A SoftAlleyTM Inc.
Production
email
this to a friend
Cryptographic
Technologies
The current cryptographic products fall into
two major groups. These products use either the shared secret
key, or the certificate based public-private key technologies.
The products in the categories of shared secret key fall into two
categories by themselves. One type uses system-based shared
secret keys, and the other type requires user-based secret keys.
Here we have
provided brief review of the technologies. And after presenting the detailed industry reviews,
like many of our customers, we have concluded that only the Gargoyle
eSecure Suite has adequately addressed the most critical elements of a
reliable, maintainable and secured encryption product for email
privacy, and computer protection.
The Underlying Encryption Technologies
All the
encryption product may transform useful information and content into a
meaningless form that may not be used or recognized by other software
applications. The transformation is called the encryption
process. The content may be transformed back to its original form
during a reverse transformation process.
The
encryption products use well known encryption algorithms.
Currently, there are a few safe and popular encryption algorithms
exist. Each transformation and reverse transformation requires the use
of certain keys. The encryption algorithms are extremely
safe. Though, using master keys available to the authorities may
break them.
Public/Private-Based
Keys
The
products in this category use the public/private key algorithms for
encryption and reverse transformation purposes. The public, and
private keys are complex data types. These keys may only be used
by computer software. Every individual may obtain a set of
public/private key from organizations known as certificate authorities
throughout the world. The users of the encryption products need
to obtain and use the public keys of all the individual email
recipients. The email users may encrypt the email messages or
attachments by using the recipient's public keys. Therefore,
while the recipient's public key is used for email encryption to that
recipient, the recipient's private key is used by the recipient to
reverse transform the encrypted
content into its original content.
After
the initial email address book setups, there is no need to acquire or
exchange the encryption keys electronically.
Only the email recipients or the individuals may use the encryption
product to re-store the original contents of emails by using their own
private keys as part of the reverse transformation.
For an example,
please visit the following site: www.ArticSoft.com
Disadvantages:
When email users may
use address books for registering the email addresses, they also need
to obtain, and maintain a well known public key for each email
recipient. This requires an efficient key management and updating
system.
The use
of private keys always creates a security risk for the key
holders. The private key holders need to store their keys on the
known computers resources and locations. These keys are NOT
SAFE. This is because of the existence of the Internet
viruses, Spyware, Trojan Horses, Intruders, and other malicious
electronic elements.
The use
of these products are extremely limited due to the fact that
the content encryption may only be used for email recipients and
individuals that hold a private/public key certificates. All the
others may not benefit from the products.
The use
of the encrypted emails, and email attachments will trigger data
mining, and Spyware engines. Any detected encryption contents may
provoke alarming signals to the mass eavesdroppers.
The encryption mechanism is as safe as the security of
the key certificate authorities. These organizations are
physically located in various countries, and by nature, they abide by
the governing laws in those countries. These authorities may
break the user privacy by themselves. This is a very gray area of
privacy and security in the Internet world.
The encryption is as safe as the issued user
public/private key certificates. This means the encryption may be
extremely vulnerable when the certificates are used.
The use of the encrypted emails, and email
attachments will trigger data mining, and Spyware engines. Any
detected encryption contents may provoke alarming signals.
The encrypted
emails may be used for only single recipients. This is because
the encryption key is the recipient's public key. Therefore, the
emails for multiple recipients may not be properly encrypted.
All the family products in this group
are difficult to maintain.
This is because of the need for storing and updating the public keys on
the email address books.
Overall Quality:
The use of these
encryption products is fairly safe for computer systems, with some
exceptions.
Their use in email encryption, and
attachments are not advised.
Only one-to-one email encryption is
possible. Therefore, the group mail encryption is not
possible. This makes the encrypted emailing a time consuming
effort.
The additional operational
difficulties may be discouraging for average users.
User-Based
Shared Secret Keys
The private
secret key based encryption algorithms may use any proper secret key
for some content encryption, and its reverse transformation
purposes. While any secret key may be used for the complete
cycle, only the identical key used in content encryption, may be used
for its safe reverse transformation.
