TStreamCrypt™

The story

For a developer of secure communication solutions the ability to communicate truly secure is essential. This means encrypting data before it travels around the planet... crypting it well... not virtually as ‘US exported toys’ do. Reading books about ‘security and computing’ does not add a lot of new knowledge to ‘the headroom’ but may give one a deeper understanding about how insecure the most common encryption algorithms are... in fact just because they’re algorithms ~ that have limited-sized cyphers(keys)...

The one and only way to safe encryption ? Cyphers (keys) that have no size limit... allowing usage of cyphers that are even bigger in size then the data being encrypted...

I have written this cryptability for you: TStreamCrypt...

Bob Heida, Author.

  



The TStreamCrypt facts  
How it works

Methods :
    procedure EncryptStream (DataStream, KeyStream:Tstream);
    procedure DecryptStream (DataStream, KeyStream:Tstream);
 
Parameter Meaning
DataStream:Tstream any TStream (Descendant) containing data.
KeySteam:TStream any TStream (Descendant) containing the en/de-cryption key.
 
 The EncryptStream an DecryptStream  methods store the result of their work in the DataStream itself (these methods modify the DataStream directly).

No exceptions are handled by this component. This has been done to give you as a programmer the ability to handle and control eventual exceptions (use the TStreamCrypt methods in a try..except block to handle exceptions).
 
 


Sample code:

procedure TForm1.Button1Click(Sender: TObject);
var
dataStream,
Keystream        :Tmemorystream;
begin
  {note: this sample assumes two files in the current directory:
   data.txt - containts the data
   key.txt  - contains the key }
 

 {create the streams}
 dataStream:=TmemoryStream.Create;
 KeyStream :=TmemoryStream.Create;

 {load data from files into streams (note you can use filestreams as well)}
 datastream.loadfromfile('data.txt');
 KeyStream.LoadFromFile('Key.txt');

 {Encrypt the data}
 StreamCrypt1.EncryptStream(DataStream,KeyStream);

 {save the encrypted data to a file named 'crypted.txt'}
 datastream.SaveToFile('crypted.txt');

 {Decrypt the data}
 StreamCrypt1.DecryptStream(DataStream,KeyStream);

 {save the decrypted data to a file named 'decrypted.txt'}
 datastream.SaveToFile('Decrypted.txt');

 {free the streams}
 dataStream.free;
 KeyStream.free;
end;
 
 



Pricing
 
Component Trial Free of charge
Component (royalty free) US$  195,=
Component Source US$ 4995,=
Note: The trial is a fully working version, it just shows an '3 second TStreamCrypt advert' on the screen when a method is called.
 

END-USER LICENSE AGREEMENT

IMPORTANT-READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity) and The Software Factory Ltd. for the TStreamCrypt Component later refered to as 'SOFTWARE COMPONENT'. By installing, copying, or otherwise using the SOFTWARE COMPONENT, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, do not install or use the SOFTWARE COMPONENT; you may, however, return it to your place of purchase for a full refund.

SOFTWARE COMPONENT  LICENSE

The SOFTWARE COMPONENT is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE COMPONENT is licensed, not sold.

1. GRANT OF LICENSE. This EULA grants you the following rights:
--Software. You may install and use one copy of the SOFTWARE COMPONENT , or any prior version, on a single computer.
--Storage/Network Use. You may also store or install a copy of the SOFTWARE COMPONENT on a storage device, such as a network server, used only to install or run the SOFTWARE COMPONENT on your other computers over an internal network; however, you must acquire and dedicate a license for each separate computer on which the SOFTWARE COMPONENT is installed or run from the storage device. A license for the SOFTWARE COMPONENT may not be shared or used concurrently on different computers.
--Software Created using the SOFTWARE COMPONENT may be re-distributed, in compiled form only, royalty free.

2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS.
--Limitations on Reverse Engineering, Decompilation, and Disassembly. You may not reverse engineer, decompile, or disassemble the SOFTWARE COMPONENT, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.
--Rental. You may not rent, lease, or lend the SOFTWARE COMPONENT.

NO LIABILITY FOR CONSEQUENTIAL DAMAGES. To the maximum extent permitted by applicable law, in no event shall The Software Factory Ltd. or its suppliers be liable for any special, incidental, indirect, or consequential damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or any other pecuniary loss) arising out of the use of or inability to use the software component, even if  The Software Factory Ltd. has been advised of the possibility of such damages. In any case, The Software Factory Ltd. entire liability under any provision of this EULA shall be limited to the greater of the amount actually paid by you for the SOFTWARE COMPONENT or US$5.00.


 For further information do contact:

The Software Factory Ltd.
Attn.: Bob Heida
Uvoz 5
118 00 Prague
Czech Republic

Email:bob@mbox.vol.cz