Feedback on my similar tool #32
Replies: 1 comment 8 replies
-
This is a very advertisey comment, and from a quick look, I can already see some questionable things and comments going on. For example, password hashing for dozens of seconds is completely impractical, forward secrecy isn't possible using a non-interactive key exchange, the same nonce is being used for various things, you're XORing keys, and you've said that using numbers and symbols weakens a passphrase. I'm afraid I don't currently have the time to look into your tool properly. I'm going to investigate implementing an indistinguishable from random format in v4 because minimising metadata is a goal of mine. However, it's a lot harder to do. One of the main issues would be applying Elligator to ephemeral public keys and padding messages in a way to limit leakage. As for the current version of Kryptor, it does not reveal the exact size of the plaintext because it encrypts in 16 KiB chunks. Even if you encrypt a 0 byte file, it will be padded to 16 KiB. Age also performs chunking but only for larger file sizes. Directory encryption does not currently result in one file, but that's another thing I'm considering for v4. It does have various disadvantages though, like not being able to decrypt or back up individual files in the directory. A corruption could prevent decryption of the entire directory, whereas encrypting files individually means a corruption is less of a problem. It's also again more difficult to implement. |
Beta Was this translation helpful? Give feedback.
-
You should be aware of our effort at finally getting encryption right (and killing PGP). First and foremost, our files have no identifiable header bytes: without correct keys it looks like random data. Yes, it was a little hard to design, but we got it done.
GPG, Age, Kryptor and yes, everybody else reveal the exact size of the plaintext because the encrypted file only adds its headers. While random padding is not a new idea, we implement it correctly while others don't support it at all. We can also put a message and a bunch of files into a single archive (not possible with most other tools, Krypton included as I understand), which hides the sizes and count of individual files, and allows for easier transport of the whole package.
Even with the padding included, our messages are super short, only one line of Base64 where GPG and Age use about six lines, and the gap only widens once you switch to public keys or perhaps have many recipients and signatures.
Within weeks, I claim, we have implemented more features and for a large part better than any of our competition. The console UI is already pretty good. The encryption runs faster than any other program that we know of (around 3 GB/s).
Covert Encryption is still in early development, but we want people to test it and give feedback, especially on the specification because all changes are still possible. For Windows we plan to do a GUI soon and thus won't bother to fix operation in legacy terminals, so use Windows Terminal or other modern options if you wish to try it at this point. Other platforms have no such issues.
https://github.com/covert-encryption/covert
Beta Was this translation helpful? Give feedback.
All reactions