When
used for Email Privacy protection, the email user may choose a specific
secret key for encrypting content. After the encryption, he may
send the content to the email recipients. The email recipients
may only restore the original content by using the identical key as was
used by the sender. The same secret keys are used for encryption,
and in a reverse process. Every email recipient may
use the products for encryption purposes. Currently, there are few good
implementation of this algorithm, such as Blowfish, Triple-DES, and
AES.
Disadvantages:
The encryption secret keys should
be exchanged between two parties prior to any encrypted email
exchange. This creates a major opportunity for eavesdroppers to
obtain a copy of the key, and the encrypted contents. Then they
may use the key to re-store the original contents. Occasionally,
a third party may be involved.
The
computer users may use the secret key based products to lock their
computer file systems. These users need to store the keys on
electronic medias such as floppy disks, or the computer itself.
This invites the unauthorized access to these secret keys. Others
may require the use of external token keys. When a used key may
suddenly be lost, the encrypted file will become useless.
The use of
the encrypted emails, and email attachments may trigger data mining,
and Spyware engines. Any detected encryption contents may provoke
alarming signals to the mass eavesdroppers.
Overall Quality:
The use of these encryption
products is very safe for computer systems.
The key management may become complex.
The use of these encryption products
in email communications may trigger eavesdropper's alerts.
One-to-many email communication
encryption is possible.
Combined
System-Based Secret
Keys, and Service-Based Certificates (SSL)
Currently,
there are a couple of products in the market that use public-based
certificates for server identifications, combined with the shared
secret-based encryption for the data itself. Such products are
mostly dedicated for data streaming purposes. They provide a
dedicated channel for financial transaction processing between two
parties, and with a fairly good privacy and security protection.
The SSL implementations are not suitable for file system protection, or
email protection. Please visit the following web sites for
typical examples: verisign, or Information
Security
Disadvantages:
For data streaming products (SSL), the key exchanges
are safe from average hackers. However the shared secret keys are
generated by the system itself.
The key
creations, and safety of the private channels fall at the mercy of the
vendors who build and support such systems. These systems are as
secured and private as the integrity of the companies that support
them.
For
data steaming products (SSL), such systems require pre-setup
configurations for the business partners, or online vendors that may
use the secured channels for their client information
processing.
May not
be suitable for computer file system protection.
May not
be suitable for secured email communications.
May
require complex key management.
The use
of the encrypted emails, and email attachments will trigger data
mining, and Spyware engines. Any detected encryption contents may
provoke alarming signals to the mass eavesdroppers.
Overall Quality:
The use of
these encryption products is fairly safe for computer systems, subject
to adequate key protection to avoid intruder's attack.
Users may not store the encryption
keys in the local computers.
The products in this group may not be adequately
secured for email encryption, and their attachments. This is
due to the need to share secret keys with the email recipients.
The maintenance requirements may also
prove to be expensive due to the need to storing and maintaining many
secret keys.
In general, the one-to-one email
communication encryption is feasible.
Product
Comparison
For the comparison purposes, we picked the best
products in each categories. We used important metrics for
comparison. The results are presented in the following
table. We invite all our visitors to examine these results, use
the links to the individual vendors to verify these results, and then
decide on the products that fit well with their needs.
Products vs. Categories
|
Cypherix
|
Inv Softworks
|
ArticSoft
|
Encryption
|
Information
Security
|
SoftAlley's
eSecure |
Secure Star |
Cipher Shield
|
Security Strength |
High |
Medium |
High |
High |
Medium- High |
High |
High |
High |
File
Encryption
|
Yes
|
Yes
|
Yes
|
Yes- But not Folders
|
No -Only Used in Data Streaming
|
Yes |
Only Disk- Encryption
|
Yes |
Email
Attachment Encryption
|
Yes
|
Yes - Only Provide Self Extracting Files!
