
- </table>
- </td>
- <td width="860" bgcolor="#FFFFFF" valign="top">
- <table width="850" border="0" align="center" cellpadding="0" cellspacing="5">
- <tr>
- <td valign="top" class="txt12">
- <h2><b><span class="headline1">BPP Disk Online help - The BPP Shell
- Extension functionality</span></b></h2>
- <hr size="1" noshade>
- <p><b>BPP Disk adds file encryption and secure wipe functionality to
- Windows Explorer.</b></p>
- <p><font face="Arial" size="3"><span style="font-weight: 400">The
- complete functionality of the file related functions of BPP Disk is
- accessible through </span><span style="font-weight: 700"><i>clicking the
- right mouse button in Windows Explorer </i></span>
- <span style="font-weight: 400">as shown in the picture below. Files and
- folders can easily be encrypted, added to existing encrypted archives,
- or be securely wiped by using high-performance algorithms.</span></font></p>
- <h3><b>Windows Explorer context menu at right mouse click:</b></h3>
- <p>
- <img border="0" src="img/shell_ext_main.gif" width="722" height="572"></p>
- <a name="top"></a>
- <p> </p>
- <h3><b>Functions:</b></h3>
- <table border="0" align="left" style="border-collapse: collapse" bordercolor="#111111" cellpadding="0" cellspacing="0" width="700">
- <tr valign="top">
- <td width="351"><a href="#add">
- <img src="img/go.gif" border="0" width="15" height="10"> Add to
- encrypted archive</a><br>
- <a href="#add_to_proposition">
- <img src="img/go.gif" border="0" width="15" height="10"> Add to
- proposed encrypted archive</a><br>
- <a href="#decrypt">
- <img src="img/go.gif" border="0" width="15" height="10"> Decrypt..</a><br>
- <a href="#decrypt_here">
- <img src="img/go.gif" border="0" width="15" height="10"> Decrypt
- here</a><br>
- </td>
- <td width="349" height="92"><a href="#wipe">
- <img src="img/go.gif" border="0" width="15" height="10"> Wipe (file
- and folder shredding)</a><br>
- <a href="#wipe_unused_disk_space">
- <img src="img/go.gif" border="0" width="15" height="10"> Wipe unused
- disk space</a><p> </td>
- </tr>
- </table>
- <p> </p>
- <p><br clear="all">
- <a name="add"></a><br>
- </p>
- <hr size="1" noshade>
- <h3><b><span class="headline2">Add to encrypted archive</span></b> <a href="#top"><img src="img/back.gif" alt="back to top" border="0" align="absmiddle" width="16" height="16"></a></h3>
- <hr size="1" noshade>
- <p align="justify"><b><span class="headline2">
- <img border="1" src="img/shell_ext_main_add.gif" align="right" hspace="10" vspace="5" width="356" height="214">Function<br>
- </span></b>The selected file(s) and/or folder(s) are encrypted into a
- file archive. The directory tree structure is preserved within the
- archive. If selected, data which is to be encrypted can be compressed.
