Acknowledgements - Speedcrypt File Encryption

Speedcrypt
File Encryption
Speedcrypt
Encrypted Files
Go to content
Acknowledgements...
Acknowledgements Credits Authors
If i have been able to create a project like Speedcrypt, it is also thanks to all those who, in the field of cryptography and particularly in Open Source, have made their skills, developed code and provided support to create reliable and secure projects available to everyone. As already mentioned, Speedcrypt uses only Certified Open Source Components with a free license. A heartfelt thank you to these people for their contribution, suggestions, and more.


Below is a list, in order of implementation in the Speedcrypt Project, of the Libraries, Components, and Tools used, along with their respective authors. In addition, the licenses released for the use of the material produced by the authors themselves are reported.
Crypto Engines Acknowledgements
The cryptographic engines implemented in the Speedcrypt Project are used for encrypting files and the SALT string stored in archives. These algorithms are highly secure, performant, and offer a significant execution speed.

  Author
  Class/Library
 The Legion of the Bouncy Castle
 The Bouncy Castle Crypto Package is a c# Implementation of Cryptographic Algorithms. AES-GCM, PGP
 Kenneth Skovhede
 c# implementation of the AES RIJNDAEL
 Scott Bennett, Kaarlo Räihä
 c# implementation of the ChaCha20
 Scott Brady
 c# Implementation of the XChaCha20-Poly1305 fantastic BouncyDancing Class!
Random Number Generator Acknowledgements
The Pseudorandom Number Generator available in the program are all of good quality in terms of security and stability. Some of them are well-known and widely used in the field of cryptography, such as Fortuna and the Mersenne Twister, which offer excellent performance.
  Author
  Class/Library
 The Legion of the Bouncy Castle
 c# Implementation of the Secure Random Class DEV-CRYPTO-CSHARP MAIL ARCHIVE
 David Mkheyan
 .NET Implementation of the Fortuna PRNG Algorithm in GitHub davemk99/FortunaPRNG
 Smithc
 .NET Implementation of the Fortuna PRNG Algorithm in GitHub Smithc/Fortuna
 Trevor Misfeldt
 c# Implementation of the Mersenne Twister Random Number Generator
For developers: the Random Number Generator called Fortuna in the Speedcrypt Project implements two different libraries, both very valid and performing. The version written by David Mkheyan is active but, if you want to use it, in the Source Code there are instructions to enable the one written by Smithc.
HASH Engines Acknowledgements
Speedcrypt offers users fourteen HASH Functions among the most renowned and used in the world of Cryptography. Some are dated but still efficient and performant, while others are new generation.
  Author
  Class/Library
 Daniel Dinu, Dmitry Khovratovich,      Jean-Philippe Aumasson, Samuel      Neves, Thomas Pornin
 C Implementation of the Argon2 Password Hashing Function adapted c#
 Dominik Reichl
 c# Implementation of the BLAKE Hash Algorithm 256 512 Bit Very Good Class!
 Colin Percival
 Password-based Key Derivation Function Scrypt
 James F. Bellinger
 Cryptsharp Library c# Implementation of the PBKDF2
 John Underhill
 c# Implementation of the Skein Password Hashing Function 256 512 1024 Bit
 Damien Miller, Derek Slager
 c# implementation of the BCrypt Key Derivation Function
 The Legion of the Bouncy Castle
 c# Implementation of the SHA 512, SHA 384, SHA 512 Classes
Icon Acknowledgements
The graphical user interface of the Speedcrypt Project uses a set of icons created by one of the most well-known Italian Graphic Designers in the world. These icons make the interface itself very pleasant, intuitive, and easy to use. The set of icons is truly remarkable, designed for an extremely elegant and pleasant graphic appearance.
  Author
  Set
 David Vignoni
Many thanks to David Vignoni for creating the beautiful and elegant Nuvola Icon Theme. Speedcrypt and its Website use the icons from this set. You can find the original images on the author's Website and the license here.
Tools Acknowledgements
The Speedcrypt Project includes numerous Tools that allow the program to perform specific procedures, some of which include Data Compression, Secure Deletion, Password Strength, and other very useful implementations for the proper functioning of the project.
  Author
  Tools
 Julian Seward
 BZip2 Compression Algorithm
 AlphaDelta
Secure-Desktop: It inspired Protected Mode in Speedcrypt!
 Guy Acosta
Secure String Extension
 Jean-Loup Gailly, Mark Adler
 GZip Compression Algorithm
 Phillip Walter Katz
 Zip compression Algorithm
 Josip Habjan
 Rod Stephens
 Display Icons next to ListView sub-items in C#
 Jim Hollenhorst
 Shell Link Class
 Vincenzo Rossi
 PrintPreviewDialog. Very good Class!
 Dan Wheeler
 zxcvbn: Realistic Password Strength Estimation in GitHub
 Dominik Reich
 Quality Progress Bar. KeePass Project  
 Carlos Delgado
 Apurba Ranjan
 Serial Number Of Hard Drive C# Class
 Tharindu Patikirikorala
 Password Strength Control
 Paul Seal Passsword Generator: Very god library which generates random passwords to meet the OWASP requirements
 Jordan Russell
 Inno Setup. This tool is used to create the Speedcrypt Installation Program.
Hosting/Distribution Acknowledgements
Download Speedcrypt File Encryption
Many thanks to SourceForge for Hosting the Speedcrypt Downloads for Free!
Special Acknowledgements
A heartfelt thanks to Giancarlo Fiori (Fiori Studio) for the intense exchange of opinions on the data flow of the Speedcrypt Project, on the graphics, and on the data encryption tests. Thank you also for the time spent on Signal Chat for the valuable suggestions and discussions on possible improvements and adjustments to the project.

