Encryption and Alternate Data Stream
|Submitted on: 11/23/2003 7:16:42 PM |
By: Philip Pierce
User Rating: Unrated
Compatibility:C#, VB.NET, C++.NET
Users have accessed this code 903 times.
|(About the author)|
| This project does three things. The first is that it allows you to encypt any file using one of four different encryption algorithms. Once a file is encrypted, you can send the encrypted file to a partner. Your partner can use this program to view the decrypted contents of the file - WITHOUT THE DECRYPTED CONTENTS BEING WRITTEN TO THE HARD DRIVE. This gives extra security, in that even after a file is deleted, it is not truely deleted. This way, the partner never leaves decrypted information on their hard drive which can be recovered using off the shelf software or government recovery software. If you want to securely remove the original unencrypted file from your computer, I suggest you use PGP Tools to wipe the file.<br><br>
The second part of this project will add any file to the Alternate Data Stream of another file. Please note that this only works with files residing on NTFS partitions (Windows NT 3.5, 4.0+, Windows 2000, Windows XP). Alternate data streams were originally discussed on PSC by Alexandru Ionescu, which can be found at: http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=47617&lngWId;=1. The Alternate Data Stream can be considered a "hidden" file attached to a "visible" file. You can find more information at: http://patriot.net/~carvdawg/docs/dark_side.html.
I have created a class which allows you to read or write any file stream to the Alternate Data Stream of a file. Because of time constraints, I did not include the code to use the Backup API to view all ADS's attached to a file. In the comments of this class, you can find links to more reference material regarding the ADS and C#.<br><br>
Finally, I am having a contest with this project. I have included four jpgs in a zip file enclosed in the project zip file. For each image decrypted, I will award $20. If you can decrypt all four images, I will award an additional $100, for a total of $180. I am posting this contest on Rent A coder, subject "Encryption Contest". You have until Christmas Day, 2003 to decrypt the images. Each image was encrypted only once, using the algorithms found in this project. Each image is different in some fashion. Good Luck.<br><br>
Votes and comments are appreciated. Also, please realize that I am not trying to say that my encryption techniques are unbreakable, because I know they can be broken. However, I would like to know how difficult they are to beat.
Can't Copy and Paste this?|
Click here for a copy-and-paste friendly version of this code!
// for :Encryption and Alternate Data St
Copyrighted Philip Pierce, 2003. All rights reserved.
Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.
Virus note:All files are scanned once-a-day by Planet Source Code for viruses,but new viruses come out every day, so no prevention program can catch 100% of them.
FOR YOUR OWN SAFETY, PLEASE:
1)Re-scan downloaded files using your personal virus checker before using it.
2)NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
If you don't have a virus scanner, you can get one at many places on the net including:McAfee.com
Terms of Agreement:
By using this code, you agree to the following terms...
1) You may use
this code in your own programs (and may compile it into a program and distribute it in compiled format for languages that allow it) freely and with no charge.
2) You MAY NOT redistribute this code (for example to a web site) without written permission from the original author. Failure to do so is a violation of copyright laws.
3) You may link to this code from another website, but ONLY if it is not wrapped in a frame.
4) You will abide by any additional copyright restrictions which the author may have placed in the code or code's description.
Other 12 submission(s) by this author
|Report Bad Submission|
See Voting Log |
|Other User Comments|
There are no comments on this submission.
| Add Your Feedback! |
|Note:Not only will your feedback be posted, but an email will be sent to the code's author in your name. |
NOTICE: The author of this code has been kind enough to share it with you. If you have a criticism, please state it politely or it will be deleted.
For feedback not related to this particular code, please click here.