- It should be noted that data compression consumes a lot of CPU time. The
- user is first asked to specify a name for the archive that is to be
- created. For this purpose, a file dialog is displayed first.</p>
- <p align="justify"> </p>
- <p align="justify">The following password dialog pops up:</p>
- <p align="justify">
- <img border="0" src="img/shell_ext_encrypt.gif" width="721" height="572"></p>
- <p align="justify"><b><span class="headline2">Password<br>
- </span></b>Here you can enter the password to protect your encrypted
- volume. Please choose a long password like
- "Wa4X+g2#csdf89#2bDWXvtzks92m#fk6y10h". With the length of the password
- and the degree of uniqueness you indirectly choose the quality of the
- encryption: A short password like "Wa", corresponds with about 12 .. 16
- bit encryption strength. Such simple passwords are very easy to crack!<br>
- <font size="3" face="Arial">The BPP Shell Extension maps all password
- entries to 256 bit long binary representations. Each character of your
- entry adds 6 ... 8 password bits. Consequently, after entering
- approximately 40 characters, no more effective password information is
- added.</font></p>
- <p align="justify">If users seek protection against automatic cipher
- breaking software, they should ONLY rely on very long passwords to take
- full advantage of the ultra-strong 256 bit encryption used to encrypt
- file archives. Today, 128 bit keys are regarded as totally safe for the
- next 100 years. With every additional key bit, attack security increases
- by two (=> 129 bit keys are safe for at least 200 years, etc.).</p>
- <table width="100%" border="0">
- <tr>
- <td width="6%" valign="top"><font size="7" color="#FF0000">!</font></td>
- <td width="94%" valign="top" class="txt12">Please make sure that
- nobody else but you knows your password because it is the only way
- to access your secured data.<br>
- If you forget your password, you will never be able to access your
- data again!</td>
- </tr>
- </table>
- <p align="justify"><b><span class="headline2">Hide password characters</span></b></p>
- <p align="justify">In order to hide the password characters that are
- typed in, an asterik is displayed instead of the actual characters. This
- option can be switched on and off by clicking at the checkbox .</p>
- <p align="justify"><b><span class="headline2">Plaintext files<br>
- </span></b>When encrypting commercial data, it might be useful to add a
- plaintext file which contains information on the type of data that is
- stored in the archive. This plaintext file remains plaintext in the
- archive and can be viewed by anyone. Files containing sound or video can
- also be added to the encrypted archive, thus e.g. providing users with a
- preview. HTML pages sometimes require additional files to be stored with
- the main html file. These files are added by clicking at the button next
- to the second line ("Additional plaintext files"). All the files which
- are added here should originate from the same directory as the main
- plaintext file ("Plaintext file to add"). When a user later wants to
- view the plaintext files, all available files from the archive are
- stored in the same temporary folder!</p>
- <p align="justify"><b><span class="headline2">Options:<br>
- </span></b></p>
- <p align="justify"><b>Use data compression<br>
- </b>If the checkbox "Use data compression" is checked, the encryption
- engine will try to compress the plaintext prior to the actual encryption
- process. If the compression succeeds, the compressed representation of
- the data is encrypted and saved to the archive. Although highly
- optimized compression algorithms are implemented in the software, it
- should be noted that data compression consumes most of the CPU time.</p>
- <p align="justify"><b><span class="headline2">Create selfextracting
- executable out of encrypted file after encryption<br>
- </span></b>When setting this checkbox to the checked state, a program
- containing the decryption functions and the ciphertext file is
- additionally generated. The decryption functions add approximately 350kB
- to the file size. This function enables communication partners to
- decrypt data without the need to purchase a license of the BPP Disk
- software package. No password information is stored in the
- selfextracting archive.</p>
- <table width="100%" border="0">
- <tr>
- <td width="6%" valign="top"><font size="7" color="#FF0000">!</font></td>
- <td width="94%" valign="top" class="txt12">Prior to attaching
- selfextracting executable archives to e-mails, it is advisable to
- change the file name extension to something else than ".exe" (e.g.
- to ".e_x_e"). The reason for this is that many e-mail clients and
- firewalls block attachments that contain executables.
