VSHG aims to provide a memory / hardware resistant reinforcement to GnuPG’s standared s2k key-derivation-function + a simplified interface for symmetric encryption . It ( Very secure hash generator ) is a standalone Addon for GnuPG ( Gnu privacy guard ) .
It is written as a shell script and is designed around the Unix/Linux filesystem and commands. VSHG uses the sha384 and the Argon2 hash function for the password and AES-256-CFB + CAST5-128-CFB in cascade for the final encryption.
And also a standard sha384 iteration count of 800 iterations + 15 & 500 iterations for Argon2i + d
It uses True random 12 byte salts . So even if your passphrase is very weak , it will reinforce it so that you don’t have to worry about that anymore.
VSHG uses the last hash of the Iteration as session key for Gnupg. It also provides an Autodetection function for each file so that you don’t have to remember either the salt or the iteration count.
Optionally you can use a key-file as authentication method.
Also Read – nodeCrypto : Ransomware written in NodeJs
Why is VSHG so secure ?
VSHG uses a true random salt for each encrypted file, so your Passphrase will always have a minimum of 12 bytes in strength. You could even use the same password twice for different files.
The thing that makes VSHG so secure are the iterations. 800 iterations mean the output of the string is hashed 800x with its output. The more iterations the more security there will be. Even if you have the correct passphrase, but not the correct amount of iterations it will not be able to decrypt.
VSHG uses some of the most advanced forms of memory hard Key derivation functions which are Argon2i and Argon2d. The already iterated key will be passed through Argon2 a total of 515 times and therefore ensure the resistance against the biggest threats of Key derivation functions Namely: Graphical Processing Units, Field programmable gate arrays and Application specific integrated circuits ( GPU , FPEGA , ASIC ) .
The actual encryption is performed with the highest level of security possible in Gnupg.
Why should I use VSHG ?
Download & Installation
Download as tarball
sudo wget https://github.com/RichardRMatthews/VSHG/archive/1.4.tar.gz
Or clone the repository
git clone https://github.com/RichardRMatthews/VSHG.git
Compile it yourself
sudo git clone https://github.com/neurobin/shc.git
cd shc
sudo ./shc -f -r /etc/VSHG/executable/src/VSHG_1.4.sh
sudo gcc /etc/VSHG/executable/src/VSHG_1.4.sh.x.c -O /usr/bin/VSHG
sudo VSHG
Run
sudo tar -xf VSHG-1.4.tar.gz
sudo chmod +x VSHG_1.4.sh
sudo ./VSHG_1.4.sh
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…