|
Yes
|
Yes
|
No
|
Yes |
No |
No |
Smart
Email Message Encryption
|
No
|
No
|
No
|
No
|
No
|
Yes |
No |
No |
Allows
Command Line Execution
|
Yes
|
Yes
|
Yes
|
Yes
|
N/A
|
No |
Yes |
N/A |
Built-in File Shredder
|
Yes
|
Yes
|
Yes
|
Yes
|
No
|
Yes |
Yes |
No |
Requires Extensive Key Management |
Yes |
Yes |
Yes |
|
Yes |
No |
Yes |
Yes |
Third
Party Certificates, Involvement
|
Yes
|
Yes
|
Yes
|
Yes
|
Yes - requires server
|
No |
Yes |
Yes- Strongly |
Provides
Secured Multi-User Environment
|
No
|
No
|
No
|
No
|
Shareable Virtual Space
|
Yes |
No |
No |
Requires Moderate Training |
Yes |
Yes |
Yes |
Yes |
Yes |
No |
Yes |
Yes |
Requires External Hardware |
No |
No |
No |
No |
No |
No |
USB-Token |
Yes |
Price |
$29.95 |
N/A |
Starts At $39.95 per Month |
$49.95 |
High |
$9.95 |
High |
High |
Fully Installed on User Computer |
No |
No |
No |
No |
No |
Yes |
No |
Use Peripheral Device |
Reliable - Available |
No - Can Face Service Interruption! |
No - Can Face Service Interruption! |
No - Can Face Service Interruption! |
No - Can Face Service Interruption! |
No - Requires Server |
Yes |
May Fail to Boot Computer
|
No - Requires External Cable/Device |
Notes:
- The Red Cells in above table indicate the very undesirable values
- The Brown
cells in above table indicate the
acceptable values
- The Green
cells in above table indicate the
good values
- The
Dark Green cells in above table indicate the Best values
The above table
clearly shows the advantages of our system in a number of most critical
areas. As seen in the table, with the exception of the Gargoyle
eSecure, these systems do not provide the combined simplicity,
security, adequate privacy, multi-user functionality and at a low
cost. We also considered the reliability as another major factor
for deciding on the right product. For example, the encrypted
user files may become useless when an external device fails, or when
the service based products may no longer be available.
Most of
the current products are service-based. This means that the user
may lose the encryption protection services, when a service provider
goes bankrupt, or if the vendor may discontinue the service.
Worst, the users who lose their service will also lose their already
encrypted files as well.
Another
threat is due to the product dependencies on the third part
certificates, the use of peripheral instruments, keys, or cables.
This makes the product unreliable.
A
different threat may exist if the product functionality depends on
third-party certificates.
While
most products provide the file, folder encryption, and email attachment
tools, none provided smart email message encryption to hide the user
intention against alerting engines.
As seen in the above table, some products allow the dangerous use of command
line based encryption, and decryption
processes. This opens windows of opportunities for viruses,
Spyware, local, and remote intruders to gain access to the computer
systems, and execute malicious command to lock the user file
systems. As we discussed, no other person may undo such malicious
actions. Therefore, the user computer file system may become
entirely corrupted. No powerful encryption product should allow
the use of encryption products without proper authentications,
monitoring and control. For example, the children should not be
able to use these products to encrypt or even corrupt the files on the
home computers. The Gargoyle eSecure never allows such
unauthorized, and unsupervised use of the product on multiple user
computers.
Solution Advantages
Gargoyle
eSecure Suite use of proprietary user-based secret-key technologies
solve the shortcomings of other encryption algorithms. The
product protects the encryption keys against insecure key exchange
process. The system also prevents users to store the keys on the
user computer as well. This minimizes the key exposure to the
eavesdroppers, Intruders, Spyware, and Hijackers.
Our patented
technologies protect the encrypted emails itself against data mining
engines, and other Spyware engines. It also helps multiple
computer users to safely encrypt their own files, and file systems
against other user's accidental access. This allows computer
users to protect their information in case of computer lose, or
unauthorized access. Parents may use our product to prevent their
children from accessing private files, pictures and sensitive financial
information.
Technology Comparison
By a comprehensive comparison of the best technologies
and products on the market, it is evident that Gargoyle™ eSecure™ Suite has set a
new industry standard.