- Receivers of executable archives must change the file
- extension back to ".exe" in order to launch the selfextractor. Prior
- to launching the program, it is necessary to check the file for
- viruses!</td>
- </tr>
- </table>
- <p align="justify"><b>Securely delete plaintext files after encryption<br>
- </b>By setting "Securely delete plaintext files after encryption" is set
- to the checked state, the selected original plaintext files are deleted
- by using one out of three available shredding methods: A simple 1-pass
- overwrite with random numbers, a three-pass shredding method that is
- used by the U.S. military or the ultra-secure Gutmann shredding
- algorithm which needs 35 passes to perform it's task. <a href="#wipe">
- Please proceed by clicking at this link for detailed informations on the
- available shredding methods.</a></p>
- <p align="justify"> </p>
- <p align="justify">After pressing the OK button, the following dialog
- box, which provides the user with the current progress, pops up:</p>
- <p align="justify">
- <img border="0" src="img/shell_ext_encryption_progress.gif" width="742" height="177"></p>
- <p><a name="add_to_proposition"></a><br>
- </p>
- <hr size="1" noshade>
- <h3><span style="font-weight: 400"><b><span class="headline2">Add to
- proposed encrypted archive</span></b></span> <span style="font-weight: 400"> </span> <a href="#top"><img src="img/back.gif" alt="back to top" border="0" align="absmiddle" width="16" height="16"></a></h3>
- <hr align="JUSTIFY" size="1" noshade>
- <p align="justify"><b><span class="headline2">
- <img border="1" src="img/shell_ext_main_add_to_proposition.gif" align="right" hspace="10" vspace="5" width="354" height="212">Function<br>
- </span></b>The selected file(s) and/or folder(s) are encrypted into a
- file archive. The directory tree structure is preserved within the
- archive. If selected, data which is to be encrypted can be compressed.
- It should be noted that data compression consumes a lot of CPU time.
- When choosing this menu item, the archive will be given the name that is
- proposed automatically by the software.</p>
- <p align="justify"> </p>
- <p align="justify">The following password dialog pops up:</p>
- <p align="justify">
- <img border="0" src="img/shell_ext_encrypt.gif" width="721" height="572"></p>
- <p align="justify"><b><span class="headline2">Password<br>
- </span></b>Here you can enter the password to protect your encrypted
- volume. Please choose a long password like
- "Wa4X+g2#csdf89#2bDWXvtzks92m#fk6y10h". With the length of the password
- and the degree of uniqueness you indirectly choose the quality of the
- encryption: A short password like "Wa", corresponds with about 12 .. 16
- bit encryption strength. Such simple passwords are very easy to crack!<br>
- <font size="3" face="Arial">The BPP Shell Extension maps all password
- entries to 256 bit long binary representations. Each character of your
- entry adds 6 ... 8 password bits. Consequently, after entering
- approximately 40 characters, no more effective password information is
- added.</font></p>
- <p align="justify">If users seek protection against automatic cipher
- breaking software, they should ONLY rely on very long passwords to take
- full advantage of the ultra-strong 256 bit encryption used to encrypt
- file archives. Today, 128 bit keys are regarded as totally safe for the
- next 100 years. With every additional key bit, attack security increases
- by two (=> 129 bit keys are safe for at least 200 years, etc.).</p>
- <table width="100%" border="0">
- <tr>
- <td width="6%" valign="top"><font size="7" color="#FF0000">!</font></td>
- <td width="94%" valign="top" class="txt12">Please make sure that
- nobody else but you knows your password because it is the only way
- to access your secured data.<br>
- If you forget your password, you will never be able to access your
- data again!</td>
- </tr>
- </table>
- <p align="justify"><b><span class="headline2">Hide password characters</span></b></p>
- <p align="justify">In order to hide the password characters that are
- typed in, an asterik is displayed instead of the actual characters. This
- option can be switched on and off by clicking at the checkbox .</p>
- <p align="justify"><b><span class="headline2">Plaintext files<br>
- </span></b>When encrypting commercial data, it might be useful to add a
- plaintext file which contains information on the type of data that is
- stored in the archive. This plaintext file remains plaintext in the
- archive and can be viewed by anyone. Files containing sound or video can
- also be added to the encrypted archive, thus e.g. providing users with a
- preview. HTML pages sometimes require additional files to be stored with
- the main html file. These files are added by clicking at the button next
- to the second line ("Additional plaintext files"). All the files which
- are added here should originate from the same directory as the main
- plaintext file ("Plaintext file to add"). When a user later wants to
- view the plaintext files, all available files from the archive are
- stored in the same temporary folder!</p>
- <p align="justify"><b><span class="headline2">Options:<br>
- </span></b></p>
- <p align="justify"><b>Use data compression<br>
- </b>If the checkbox "Use data compression" is checked, the encryption
- engine will try to compress the plaintext prior to the actual encryption
- process. If the compression succeeds, the compressed representation of
- the data is encrypted and saved to the archive. Although highly
- optimized compression algorithms are implemented in the software, it
- should be noted that data compression consumes most of the CPU time.</p>
- <p align="justify"><b><span class="headline2">Create selfextracting
- executable out of encrypted file after encryption<br>
- </span></b>When setting this checkbox to the checked state, a program
- containing the decryption functions and the ciphertext file is
- additionally generated. The decryption functions add approximately 350kB
- to the file size. This function enables communication partners to
- decrypt data without the need to purchase a license of the BPP Disk
- software package. No password information is stored in the
- selfextracting archive.</p>
- <table width="100%" border="0">
- <tr>
- <td width="6%" valign="top"><font size="7" color="#FF0000">!</font></td>
- <td width="94%" valign="top" class="txt12">Prior to attaching
- selfextracting executable archives to e-mails, it is advisable to
- change the file name extension to something else than ".exe" (e.g.