Thank you to Giambattista Attene (Giamba Studio) for the initial testing of the Speedcrypt Project.
Thank you to Manuel Martano for the initial testing of the Speedcrypt Project.
Thank you to Palmerio Nughedu for the final testing of the Speedcrypt Project.
Thank you to Stefano Scarpello for the guide made available to Italian beta testers.
Licenses of Librarys, Components, Tools
The Legion of Bouncy Castle
LICENSE
Copyright (c) 2000 - 2022 The Legion of the Bouncy Castle Inc. (http://www.bouncycastle.org)
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
ChaCha2 Implementation
LICENSE
Copyright (c) 2015, 2018 Scott Bennett
                         (c) 2018-2021 Kaarlo Räihä
            
Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
XChaCha20-Poly1305 Implementation
LICENSE
scottbrady91/IdentityModel is licensed under the
Apache License 2.0
A permissive license whose main conditions require preservation of copyright and license notices.
Contributors provide an express grant of patent rights. Licensed works, modifications, and larger works
may be distributed under different terms and without source code.
Fortuna Implementation
LICENSE
Copyright (c) 2016 smithc
Mersenne Twister Implementation
LICENSE
A C-program for MT19937, with initialization improved 2002/1/26.
             Coded by Takuji Nishimura and Makoto Matsumoto.
Before using, initialize the state by using init_genrand(seed)  
           or init_by_array(init_key, key_length).
Copyright (C) 1997 - 2002, Makoto Matsumoto and Takuji Nishimura,
             All rights reserved.                          
Redistribution and use in source and binary forms, with or without
           modification, are permitted provided that the following conditions
           are met:
    1. Redistributions of source code must retain the above copyright
                   notice, this list of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright
                   notice, this list of conditions and the following disclaimer in the
                   documentation and/or other materials provided with the distribution.
    3. The names of its contributors may not be used to endorse or promote
                   products derived from this software without specific prior written
                   permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Argon2 Implementation
LICENSE
Argon2 reference source code package - reference C implementations
Copyright 2015
Daniel Dinu, Dmitry Khovratovich, Jean-Philippe Aumasson, and Samuel Neves
You may use this work under the terms of a Creative Commons CC0 1.0
License/Waiver or the Apache Public License 2.0, at your option. The terms of
these licenses can be found at:
Blake Implementation
LICENSE
BlakeSharp - Blake256 BlakeSharp - Blake512
Public domain implementation of the BLAKE hash algorithm
by Dominik Reichl <dominik.reichl@t-online.de>
Web:http://www.dominik-reichl.de/
If you're using this class, it would be nice if you'd mention
me somewhere in the documentation of your program, but it's
not required.
BLAKE was designed by Jean-Philippe Aumasson, Luca Henzen,
Willi Meier and Raphael C.-W. Phan.
BlakeSharp was derived from the reference C implementation.
Version 1.0 - 2011-11-20
- Initial release (implementing BLAKE v1.4).
Scrypt Implementation
LICENSE
Copyright Notice
Implementation of the Scrypt a password-based key derivation function.
Scrypt was created by Colin Percival and is specified in
"http://tools.ietf.org/html/draft-josefsson-scrypt-kdf-01".
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors.  All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document.  Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.  Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Cryptsharp library Implementation
LICENSE
CryptSharp
Copyright (c) 2010, 2013 James F. Bellinger <http://www.zer7.com/software/cryptsharp>
Skein Implementation
LICENSE
Copyright (c) 2016 vtdev.com
This file is part of the CEX Cryptographic library.
Principal Algorithms:
The Skein Hash Function Family: "https://www.schneier.com/academic/skein/".
Implementation Details:
An implementation of the Skein digest.
Written by John Underhill, January 13, 2015
contact: develop@vtdev.com
BCrypt Implementation
LICENSE
Copyright (c) 2006 Damien Miller <djm@mindrot.org>
           Copyright (c) 2007 Derek Slager
BZip2 Implementation
LICENSE
This program, "bzip2", the associated library "libbzip2", and all
documentation, are copyright (C) 1996-2010 Julian R Seward.  All
rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
          
