You are on page 1of 1

REPRINTED FROM SC MAGAZINE SEPTEMBER 2001

nated for automatic (‘on-the-fly’) treatment. In


VME 2000 such folders all files will be kept encrypted. When
any of these files is used (for example loaded into
Word, or printed) it is decrypted for that purpose.
Files copied into such folders are automatically
encrypted in the process, and files within the fold-
ers are automatically decrypted as they are cop-
ied to elsewhere.
CipherFile is a component of VME2000 that
encrypts (via VME or other user selected engines)
selected files or whole folders (directories). A pass-
word is required that must be identical for en-
cryption and decryption. Passwords are stored
by Wilf Hey
(themselves encrypted) and maintained in a
‘keybook,’ and a Manager routine is supplied to
Supplier: Meganet Corporation add, delete or change entries in the keybook.
Price: from US$100 CipherFile also allows users to create self-decrypt-
VME2000 is a suite designed to secure data (pri- Contact: (800) 634-2638, (818) 990-9292 ing files that may be sent to others who do not
marily at desktop level), featuring a technology sales@meganet.com have VME2000.
that Meganet calls virtual matrix encryption www.meganet.com CipherText is a wonderfully simple routine
(VME). Meganet has in the past few years set chal- that enables the secure encryption of parts of a
lenges to all who would seek to break VME and FOR Seamless incorporation of encryption ser vices into document. The user can move the mouse to
interpret a hidden message. To date VME has re- Windows makes this product’s operation ver y easy in the specify the limits of encryption, and then a
mained secure in the face of the hackers. few places where it is not automatic. simple ‘CTRL-CC’ will take the selected text and
The product sits typically on a desktop PC as AGAINST It is impossible to retrieve a forgotten key, encrypt it with a prearranged key. Note that if
even under dire emergencies. Laws may conceivably this document is exported to another person
modules running on a Windows platform – Win-
be framed in some countries that prevent such a
dows 95 (second), Windows 98, NT, ME and 2000 or machine, or sent as email, the recipient will
product being used.
are all capable of supporting VME2000. Through need to know the password originally used to
VERDICT An excellent incorporation of top-notch security
encryption services this suite protects data at an encrypt those portions of the data. A small ex-
through encryption into the desktop.
individual station from unintentional disclosure ecutable file is supplied that may be distributed
to others through theft or hacking. It is aimed to Features ★★★★★ freely to any recipients of email in which
provide local physical security just as encryption Ease of Use ★★★★✩ VME2000 encryption is deployed. This will per-
on the ‘Net provides security during transmission. Performance ★★★★★ mit the recipient of a partially-encrypted docu-
It is entirely apart from any other security mea- Documentation ★★★★★ ment to deal with the email, but only when the
sures such as firewalls, and can be made to all in- Support ★★★★✩ same password is used. It should be noted that
tents seamless with normal local operation. Value for Money ★★★★★ CipherText is aware of . RTF (rich text format),
VME centers on a symmetric encryption al- Overall Rating ★★★★★ and will encrypt only the actual text within
gorithm with ten keys. Its central key is a full mil- the .RTF document, leaving the control se-
lion bits long, and expert testimonials proclaim use can be restricted to authorized users who sup- quences unaltered. The net effect is that be-
that to break the code would be daunting indeed. ply their token. Alternatively a user ID and pass- fore decryption, displaying the .RTF will dem-
In fact the innovative method employed encrypts word may be submitted when access is challenged. onstrate its format (including color and font)
not the data being subjected to the algorithm but IDs and relevant passwords (securely encrypted) correctly. (There is a problem with tables in
pointers to portions of the data. Even if all the are stored in a database, for which an editor is encrypted . RTF files: it is advisable to encrypt
keys are compromised, the data is still unavail- supplied. Thus the administrator can quickly the whole of a table rather than one or more
able in clear text. The principal key (the one as modify access rights related to each user. entries within the table.)
long as one million bits) is not held alongside the Alongside this main function, temporary files VME2000 is direct to install, makes eco-
encrypted document, but re-created when de- and other components are ‘shredded’ to safeguard nomic use of disk space, and will be up and
cryption is desired. the system against aggressive hacking or sniffing. running on a station readily. It makes intelli-
A virtual matrix, infinite in extent, is the re- For controlled corporate environments’ token- gent use of Windows features, and optional
source by which encryption is performed. All pos- related passwords (though not for VME itself) encryption components may be activated sim-
sible characters are in the matrix, each in an infi- there is a token/key recovery mechanism. With ply by clicking on a distinctive symbol in the
nite number of positions. A character is encrypted CipherLock in force, users need not fear that their Windows tray. On-demand encryption or file-
first by finding any one of its infinite instances computer may be used to compromise data secu- shredding may also be activated by clicking on
within the matrix, and substituting this ‘pointer’ rity; when they leave the machine, any subsequent the file or folder.
for the character within encrypted text. Even with user is challenged anew. Folders may be nomi- The encryption algorithm is, by all accounts,
the same matrix and all the same keys, identical unparal leled in power. The integrat ion of
characters may be substituted with different point- Contact information: VME2000 into the Windows environment is
ers. VME2000 employs other standard engines thorough and well planned. T he
such as 40-bit, DES and triple-DES. documentation supplied (a little wire-bound
VME2000 consists of several independent manual) is peerless. The installation process is
modules. CipherLock (now available on Windows easy, quick and painless. However, it must be
NT or 2000) offers strong access control and trans- noted that this sort of e ncr yption s uite,
parent immediate encryption. Users of a system Meganet Corporation consisting of many parts and affecting many
16133 Ventura Blvd., Suite 640 quite distinct operations, requires the intelligent
may be equipped with tokens (typically USB to-
Encino, CA 91436
kens, or smartcards) that combine user identifi- attention of users. A training regime for all users
(818)-990-9292
cation with a secure password (encrypted within is a must – but the rewards in terms of added
Fax: (818)-990-2906
the system). Programs, database access or resource security are great.
© Copyright West Coast Publishing 2001

You might also like