- to ".e_x_e"). The reason for this is that many e-mail clients and
- firewalls block attachments that contain executables.
- Receivers of executable archives must change the file
- extension back to ".exe" in order to launch the selfextractor. Prior
- to launching the program, it is necessary to check the file for
- viruses!</td>
- </tr>
- </table>
- <p align="justify"><b>Securely delete plaintext files after encryption<br>
- </b>By setting "Securely delete plaintext files after encryption" is set
- to the checked state, the selected original plaintext files are deleted
- by using one out of three available shredding methods: A simple 1-pass
- overwrite with random numbers, a three-pass shredding method that is
- used by the U.S. military or the ultra-secure Gutmann shredding
- algorithm which needs 35 passes to perform it's task. <a href="#wipe">
- Please proceed by clicking at this link for detailed informations on the
- available shredding methods.</a></p>
- <p align="justify"> </p>
- <p align="justify">After pressing the OK button, the following dialog
- box, which provides the user with the current progress, pops up:</p>
- <p align="justify">
- <img border="0" src="img/shell_ext_encryption_progress.gif" width="742" height="177"></p>
- <p align="justify"><a name="decrypt"></a><br>
- </p>
- <hr size="1" noshade>
- <h3><span style="font-weight: 400"><b><span class="headline2">Decrypt</span></b></span>
- <span style="font-weight: 400"> </span> <a href="#top"><img src="img/back.gif" alt="back to top" border="0" align="absmiddle" width="16" height="16"></a></h3>
- <hr align="JUSTIFY" size="1" noshade>
- <p align="justify"><b><span class="headline2">
- <img border="1" src="img/shell_ext_decrypt_sel.gif" align="right" hspace="10" vspace="5" width="352" height="180">Function<br>
- </span></b>The selected encrypted archive is decrypted and inflated. The
- directory tree structure of the archived files is restored beginning at
- the folder which is selected by the user in a window that pops up
- directly after launching this decryption function:</p>
- <p align="justify">
- <img border="0" src="img/shell_ext_decrypt_select_folder.gif" width="323" height="331"></p>
- <p align="justify">Once the desired base folder has been selected, the
- following password dialog pops up:</p>
- <p align="justify">
- <img border="0" src="img/shell_ext_decrypt.gif" width="574" height="442"></p>
- <p align="justify"><b><span class="headline2">Password<br>
- </span></b>In order to decrypt the archive, you must enter the password
- which was used to encrypt the archive in the first place. The archive
- does not contain any password information. Not even a checksum is stored
- with the archive during encryption. Consequently, the software can only
- check decrypted data for plausibility. If a wrong password has been
- entered, a window displaying an error pops up sooner or later.
