Software Coupon Codes Directory

BitCrypt antivirus report at download3k.com

BitCrypt

An Ultra-Strong Encryption that's easy to use

 

I'm giving you a software piece of superior quality

Can I trust you to use it for legal purposes only?

                                                                       Moshe Szweizer

Frequently Asked Questions

  1. Who are the authors of the program?
  2. Who are you - why should I trust you to implement effective encryption software?
  3. What are the system requirements for this program?
  4. I want to see the source code of the program. How can I do that?
  5. Is there any support provided for the program?
  6. Is there a completely free version of the program that I could use?
  7. Why and when would I use this program?
  8. Who is this program for?
  9. How does your software help me fill my needs?
  10. Why should I choose your product over a competing one?
 

 

1 Who are the authors of the program?

 

Hagen Reddmann is a German scientist and software developer. He has done extensive work on implementation of cipher algorithms and provided them as freeware in the form of Delphi components. He has also undertaken comprehensive studies of code optimization techniques. This work is mainly written in assembler and has been published through the relevant discussion groups. His Delphi Encryption Compendium Part I-III contains a comprehensive collection of Hash and Cipher algorithm implementations. The modules written by him may be downloaded from the Borland Developer web site, as well as from numerous other Internet locations.

 

Moshe Szweizer is a New Zealand software developer who began his scientific career in the field of Theoretical Physics. He studied toward Ph.D. in Theoretical Elementary Particle Physics at The Pennsylvania State University, and later on worked as commercial software developer for one of leading New Zealand database developing companies. Currently, he teaches computers at one of Auckland's (New Zealand) schools.

 

 

2 Who are you - why should I trust you to implement effective encryption software?

 

The authors of the program strive to implement scientific approach to the topic of software development. This means that the objective is not to produce a commercially successful application but rather to solve all the theoretical and practical problems associated with the particular problem resolution. In the case of this application the problem tackled was to find a method of secure information passing without making such communication transparent to the third parties. The solution to the problem required division of the implementation into two parts.

 

The first one, represents easily verifiable superior encryption techniques implemented through open source coding. Such approach ensures that the public is satisfied with the strength of implemented encryption. The second part requires a close source coding, which is to ensure the effectiveness of the 'hiding of information' part of the process. Not only the encrypted text is hidden within the picture images, but also the particular implementation of the hiding technique is not made public. In this way the effective encryption strength is multiplied.

 

 

3 What are the system requirements for this program?

 

This is a very small application and should work properly on any Windows computer.

 
  • Any Pentium processor
  • 64 Mb or RAM
  • 1.5 Mb of hard drive space
 

 

4 I want to see the source code of the program. How can I do that?

 

The source code for the ciphers can be obtained through downloading the Delphi Encryption Compendium Part I-III.
One of the numerous sites distributing it is: http://www.delphi32.com/vcl/3267/

 

The source for the BitCrypt is not public and you may not see it.

 

 

5 Is there any support provided for the program?

If you have any questions about the program please use the contact form provided.
I will try to respond within 48 hours after receiving your enquiry

 

 

6 Is there a completely free version of the program that I could use?

 

Yes, version 2.1 of the program is free, and it does not contain any constraints.
It is distributed through:
www.moshe-szweizer.com

 

You may also download it from numerous other sites. Search for "BitCrypt Free" with Google to find other sites providing the free version of the program. Please note that the version 2.1 which is  free does not contain any ciphers.

 

 

7 Why and when would I use this program?

 

If you have some text that you would like to hide without anyone knowing that the process of hiding has taken place. Everyone keeps some pictures on a hard drive. Choose a bitmap image and load it into the program. Type your text and the encryption key. Encrypt it and save the image overriding the original image. No-one would know that you keep your password in that image, or whatever you would like to keep there.

 

You may like to send some information to your friend in another country. Encrypt it and either post the image on the Net or send it as a file attachment with your e-mail. No-one would know that you are sending encrypted text.

 

 

8 Who is this program for?

This program is for people who think that their personal privacy is of paramount importance. This may be in relation to their work place or long distance communication.

 

 

9 How does your software help me fill my needs?

 

This program is designed in such a manner that no-one should be able to establish that you encrypt information while storing it or passing it to others. In other words if you would like to be seen as "not hiding anything",

 

but at the same time are tired of being over-controlled then the program would address your personal needs. At the same time it would allow you to preserve the image of total openness.

 

 

10 Why should I choose your product over a competing one?

 

This is a question of style and feel. Yes, there are other programs that provide similar functionality. You may feel that you like them more.

However, you may like this particular attempt to the strong encryption problem. In that case you are most welcome to use it.

 

On the other hand this program offers features that are difficult to find among other similar software applications. Most importantly this program may be used to encrypt not Latin character texts, like for example Asian character texts.

There is a marked lack of other programs offering this feature to the public.

 

Here is an example of images containing Asian texts. To see the content please follow steps outlined below:

  • Right Click on the image, and Save it on your computer.
  • Then Open it with BitCrypt
  • Enter the key: 123456789
  • The decrypted text may be Saved as a text document (txt) and opened with Notepad to read the original text
  Japanese:    

Chinese:      

Korean:       
 
 

How to Encrypt Asian and other non Latin characters

 
 
Keywords: encryption, text encryption, steganography, encryption techniques, secure encryption, powerful encryption, unbreakable encryption, very strong encryption, secret communication, covert transmission, secure transmission, watertight security, secure communication, opaque information transmission