Free Encryption Cloaking Software

Testing, Education, and Research Only

The subject matter of Encryption Cloaking and functional transformation in machine cryptography in the free programs is protected by issued and pending US Patents. Users are granted a very limited license to use these programs strictly for private use, education, testing, and research purposes only.

We claim an increase of security in existing encryption by Encryption Cloaking up to a factor 1015,000 or even higher. Yes, we know, this is an insanely large number. The free programs allow you to test the effect of out Encryption Cloaking on an AES-GCM text encryption. The easy to install and execute MatLab programs (listed further below) provide a free hands-on opportunity to check the real-life performance of the modifications.

No Warranties

These programs are provided "as is" with no guarantees of functionality or support. The working of the programs has been tested on Dell and HP Windows machines.

Warning

The provided encryption methods are extremely powerful. Please, don't be fooled by the simple looking modification. They are at least as powerful as their unmodified base methods, and actually more so. Be aware that there is no way for us to recover data encrypted by these programs. If you lose or overwrite critical encryption parameters, we cannot assist in data recovery. You are solely responsible for maintaining your encryption parameters, keywords and iv.

Limited License to Use the Programs

You are granted a very limited license to use these programs strictly for private use, education, testing, and/or research. You do not have any license or permission to operationally use, or sell, distribute, export, or incorporate the patent-protected aspects of the software into another program. Each downloaded program may be installed on a single machine, which must obtain the programs from this website. Usage for creating any type of secure storage, communication, and/or authentication is not allowed.

Paid User License

If you wish to use the programs for security purposes or to modify existing encryption programs, you can obtain a paid single user license for $149. This license includes full access to all our intellectual property (IP), allowing you to create your own encryption or BYO (Bring Your Own). You will also receive a set of developed software. Contact us at info@labcyfer.com to purchase a full single user license or a site or corporate license or discuss further opportunities.

Paid C and MATLAB Programs ---- $49

The below programs enable the encryption of short text messages. Good enough for viewing immediate effects, but not for practical tests on files. We also have a set of C-programs and Matlab programs that apply the functional transformation/encryption cloaking on large files. We have also created a series of MATLAB Programs and C- programs, fully documented and easy to install and/or compile. The programs include: n-state (like 256-state) Feedback Shift Registers (FSRs); file encryption in modified ChaCha20, AES , AES-GCM and others; modified hashing such as SHA-256; FSR based reversible unique inversion of extremely large sequences of bits (like 800 bits), and others. Contact us at info@labcyfer.com how to get access to these programs, all for $49.

The Free Programs

Program Access

The purpose of this website is to provide easy access to test and review the proposed modifications explained in the patents. We provide Matlab coded programs.

  • AES-GCM (Unmodified): Developed and posted by David Hill, with no copyright limitations. There are two ways to easily obtain the program. First way: download from MathWorks Website. Second way: Downloading requires sign-in to Mathworks. However, you can also go to the above link and click on the "Functions" tab, which shows a list of functions in AES-GCM. You can copy the script and paste in local files, saving it as named on top of the script with .m extension. Like: click on function: Cipher. Copy the script. Paste in Notepad. Save as Cipher.m. Do this for all functions and save in common folder.
  • AES-GCM (Modified): Replaces bitwise XOR with an addition over GF(256). Patent protected. Ten different 256-state tables are included. This also implements the standard AES-GCM routine, when inserting 'sc256' as input. Download Zip File AESflt.zip
  • AES-GCM (Radix-256 Addition): Uses radix-256 addition and includes ten 256-state carry tables and two 256-state tables of reversible involutions. Patent pending. This version also implements the standard AES-GCM routine, when as input selected 'sc256' and 'car256neut'. Download Zip File AESfltrad.zip
  • All programs come with full instructions in .zip. Unzip/extract into a common folder and read the instructions in readme.txt. You may be surprised to find that the transformation is merely a small set of instructions. We also offer modified ChaCha20 encryption programs. Contact us at info@labcyfer.com for more information.

    Patents