1. Redistributions of source code must retain the above copyright
   notice, this list of conditions and the following disclaimer.
           
2. The origin of this software must not be misrepresented; you must
    not claim that you wrote the original software.  If you use this
    software in a product, an acknowledgment in the product
    documentation would be appreciated but is not required.
          
3. Altered source versions must be plainly marked as such, and must
   not be misrepresented as being the original software.
          
4. The name of the author may not be used to endorse or promote
    products derived from this software without specific prior written
    permission.
            
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
          
Julian Seward, jseward@bzip.org
40 bzip2/libbzip2 version 1.0.6 of 6 September 2010
GZip Implementation
LICENSE
Gzip is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as
         published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version.
File Secure Deletion Implementation
LICENSE
This file is part of Microsoft.WinAny.Helper library
Author: Josip Habjan (habjan@gmail.com, http://www.linkedin.com/in/habjan)
Copyright (c) 2013 Josip Habjan. All rights reserved.
Shell Link Implementation
LICENSE (Authorization to Use)
ShellLink - Using WSH to program shell links
by Jim Hollenhorst, jwtk@ultrapico.com
Copyright Ultrapico, April 2003
http://www.ultrapico.com
Quality Progress Bar Implementation
LICENSE
KeePass Password Safe - The Open-Source Password Manager
Copyright(C) 2003 - 2019 Dominik Reichl<dominik.reichl@t-online.de>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
Secure String Extension
LICENSE
Copyright: Guy Acosta (c) 2019.  All rights reserved.
Licensed under the MIT license
Version 2, December 2004
Copyright (C) 2004 Sam Hocevar <sam@hocevar.net>
Everyone is permitted to copy and distribute verbatim or modified
copies of this license document, and changing it is allowed as long
as the name is changed.
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
 0. You just DO WHAT THE FUCK YOU WANT TO.
Password Generator
LICENSE
Copyright: Paul Seal (c) 2016.  All rights reserved.
Licensed under the MIT license
Inno Setup installation tool
LICENSE
Inno Setup License
==================
Except where otherwise noted, all of the documentation and software included in the Inno Setup
package is copyrighted by Jordan Russell.

Copyright (C) 1997-2022 Jordan Russell. All rights reserved.
Portions Copyright (C) 2000-2022 Martijn Laan. All rights reserved.

This software is provided "as-is," without any express or implied warranty. In no event shall the
author be held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial
applications, and to alter and redistribute it, provided that the following conditions are met:
1. All redistributions of source code files must retain all copyright notices that are currently in
   place, and this list of conditions without modification.
2. All redistributions in binary form must retain all occurrences of the above copyright notice and
   web site addresses that are currently in place (for example, in the About boxes).
3. The origin of this software must not be misrepresented; you must not claim that you wrote the
    original software. If you use this software to distribute a product, an acknowledgment in the
    product documentation would be appreciated but is not required.
4. Modified versions in source or binary form must be plainly marked as such, and must not be
   misrepresented as being the original software.

Jordan Russell
jr-2020 AT jrsoftware.org
https://jrsoftware.org/
Back to content