prunes

Today’s Internet is very developed, and transmission of information between people is very convenient via the Internet. But unfortunately many Internet information delivery software are expressly passed, This signaling is very easy to monitoring and interception by third parties, easily lead to the disclosure of private information, and up to less than the effect of the protection of privacy. In order to help people to protect the privacy of information transfer, through in-depth study of modern cryptography, the author has programmed prunes software dedicated to private information transfer. The prunes software use the existing instant messaging software such as MSN, ICQ, QQ, e-mail, etc, as the transmission of information channels, then its message is be encrypt or decrypt, the needs of people passed the privacy of information on the Internet in this way is solved, thus personal privacy is protected. The prunes software use modern cryptography theory, including: Key Distribution: Use of public key cryptographic algorithms (asymmetric cryptography algorithm), Each user is randomly generated a public key and a private secret key. After exchanged public keys, then prunes can calculate the same encryption key. Then encrypt information and pass it on the Internet, its cryptographic strength has reached 256 bits. According to the existing conditions of the calculation, due to the algorithm is not reversible, general individual and the organization is almost no way to crack and listen. Message encryption: by using the principle of symmetric algorithm (DES), and improve it for private, non-standard DES algorithm to encrypt all the information. The algorithm is fast, high efficiency and high strength, the cryptographic strength has reached 224 bits, almost no one can crack. Marks processing: the prunes software processing all the information and behavior without any retention. And every time it generate random dynamic key, Ensure that each generated session key is different, The key is calculated, not transmitted in the network, and maximum guarantee the security of the key.