FooCrypt, A Tale Of Cynical Cyclical Encryption
Creating A FooKey

Creating a FooKey is fun, exciting, and has endless possibilities for you to think about

The Key to a FooKey, is best described in the following steps

​1. Decide on the source of the characters for your FooKey

  • Random data via the menu option ‘Create :: Random Data Memory’ which will read the selected random data source as defined in the Preferences, for the selected number of characters defined in preferences. 24250 is the DEFAULT number of characters which will in turn, allow you to create a FooKey, which contains 50 cycles of encryption, with a ARG_MAX length of 512 characters.

  1. /dev/random
  2. /dev/urandom
  3. /FooCrypt/Internal
  4. /FooCrypt/Piper

 

  • Import Window Memory Binary, will allow you to source sequential characters into the Window Memory for use in creating a FooKey. The options for selecting a binary source for input are endless and can something as simple as a Photo or Music or Document

 

  • Import Window Memory ASCII, will allow you to read into FooCrypt, a pre existing string of ASCII characters which can be utilised as a FooKey. Sources of ASCII for import are also endless, and can be something as simple as the UNIX man command piped to a text file, which is then imported into FooCrypt. ​​For Example [ man openssl > openssl.txt ]

2. Once you have primed either the Random Data Memory or Window Memory with the source for your FooKey, creating a FooKey is as simple as hitting the ‘CFK’ button, or hitting the ‘CFK [ 1 – 5 ]s’

FooCrypt will automatically create the FooKey based on the configuration options defend in Preferences.

  • FooKey_LCS
  • FooKey_ARG_MAX

Picture

3. And FooCrypt will automatically load the FooKey into the current Active Buffer FooKey Memory or the ‘CFK [ 1 – 5]’ FooKey Memory Active Buffer

 

Example FooKey Containing 24250 characters

Picture

 

4. You can save the FooKey into a file which will be protected automatically in a single layer of encryption, utilising the ‘MASTER_PASWORD’ as the password source

  • It is recommended that you store your FooKey’s on an encrypted media device.