All Projects → covert-encryption → covert

covert-encryption / covert

Licence: other
An encryption format offering better security, performance and ease of use than PGP. File a bug if you found anything where we are worse than our competition, and we will fix it.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to covert

Trezor Agent
Hardware-based SSH/PGP agent
Stars: ✭ 400 (+1900%)
Mutual labels:  crypto, gpg
Minisign
A dead simple tool to sign files and verify digital signatures.
Stars: ✭ 1,105 (+5425%)
Mutual labels:  crypto, gpg
VSHG
A standalone addon for GnuPG
Stars: ✭ 18 (-10%)
Mutual labels:  crypto, gpg
simple-sha256
Generate SHA-256 hashes (in Node and the Browser)
Stars: ✭ 42 (+110%)
Mutual labels:  crypto
React-Crypto-Exchange
React Crypto exchange
Stars: ✭ 35 (+75%)
Mutual labels:  crypto
Coinlist
Save your time on Coinlist registrations
Stars: ✭ 74 (+270%)
Mutual labels:  crypto
api-version-2
Executium API Version 2 - A comprehensive trading system API which connects traders with dozens of exchanges. Currently in closed beta
Stars: ✭ 82 (+310%)
Mutual labels:  crypto
RavenCoin-Wallet-With-Miners
RavenCoin Wallet including CPU and GPU miners! programs are directly from Ravencoin and official miner sources
Stars: ✭ 75 (+275%)
Mutual labels:  crypto
Open Crypto Tracker
Bitcoin / Alts private portfolio tracker, with email / text / alexa / telegram price alerts, charts, leverage support and much more.
Stars: ✭ 59 (+195%)
Mutual labels:  crypto
imgcrypt
OCI Image Encryption Package
Stars: ✭ 214 (+970%)
Mutual labels:  gpg
tradeview
A platform for trading crypto currency pairs on crypto exchanges and running crypto currency pair strategies.
Stars: ✭ 69 (+245%)
Mutual labels:  crypto
crazy-awesome-crypto
A list of awesome crypto and blockchain projects
Stars: ✭ 35 (+75%)
Mutual labels:  crypto
kubecrypt
Helper for dealing with secrets in kubernetes.
Stars: ✭ 23 (+15%)
Mutual labels:  crypto
kyber
No description or website provided.
Stars: ✭ 170 (+750%)
Mutual labels:  crypto
price-prediction-bot
🔮 Run backtest over PancakeSwap and CandleGenie Prediction and place realtime bets - Trading Bot
Stars: ✭ 59 (+195%)
Mutual labels:  crypto
github-did
Decentralized Identity with Github
Stars: ✭ 108 (+440%)
Mutual labels:  crypto
libsodium-xchacha20-siv
Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.
Stars: ✭ 25 (+25%)
Mutual labels:  crypto
cryptos
Pure Python from-scratch zero-dependency implementation of Bitcoin for educational purposes
Stars: ✭ 846 (+4130%)
Mutual labels:  crypto
reactive-trader
In the coming weeks this plans to become a Gekko plugin that reacts to market changes, finding and running only the most profitable strategies.
Stars: ✭ 91 (+355%)
Mutual labels:  crypto
MKT
Exchange Price Service , Stocks , Cryptocurrency,Stock prediction and more
Stars: ✭ 27 (+35%)
Mutual labels:  crypto

Logo

Covert Encryption

A file and message encryptor with strong anonymity

  • ChaCha20-Poly1305 stream cipher with authentication
  • Argon2 secures shorter passwords against cracking
  • Curve25519 public key encrypt & sign with SSH, Age and Minisign keys

Anonymity, privacy and authenticity

The encrypted archive looks exactly like random data, providing deniability. Every byte is protected so that not only is reading prevented but authenticity is also verified, protecting your data against any outsiders, and files may also be signed if necessary.

Other encryption tools add unencrypted headers revealing the recipients and other metadata. Covert was created to address this very problem, to stop all information leakage.

A message (base64 or binary) has no headers or anything else that could be recognized:

R/i7oqt9QnTnc6Op9gw9wSbYQq1bfYtKAfEOxpiQopc0SsYdLa12AUkg0o5s4KPfU6eZX59c4SXD2F8efFCEUeU

Covert generates easy passphrases like oliveanglepeaceethics for the above. The encoded message includes random padding to hide the length of the message and it is still shorter than others. For comparison, gpg needs six lines instead of one and still ends up revealing the exact length of the message.

Installation

Python pip installs qcovert and covert on your system:

pip install "covert[gui]"

qcovert      # Run GUI, or
covert       # Run in terminal

Python 3.9 or 3.10 is required. On systems still using older versions, you may need to install by:

python3.9 -m pip install covert

Developers should install a dev repo in editable mode: (consider also using pipenv)

git clone https://github.com/covert-encryption/covert.git
cd covert
pip install -e ".[dev,gui]"

File I/O speeds matching the fastest SSDs

Benchmark results. Covert up to 4 GB/s.

Covert is the fastest of all the popular tools in both encryption (blue) and decryption (red).

Program Lang Algorithms Operation
Covert Python chacha20‑poly1305 sha512‑ed25519 encrypt with auth and signature
Age Go chacha20-poly1305 encrypt with auth
Rage Rust chacha20-poly1305 encrypt with auth
OpenSSL C aes256-ctr (hw accelerated) encrypt only
GPG C aes128-cfb, deflate encrypt with auth and compression
Minisign C blake2b-512 ed25519 signature only (for reference)

A few interesting features

Files of any size may be attached to messages without the use of external tools, and without revealing any metadata such as modification times.

A completely different ciphertext is produced each time, usually of different size, even if the message and the key are exactly the same. Other crypto tools cannot do this.

Covert messages are much shorter than with other cryptosystems, accomplished by some ingenious engineering.

A key insight is that a receiver can blindly attempt to decrypt a file with many different keys and parameters until he finds a combination that authenticates successfully. This saves valuable space on short messages and improves security because no plain text headers are needed.

Screenshot

A secure desktop app

Covert comes with a graphical user interface built in. Unlike PGP GUIs, Covert does not use external CLI tools but instead does everything inside the app. Storing the plain text message on disk at any point exposes it to forensic researchers and hackers who might be scanning your drive for deleted files, and unfortunately there have been such leaks with popular PGP programs that use temporary files to communicate with external editors or with the gpg tool.

Additional reading

Covert is in an early development phase, so you are encouraged to try it but avoid using it on any valuable data just yet. We are looking for interested developers and the specification itself is still open to changes, no compatibility guarantees.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].