Vshg - Hardware Resistance & Enhanced Safety For Gnupg


VSHG aims to furnish a retentivity / hardware resistant reinforcement to GnuPG's standared s2k key-derivation-function + a simplified interface for symmetric encryption .

About VSHG
VSHG ( Very secure hash generator ) is a standalone Addon for GnuPG ( Gnu privacy guard ) . It is written equally a musical rhythm out script together with is designed around the Unix/Linux filesystem together with commands. VSHG uses the sha384 together with the Argon2 hash component for the password together with AES-256-CFB + CAST5-128-CFB inwards cascade for the concluding encryption.
And equally good a measure sha384 iteration count of 800 iterations + 15 & 500 iterations for Argon2i + d
It uses True random 12 byte salts . So fifty-fifty if your passphrase is rattling weak , it volition reinforce it so that yous don't accept to worry virtually that anymore.
VSHG uses the finally hash of the Iteration equally session fundamental for Gnupg. It equally good provides an Autodetection component for each file so that yous don't accept to call back either the tabular array salt or the iteration count.
Optionally yous tin utilisation a key-file equally authentication method.

Why is VSHG so secure ?
VSHG uses a truthful random tabular array salt for each encrypted file, so your Passphrase volition e'er accept a minimum of 12 bytes inwards strength. You could fifty-fifty utilisation the same password twice for dissimilar files. The affair that makes VSHG so secure are the iterations. 800 iterations hateful the output of the string is hashed 800x alongside its output. The to a greater extent than iterations the to a greater extent than safety in that place volition be. Even if yous accept the right passphrase, but non the right total of iterations it volition non survive able to decrypt.
VSHG uses some of the most advanced forms of retentivity difficult Key derivation functions which are Argon2i together with Argon2d. The already iterated fundamental volition survive passed through Argon2 a full of 515 times together with thence ensure the resistance against the biggest threats of Key derivation functions Namely: Graphical Processing Units, Field programmable gate arrays together with Application specific integrated circuits ( GPU , FPEGA , ASIC ) .
The actual encryption is performed alongside the highest degree of safety possible inwards Gnupg.
-The string to fundamental ( s2k ) hash algo ( which is the KDF of Gnupg ) was reinforced from sha1 to sha512.
-The s2k mode was laid to 3 which agency that an 8-bit tabular array salt is applied together with so iterated.
-The s2k count was laid to 65011712 which is the highest possible issue of iterations.
-The s2k algo was laid to AES256 together with CAST5 inwards cascade.
The AES 256 encrypted file is securely deleted so that only the AES256(Cast5()) encrypted file is position out.

Why should I utilisation VSHG ?
  • It is easier to utilisation than GnuPG core.
  • Can encrypt folders past times turning them into Zip files.
  • Someone that doesn´t accept VSHG does non actually accept a guide a opportunity of smashing the password.
  • True random 12 byte salt
  • choosable Iteration count.
  • choosable Salt.
  • choosable Keyfile.
  • True random Keyfile.
  • Very skilful resistance to side channel attacks ( e.g: timing attacks ).
  • Very resistant towards GPU based attacks
  • Can guarantee safety fifty-fifty alongside relatively weak passwords ( > v characters ) ( if yous accept plenty Iterations )
  • Autodetection of Salt + Iteration count for each file.
  • Military measure AES-256 encryption + the gpg measure CAST5 encryption.
  • Uses the gpg s2k manner three + sha512 alongside the maximum count of 65011712.
  • Erases Original file securely.

Download & Installation
  • Download equally tarball
sudo wget https://github.com/RichardRMatthews/VSHG/archive/1.4.tar.gz
Or clone the repository
git clone https://github.com/RichardRMatthews/VSHG.git
  • Compile it yourself
sudo git clone https://github.com/neurobin/shc.git
cd shc
sudo ./shc -f -r /etc/VSHG/executable/src/VSHG_1.4.sh
sudo gcc /etc/VSHG/executable/src/VSHG_1.4.sh.x.c -O /usr/bin/VSHG
sudo VSHG
  • Run
sudo tar -xf VSHG-1.4.tar.gz
sudo chmod +x VSHG_1.4.sh
sudo ./VSHG_1.4.sh