StrongCrypt (Thu Aug 19 19:35:14 GMT+05:00 1999)
Copyright (C) 1999 Waqas Shafiq.
All Rights Reserved.


Table of contents
-----------------
Major Features
Hardware Requirements
Software Requirements
Disclaimer
Registration and Distribution
Acknowledgement
Notification
Known Bugs
Contacting the author 


Major Features
--------------

   StrongCrypt is a security tool written purely in Java. It provides
   following services:

   A. Encryption
   -------------
   Encryption is the translation of data into a secret code.
   It is the most effective way to achieve data security. To read
   an encrypted file, you must have access to a secret key or
   password that enables you to decrypt it.

   There are two main types of encryption: asymmetric encryption
   (also called public-key encryption) and symmetric encryption.

   StrongCrypt provides both types of encryption. It supports following
   encryption algorithms:

   Algorithm Name             Key Size (bits)

   PBEWithMD5AndDES           64
   PBEWithSHA1And128BitRC4    128
   Blowfish                   448      
   DES                        64
   DESede                     168
   IDEA                       128
   RC4                        128
   Twofish                    256
   RSA                        1024 - 4096 

   Note: See "Difference between SHAREWARE and REGISTERED version"

   B. Decryption
   -------------
   Decryption is the process of decoding data that has been
   encrypted into a secret format.

   StrongCrypt supports all decryption algorithms listed above.

   C. Digital Signature Generation
   -------------------------------
   A digital signature is a string of bits that is computed
   from the data being "signed" and the private key of an entity.
   The signature can be used to verify that the data came from
   the entity and was not modified in transit.

   StrongCrypt provides the following signature algorithms:

   MD5withRSA
   SHA1withDSA

   D. Digital Signature Verification
   ---------------------------------
   StrongCrypt can be used to verify signatures for files that were
   signed using any of the signature algorithms mentioned above.

   E. File Compression
   --------------------
   StrongCrypt provides file compression and decompression using
   the standard ZIP file format.
 
   F. Secure Delete 
   ----------------
   StrongCrypt does not create any temporary files during encryption. 
   After encrypting a file you can (optionally) secure delete the 
   original file. The original file is first over written by cipher text
   and then deleted. This prevents anyone from recovering the original 
   file after it is deleted. This might take more time for larger files 
   but is more secure than just deleting the name of the file from 
   directory. 

   Note: Even after secure delete there may be left over traces of the
   original file if you have copied or moved the file on the disk. There
   might even be copies of the original file in a temporary folder if you
   have used print option on an operating system such as Windows. 

   G. Secret Key Management 
   ------------------------
   There is no key-backup or key-escrow system in StrongCrypt. Secret 
   keys are protected by encrypting them with a specified public key 
   using RSA algorithm. You can further provide an additional degree of 
   protection by encrypting the RSA encrypted secret key with an 
   algorithm such as PBEWithSHA1And128BitRC4. The secret keys are saved
   as a separate file with a .key extension. This way you can send the 
   encrypted file and the key over the internet knowing that the person 
   who has corresponding private key and knows which algorithm was used 
   to encrypt the file can decrypt it. 

   Unless you give away your private key or the password used to encrypt
   a certain file, no one can access files you have encrypted, even if he
   has your copy of StrongCrypt. 

   H. User Friendly
   ----------------
   As there are no Install and Unistall features in StrongCrypt, it might be 
   little difficult to setup for users have not used Java software 
   before. Once installed, the program is not only very easy to use but 
   also provides very strong encryption.


Hardware Requirements
---------------------

   The software requires a Pentium based computer to run. A mouse
   or other pointing device is required for performing most functions.


Software Requirements
---------------------

  You must have JRE 1.2 or higher in order to run StrongCrypt.  

  JRE 1.2 for Windows 95/98/NT and Solaris is avaiable for
  download for free at http://java.sun.com/products/jdk/1.2/jre/. 

  Ports for other platforms can be found at  
  http://java.sun.com/cgi-bin/java-ports.cgi 


Disclaimer
----------

   You are granted the right to use and to make an unlimited 
   number of copies of the SHAREWARE version of this software. 
   You may not disassemble, decompose, reverse engineer, or alter 
   any of the files in the package.

   This software is provided as SHAREWARE and cannot be sold.
   This restriction does not apply to connect time charges, or 
   flat rate connection/download fees for electronic bulletin 
   board services. This software can not be bundled with any 
   commercial package or distributed by itself or accompanying
   books or magazines without express written permission from
   the author.