- This feature makes BPP Disk encrypted archives very hard to crack even
- if protected by short passwords as a lot of patience is required by
- unauthorized users.<br>
- If users seek protection against automatic cipher breaking software,
- they should ONLY rely on very long keys to take full advantage of the
- ultra-strong 256 bit encryption used to encrypt file archives.</p>
- <table width="100%" border="0">
- <tr>
- <td width="6%" valign="top"><font size="7" color="#FF0000">!</font></td>
- <td width="94%" valign="top" class="txt12">Please make sure that
- nobody else but you knows your password because it is the only way
- to access your secured data.<br>
- If you forget your password, you will never be able to access your
- data again!</td>
- </tr>
- </table>
- <p align="justify"><b><span class="headline2"><br>
- Plaintext files<br>
- </span></b>Encrypted archives may contain one or more plaintext files in
- order to enable everybody to learn about the content of the archive, to
- provide copyright remarks, or to give users a preview of what is inside
- the encrypted archive.<br>
- The main plaintext file can either be viewed by clicking the "Open"
- button or it can be automatically opened by setting the appropriate
- checkbox to the checked state.</p>
- <p align="justify">BPP Disk copies the plaintext files to the temporary
- directory specified by the operating system. The files are deleted
- immediately after pressing the "OK" or the "Cancel" button if the
- checkbox "delete temporary files after use" is set.</p>
- <p align="justify">As an example, an archive containing a detailed
- description of secret internals of BPP Disk may contain this publically
- known PDF document as plaintext file in order to let people know what is
- inside the archive:</p>
- <p align="justify">
- <img border="0" src="img/plaintext_file_sample.jpg" width="769" height="794"></p>
- <p align="justify"> </p>
- <p align="justify">If the user enters the correct password, archive
- decryption is started by pressing the OK button.<br>
- The following dialog box, which provides the user with the current
- progress, pops up:</p>
- <p align="justify">
- <img border="0" src="img/shell_ext_decryption_progress.gif" width="743" height="178"></p>
- <p align="justify">In case the wrong password has been entered, the
- software will either display an error message or it will try to analyze
- the archive for some time and will then display an error message.</p>
- <p align="justify"><a name="decrypt_here"></a><br>
- </p>
- <hr size="1" noshade>
- <h3><span style="font-weight: 400"><b><span class="headline2">Decrypt
- here</span></b></span> <span style="font-weight: 400"> </span> <a href="#top"><img src="img/back.gif" alt="back to top" border="0" align="absmiddle" width="16" height="16"></a></h3>
- <hr align="JUSTIFY" size="1" noshade>
- <p align="justify"><b><span class="headline2">
- <img border="1" src="img/shell_ext_decrypt_here_sel.gif" align="right" hspace="10" vspace="5" width="352" height="180">Function<br>
- </span></b>The selected encrypted archive is decrypted and inflated. The
- directory tree structure of the archived files is restored beginning at
- the currently selected folder.</p>
- <p align="justify"> </p>
- <p align="justify"> </p>
- <p align="justify">Once the desired base folder has been selected, the
- following password dialog pops up:</p>
- <p align="justify">
- <img border="0" src="img/shell_ext_decrypt.gif" width="574" height="442"></p>
- <p align="justify"><b><span class="headline2">Password<br>
- </span></b>In order to decrypt the archive, you must enter the password
- which was used to encrypt the archive in the first place. The archive
- does not contain any password information. Not even a checksum is stored
- with the archive during encryption. Consequently, the software can only
- check decrypted data for plausibility. If a wrong password has been
- entered, a window displaying an error pops up sooner or later.
