Cicada ( previously called Dogpound47 )

1. Message encoding ( Vigenere ) screenshot
2. File encoding to hide data from viruses etc ( single and batch operations. Multi threaded for speed ) screenshot
  ( password for file encoding is abc123 change it as soon as you download the program )
3. Copy files to backup device    screenshot
3. Hash generator ( MD5 )            screenshot
4. Steganography                       screenshot and Diffie Hellman
5. Anti Surveillance list editor.     screenshot supports DYOC style comma delimited spreadsheet format (CSV).
      
6. Open source and free from AddWare, MalWare, Keyloggers, Trojans, Virus infections, NSA back doors, etc ( but use your virus tool to check packages from the internet always please i'm only human and my computer gets the flu sometimes too ) !!
7. Internationalised can use Chinese characters screenshot
8. Daily Scheduler for busy activists !!! screenshot below or help forum for this program here and overall strategy for changing your total approach to web activity here



Setting up using Windows Schedule here

Download link at bottom of page
 Note to steve how to do md5 from linux prompt ..... use md5sum Windows/Linux help

This cypher suite was developed after researching the Rot47 links on Google other cyphers of interest are RSA and DES but their are plenty of programs and libraries that do those cyphers i wanted something more bespoke and more transparent than corporate software solutions. Open source is great for this as it develops a trusted network of people to use as a resource.   The code is written in Delphi 32 and inspired by this article  try to see if you can solve it with this tool perhaps? a python attack algorithm maybe? I am interested in the socialist millionare problem in which 2 millionares of carbon credits economy and using Off-The-Record instead of PGP? hmm maybe we could collaborate on a job applicaton to do the text messaging part? getting close  Ok maybe we aren't up to that yet............ oh and if you want to just start playing with the crypto program i wrote just look at the link at the bottom of the page. Or chat about it on my Disqus crypto page
some good sites .... http://www.davinciunltd.com/code/delphi-cryptography/ here is a screenshot doing MD5 hashes
old now the collumns line up properly
 

here is the copy files to backup section



 
( screenshot of a simple pre Vigenere Rot47 experiment version 0.1 above click for larger version )

How to use? just copy some text from a word processor etc and paste into the program then click on the click here at the top to process the text into encrypted form. Based on code from this website called ROT47 ( if you can't find it is written in Delphi32 just put Delphi and rot47 in Google here use their search sites engine
All care taken but no responsibility accepted. Don't use this for anything important. This does some changes to the original text ( puts a indent in to paragraphs for instance I haven't been able to find out why but these changes don't bother me much so ......  if it bothers you don't use it oh and don't put double space between words)
I have included the source with the archive. GPL 3 by Stephen Jones.
To download click on the arrow pointing down next to the filename below. The program substitutes the pound symbol for the space/linefeed so you have a much harder looking text to decrypt but frequency analysis still is possible. 

How Vigenere works there are a list of characters that stand for the code so say our key is 123123
then the result would be the plain text  to encrypt of "acrobat" would be to go to the index for the letter 'a' and then down to the text position in this case we have the letter 'i' if we use the table below.

So on can we go until the whole message is encrypted so a non repeating key ie not 123123 say 131233 would be very hard to crack for a 6 letter message. As one of the ways Vigenere is cracked is with checking a recurring key.  So we have the equation key length is equal or greater then the length of the message.  See image further down with the black screen for a view of the key generator ( creates 750 length  keys for a input value of 800 )


Version 2 notes trying to add other characters to defeat frequency analysis ( looking at the text to find often occurring characters in the text that may be the letter 'e' for instance as it is a common letter in English ) click on the dictionary page to see bigger image i am making a key/dictionary version.

more information on how I got this part working here
http://itsecuritylab.eu/index.php/tag/monoalphabetic-cipher/



Numeric key tool ( click above for larger image ) you need a key and a dictionary ( what is a dictionary? in this context it is a list of letters to substitute with the original ones to encrypt data you can refer to it later to decode the encrypted text ).
  You can press to produce the key it has 750 characters acording to Wikipedia Vigenere's cypher is almost unbreakable when the key reaches the same size as the encrypted text.  See link here 
the text is comma delimited and can be saved by clicking on the numeric key saving tab  ( where you can also save the dictionary you created )

Some caveats .   The text at this time is only capable of processing all text in lower case as I found if I included too many characters the random character generator to go into a loop.  If you encrypt upper case characters they will be auto changed to lower case in the decrypted text.  Also i have made this for protesters not programmers :) so no brackets only regular punctuation characters such as commas, full stops and quotes.  Although web URLs and email/twitter are ok as I kept th hash tag and the @ symbol Slashs for both unix and windows are preserved too. 
 In version e2 i have made the key auto re-size to the size of the text to be encrypted to avoid datagram detection. Also fixed bugs with loading so there are no dialogs coming up when you start program.  Program always starts now on the main page ( when not in the Delphi IDE ).

Um here is the picture of the file crypto screen ( click for larger ) creates files with .rot extension and rot13 filenames these files can't be read so its good for hiding things ( from viruses for example ) but be careful you don't do it to any operating system files .........




Back to Main page for other codes on this site I have written using Hash to save search locations for a
speedier search engine or chat for these programs here
Here is a list editor that i added ( Click for larger image ) you can easily alphabet lists of words like
the image shows or delete the duplicates ( handy for anti-surveillance lists )


um here is a link to another network security program I am working on zenoprobe it checks for network attached devices and tries to identify them.



Also a search engine for your computer that uses hashing to save previous searches also for secure searching of the internet for your computer TOR

Have fun and don't forget to download the program below to learn more about four fan crypto graffiti :)



screenshot above search engine for you computer here note for files below download by clicking on the down arrow not the name ( click on the name shows you the contents of the archive ..... thanks google :) and rot13 Chrome plugin  and message me at Disqus crypto page for Cicada encryption challange. old page from the name this program previously had ( dogpound47 )http://sites.google.com/site/venvirupa/dogpound47 
Program under GPL version 3 this version written for the Cicada challenge on the 4th January this code stream copyleft 1st January 2014. ( This version fixes loading/saving of key/cypher/dictionary combinations. Just keep them together or you lost it big time i have no way of cracking my own cyper yet and would like to ask people to help that way.  Also no responsibility accepted, all care has been taken in the creation of this program but you use it at your own risk. That also includes any third parties you give it to. NSA and other government organisations are forbidden to use it or reverse engineer the code as part of the usage agreement. Free as in free Speech !!! oh here is a nice font picture after my ranting... its called punk you can see it also with the obfuscation function that draws lines over the text to stop robots
( think captcha texts..... Diffie Hellman anonymous chat authentication )



want to swap your key/dictionary pair ( nothing better then hiding in plain sight ) try pastebin's  website or Zerobin actually they have a read once function so if the intended person doesn't get it you just generage another key pair............
Want a program you may be more familiar with?  Try this idea using spreadsheet DYOC ( do your own crypto ) or remove NSA key from your computer here and use computer under country firewalls here

Wand a lighter weight tool for doing data transform like ROT13 and ObfuBot ( a similar reversible text transform )

ċ
OnyxCicada79.zip
(679k)
Stephen P,
17 Feb 2014, 12:27
ċ
Stephen P,
31 Jul 2014, 18:56
ċ
onyxmd5.txt
(0k)
Stephen P,
17 Feb 2014, 12:33
Comments