Gargoyle eSecureTM
Suite Compared to
Other Solutions |
Other Technologies
|
New
Superior Design
|
Public/Private Encryption key
Algorithm |
Other Secret Key Encryption Key
Algorithm |
Gargoyle
eSecureTM Suite |
Email Privacy
|
Low - Medium
|
Medium
|
Extremely High |
System Security |
Low
• Certificate Authority May breach the key
Security
• Intruders attack are possible
|
Low - Medium
• Secret Keys are Kept in the user
computers. Intruders attack are possible
|
High
The
use of 128-448 bit encryption along with our patented technologies are
extremely safe
|
Protects Computer File System
|
Medium
• Key Availability Exposure creates
security breaches
|
Medium
• Key Exchange Exposure creates security
breaches
|
High
|
User Control &
Personalization |
Medium |
Medium
|
Extremely High |
Initial & Operational Setup Requirements
|
High
|
Medium
|
Extremely Low |
Cost
|
Moderate - High
|
Moderate - High |
One Time & Low Cost
|
Using Encryption Algorithms
|
Heavy
|
Heavy
|
Heavy |
User-friendly
|
Low
• Key Management Requirement
• Using Group Email is Not Possible
|
Medium
|
High |
Notes:
- The Red Cells in above table indicate the very undesirable values
- The Brown
cells in above table indicate the
acceptable values
- The Green
cells in above table indicate the
good values
- The
Dark Green cells in above table
indicate the Best values
Email
this to a friend
Gargoyle Strategic Advantages. The following table indicates
the strategic advantages of the Gargoyle eSecure Suite. It is
very clear that this product provides the best support for your email
privacy, as well as a comprehensive support for protecting your
computer file systems. The one time purchasing charge is only a
fraction of what you may pay for others products. The product is
pre-configured, and thus, it is extremely easy to install, and
use.
You will never
face any information loss, or theft, even in the case of any computer
loss. Now you can hide your data, and when you need them, simply
you may unlock the files. The product is extremely safe and
efficient for daily use. It supports a multiple user computer
system similar to the home computers. All the authorized family
members may encrypt their own files on the same computer without
damaging the others files unintentionally. You will never lose
any data again!
From now on,
you can send emails to your financial agents, or your family members
without any worries about the lose of your sensitive information.
Your encrypted emails may not be detected by spies, or used by data
mining engines.
Gargoyle Strategic Advantages |
Email Privacy &
Confidentialities |
- Protects against unsafe key-exchange, and storage
- Protects
user confidential information and email system against alerting and
eavesdropping engines
- Protects
email attachments
- Protects
and hides the email message against confidentiality threats, and spying
eavesdroppers
- Pre-configured
& easy to use (ready to use within 5 minutes)
- Use
of the leading 128-448 bit encryption technologies
|
Cloud Based as well as Computer
File System |
- Patented
technologies very suitable for secured Cloud based storage and
applications.
- Supports
encrypting all types of file and file systems
- Supports
encrypting small to mega sized files
- Blocks
intrusion attacks on the file system
- Protects
uses against Spyware, and data mining engines
- Use
of the leading 128-448 bit encryption technologies
- Provides
extremely safe File Shredder for safe file deleting
|
Control |
- Patented
supports for extremely secured Cloud Based Solutions and Applications
- Supports
unlimited user accounts, each having a unique username/password
- Individual
user account customization
- Protects
against accidental file corruption by novice users
- Protects
against file corruption in a multiple user environment
- Installed
100% on the user computer
- Never
expires, or stops working
- Never
requires third-part Certificates
- Never
requires third-part services for operation
|
Low Cost |
- One-time low cost payment plan
- Requires
no service fees
- Requires
no maintenance fees
|
Ease of Use |
- Requires no Additional Operational Setups for additional
email accounts
- Zero-Learning
requirement
- Easy
to operate on a daily base
- Requires
no maintenance
- Requires
no additional hardware/software investments
- May
be used for group email messages with additional overheads
- Available
for immediate access, and use
|
|
|