- This feature makes BPP Disk encrypted archives very hard to crack even
- if protected by short passwords as a lot of patience is required by
- unauthorized users.<br>
- If users seek protection against automatic cipher breaking software,
- they should ONLY rely on very long keys to take full advantage of the
- ultra-strong 256 bit encryption used to encrypt file archives.</p>
- <table width="100%" border="0">
- <tr>
- <td width="6%" valign="top"><font size="7" color="#FF0000">!</font></td>
- <td width="94%" valign="top" class="txt12">Please make sure that
- nobody else but you knows your password because it is the only way
- to access your secured data.<br>
- If you forget your password, you will never be able to access your
- data again!</td>
- </tr>
- </table>
- <p align="justify"><b><span class="headline2"><br>
- Plaintext files<br>
- </span></b>Encrypted archives may contain one or more plaintext files in
- order to enable everybody to learn about the content of the archive, to
- provide copyright remarks, or to give users a preview of what is inside
- the encrypted archive.<br>
- The main plaintext file can either be viewed by clicking the "Open"
- button or it can be automatically opened by setting the appropriate
- checkbox to the checked state.</p>
- <p align="justify">BPP Disk copies the plaintext files to the temporary
- directory specified by the operating system. The files are deleted
- immediately after pressing the "OK" or the "Cancel" button if the
- checkbox "delete temporary files after use" is set.</p>
- <p align="justify">As an example, an archive containing a detailed
- description of secret internals of BPP Disk may contain this publically
- known PDF document as plaintext file in order to let people know what is
- inside the archive:</p>
- <p align="justify">
- <img border="0" src="img/plaintext_file_sample.jpg" width="769" height="794"></p>
- <p align="justify"> </p>
- <p align="justify">If the user enters the correct password, archive
- decryption is started by pressing the OK button.<br>
- The following dialog box, which provides the user with the current
- progress, pops up:</p>
- <p align="justify">
- <img border="0" src="img/shell_ext_decryption_progress.gif" width="743" height="178"></p>
- <p align="justify">In case the wrong password has been entered, the
- software will either display an error message or it will try to analyze
- the archive for some time and will then display an error message.</p>
- <p align="justify"><a name="wipe"></a><br>
- </p>
- <hr size="1" noshade>
- <h3><span style="font-weight: 400"><b><span class="headline2">Wipe (file
- and folder shredding)</span></b></span> <span style="font-weight: 400"> </span><a href="#top"><img src="img/back.gif" alt="back to top" border="0" align="absmiddle" width="16" height="16"></a></h3>
- <hr size="1" noshade>
- <p align="justify"><b><span class="headline2">
- <img border="1" src="img/shell_ext_main_wipe.gif" align="right" hspace="10" vspace="5" width="433" height="245">Function<br>
- </span></b>The selected file(s) and/or folder(s) are overwritten using
- three different algorithms and they are subsequently deleted:</p>
- <p align="justify"><b><i>Wipe</i></b>: The selected items are
- overwritten with real random numbers and after finishing this process,
- they are deleted.</p>
- <p align="justify"><font size="2"><b>T</b></font><b><font size="2">his
- method is not approved by the DoD for sanitizing media that contain top
- secret information. This method does not take into account, that the
- hard disk head does not always fly over the center of the track.<br>
- </font></b></p>
- <p align="justify"><b><i>Wipe DoD 5220.22-M</i></b>: The selected items
- are overwritten three times prior to deleting them according to the
- standard 5220.22-M of the U.S. Department of Defense: <br>
- <i>Step 1: Overwrite all addressable locations with a character<br>
- Step 2: Overwrite all addressable locations with with the complement of
- the previously written chracter<br>
- Step 3: Overwrite with a random character<br>
- Step 4: Verify the data which was previously written to the writable
- medium.</i></p>
- <p align="justify"><b><font size="2">It should be noted that this method
- is not approved by the DoD for sanitizing media that contain top secret
- information<br>
- </font></b></p>
- <p align="justify"><b><i>Wipe Gutmann</i></b>: The selected items are
- overwritten 35 times prior to deleting them according to Peter Gutmann's
- method which was proposed in 1996 in his paper "Secure Deletion of Data
- from Magnetic and Solid-State Memory": </p>
- <div align="center">
- <table class="MsoNormalTable" border="0" cellpadding="0">
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt"> </td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <p align="center" style="text-align:center"><font face="Arial"><b>
- Overwrite Data</b></font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <p align="center" style="text-align:center"><font face="Arial"><b>
- Pass No.</b></font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <p align="center" style="text-align:center"><font face="Arial"><b>
- Data Written (Binary/Hexadecimal)</b></font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">1 </font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">Random numbers</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">2 </font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">Random numbers</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">3 </font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">Random numbers</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">4 </font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">Random numbers</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">5 </font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">01010101 01010101 01010101