   The author of this program accepts no responsibility for 
   damages resulting from the use of this product and makes no 
   warranty or representation, either express or implied, including 
   but not limited to, any implied warranty of merchantability or 
   fitness for a particular purpose. This software is provided 
   "AS IS", and you, its user, assume all risks when using it.

Registration and Distribution
-----------------------------

   The term "StrongCrypt" identifies release version
   StrongCrypt (Thu Aug 19 19:35:14 GMT+05:00 1999) of StrongCrypt 
   series.

   The term "SHAREWARE version" identifies the complete package
   which include StrongCrypt's jar (class) file, readme file and other
   files included in the distribution package.

   The term "SHAREWARE copy" identifies an instance of the
   SHAREWARE version.

   The term "REGISTERED version" identifies a SHAREWARE version
   of StrongCrypt, together with registered user information and support
   for additonal encryption algorithms.

   The term "REGISTERED copy" identifies an instance of the
   REGISTERED version.

   No component part of StrongCrypt may be distributed individually,
   disassembled, copied, reverse engineered, or altered in any form.
   This includes all elements in the StrongCrypt package.

   Distribution
   ------------

   1. SHAREWARE copies may be freely distributed by individual
      users for trial and leisure utilization

   2. SHAREWARE copies may be uploaded to Bulletin Board Systems,
      FTP sites, Usenet newsgroups and any network sites providing
      its users with access to download it for trial and leisure
      purposes. 

   3. SHAREWARE copies may NOT be distributed in CD-ROM disks,
      diskettes or any other media, without express authorization
      of the author. 

   4. SHAREWARE copies may NOT be distributed with any software package,
      or be systematically recommended to users of any software system
      or service, without express authorization of the author.

   5. REGISTERED copies may only be distributed by the author of
      StrongCrypt.

   Registration
   ------------

   If you like StrongCrypt and use it regularly, you must register
   it by paying a small fee.  By registering the software, you
   will be able to use it legally, and will be supporting my
   efforts to continually develop innovative poducts to best
   serve your needs. Beside this, the registered users will be
   entitled to receive an enhanced version of StrongCrypt with 
   additional encryption algorithms without any snags.

   Registration is performed by sending 20 U.S. dollars by check.
   Payments must be made to "Waqas Shafiq" and mailed together
   with Your E-mail Address, Company Name, and Contact Name to:

   Waqas Shafiq
   B-119 Gulshan-E-Hadeed Phase I
   Karachi - 75010
   Pakistan

   Your E-mail Address, Company Name, and Contact Name are 
   required to provide the registration file. It is imperative 
   that I receive your E-mail address in order to fulfill your order.

   The registration file will be sent to you as an e-mail
   attachment together with instructions to register the software.

   If you would like to register the software but cannot afford 
   to pay 20 U.S. dollars, don't hesitate to send an email to the
   author stating the amount you can pay. I will adjust the price 
   according to your requirment. Please do not use pirated copies. 


Acknowledgement
---------------

   StrongCrypt makes use of ABA JCE provided by Australian Business 
   Access Pty Ltd. under The ABA Public License.StrongCrypt does not 
   include the complete package provided by ABA. You can obtain the 
   complete version of ABA JCE from the web site mentioned below. 

   Contact details:
   Australian Business Access Pty Ltd
   Level 2, 33 Lincoln Square South,
   Carlton, Victoria,3053, Australia

   Phone +61 3 8341 2400
   Fax +61 3 8341 2499
   Email enquiries@aba.net.au
   Web: http://www.aba.net.au/


Difference between SHAREWARE and REGISTERED version
---------------------------------------------------

   1. The SHAREWARE version of StrongCrypt supports the following
      encryption algorithms:

      PBWWithMD5AndDES
      PBEWithSHA1And128BitRC4

      These encryption algorithms are much stronger than
      the one found in Non-US version of the two commonly used
      browsers which offer 40-bit RC4 encryption.

      The rest of the encryption algorithms are available in the
      REGISTERED version only.


Notification
------------

      A. StrongCrypt contains encryption technology that is subject
         to the import or export controls of certain countries.

      B. StrongCrypt contains technology patented in some countries
         and therefore require additional licensing from the
         patent holders in those countries prior to use.


Known Bugs
----------

     - None as yet.

Contacting the author 
---------------------

   1. Send email to wshafiq@cyberjunkie.com, mentioning StrongCrypt
      in the subject line.

   2. Visit home page at: http://www.cyberjunkie.com/wshafiq

