Knoxcrypt Versions Save

An encrypted filesystem

v0.5b

9 years ago

Not compatible with previous version. This introduces password hash checking to make sure correct pass entered. Please build from source. No binaries will be provided.

0.5

9 years ago

This supports several new ciphers made possible by use of the crypto++ libraries. The XTEA algorithm which I originally implemented myself as a proof-of-concept placeholder has been removed. Please build from source. No binaries will be provided.

v0.3c

10 years ago

Introduces a shell utility that can be used to access and modify TeaSafe containers without requiring fuse. The shell is in some ways similar to a standard terminal program. It has commands like 'ls' and 'pwd' etc. When running the teashell, type in 'help' for a list of available commands.

The following sha 256 values were generated for the binaries that go with this release.

36e14529da900ab8b7cd5974df423aff5e4ae09c4003cdbb5630af305a02c8f7 teasafe_Darwin c6edcd3e14abe057bfb58fa06e9f6e4ab28e24f772d818d10ef176e90242be9e teasafe_Linux dd1e882c91633355dc7fc5f21eaa8dfbd19ea20f5111afa5d600e84cde30e48e teashell_Darwin 46298bf8841a78fc4ecd4b4d48a0668c1d5fc9ae79ce2f94d4ed9c0409a06de0 teashell_Linux af8caa5bbc993f26870f510493ce5072e2daa5b8f52c7fc5665080df5ca60d67 maketeasafe_Darwin 06774cffed04e53262960dba851852103ac9d628d69d30a3dfcb7ec73503113e maketeasafe_Linux

v0.3b

10 years ago

Experimental mac and linux binaries.

NOTE: requires fuse or osxfuse (mac). Binaries have been statically linked against required boost libraries so I believe these should just work. As a caveat, however, I've not tested them on anything other than my dev machines.

sha256sums:

22a483cc12c2895518077d2e2a546fbcf81ed4e75b79b0779df95dd418827cfe teasafe_mac 11d65487da61d00cb4eb07143a8f11223d3e0e850d5848b774cea8c496c04d2b teasafe_linux 97e9a01bfaf49805044f4b069251f486726529fb06df2fc5b4775708d4b4c707 maketeasafe_mac 75125250197bb061ddd9fd4cc8ba52dcf181314ca7b1a7dcb968bb75a5e0310a maketeasafe_linux

v0.3

10 years ago

Significant speed-ups.

v0.2e

10 years ago

Replaced mersenne twister rng with random_device for more secure random number generation

v0.2d

10 years ago

Now using iv for key generation salt and upped p to 8 (with N = 2^20 and r = 1)

v0.2c

10 years ago

IV generation now achieved using a Mersenne Twister PRNG

v0.2b

10 years ago

Updated scrypt code. Now using original reference implementation which seems lot cleaner Not compat with previous version due to bigger size of N being used

v0.2

10 years ago

Now using the scrypt key-derivation algorithm (n = 1024, r = 1, p = 1) for key derivation Note, this is not compatible with previous versions