- 0x55 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">6 </font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">10101010 10101010 10101010
- 0xAA </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">7 </font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">10010010 01001001 00100100
- 0x92 0x49 0x24</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">8 </font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">01001001 00100100 10010010
- 0x49 0x24 0x92</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">9 </font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">00100100 10010010 01001001
- 0x24 0x92 0x49</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">10</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">00000000 00000000 00000000
- 0x00 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">11</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">00010001 00010001 00010001
- 0x11 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">12</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">00100010 00100010 00100010
- 0x22 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">13</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">00110011 00110011 00110011
- 0x33 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">14</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">01000100 01000100 01000100
- 0x44 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">15</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">01010101 01010101 01010101
- 0x55 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">16</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">01100110 01100110 01100110
- 0x66 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">17</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">01110111 01110111 01110111
- 0x77 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">18</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">10001000 10001000 10001000
- 0x88 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">19</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">10011001 10011001 10011001
- 0x99 </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">20</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">10101010 10101010 10101010
- 0xAA </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">21</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">10111011 10111011 10111011
- 0xBB </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">22</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">11001100 11001100 11001100
- 0xCC </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">23</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">11011101 11011101 11011101
- 0xDD </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">24</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">11101110 11101110 11101110
- 0xEE </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">25</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">11111111 11111111 11111111
- 0xFF </font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">26</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">10010010 01001001 00100100
- 0x92 0x49 0x24</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">27</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">01001001 00100100 10010010
- 0x49 0x24 0x92</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">28</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">00100100 10010010 01001001
- 0x24 0x92 0x49</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">29</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">01101101 10110110 11011011
- 0x6D 0xB6 0xDB</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">30</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">10110110 11011011 01101101
- 0xB6 0xDB 0x6D</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">31</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">11011011 01101101 10110110
- 0xDB 0x6D 0xB6</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">32</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">Random numbers</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">33</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">Random numbers</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">34</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">Random numbers</font></td>
- </tr>
- <tr>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">35</font></td>
- <td style="padding:2.25pt 2.25pt 2.25pt 2.25pt">
- <font face="Arial" size="2">Random numbers</font></td>
- </tr>
- </table>
- </div>
- <p align="justify"><b><font size="2">The implemented algorithm is
- regarded as very secure throughout the industry. Although, when using
- this method, the consumption of a lot of processing time must be taken
- into account.</font></b></p>
- <p align="justify"><a name="wipe_unused_disk_space"></a></p>
- <a name="lock" id="lock"></a><hr align="JUSTIFY" size="1" noshade>
- <div align="justify">
- <h3><span style="font-weight: 400"><b><span class="headline2">Wipe
- unused disk space</span></b></span> <a href="#top"><img src="img/back.gif" alt="back to top" border="0" align="absmiddle" width="16" height="16"></a></h3>
- </div>
- <hr align="JUSTIFY" size="1" noshade>
- <p align="justify"><b><span class="headline2">
- <img border="1" src="img/shell_ext_main_wipe_unused.gif" hspace="10" vspace="5" width="721" height="572"></span></b></p>
- <p align="justify"><b><span class="headline2">Function<br>
- </span></b>When launching this function, a window pops up in which the
- user can choose on which writable medium he wants to wipe unused hard
- disk space. This function writes random numbers to the remaining storage
- capacity of the selected drive.</p>
- <p align="justify">As the free capacity of modern hard disks is usually
- in the range of several 10 to 100 gigabytes, the implemented one-pass
- algorithm is optimized for speed.</td>
- </tr>
- </table>
- </td>
- </tr>
- </table>
-
- </body>
-
- </html>
-