Skip to content

Continent - secure VPN proxy (client and server) and file container with military-grade encryption.

License

Notifications You must be signed in to change notification settings

jmiller-soft/continent

Repository files navigation

Continent - secure VPN proxy (client and server) and file container with military-grade encryption

Use cases

  • Encryption of TCP protocol (SSH, SMTP, IMAP ...) through port tunneling

  • Encryption of Web browsing and WebRTC session through local Socks5 proxy

  • Files encryption with one-time pad

  • Files encryption with password

  • Files encryption with NTRU public and private keys

Usage examples

How to use Continent VPN as proxy chain

How to use Continent VPN with browser

How to use Continent VPN with Email client

How to use Continent file container with password

How to use Continent file container with public and private keys

How to use Continent file container with one-time pad

VPN features

  • VPN client exposes local Socks5 proxy

  • VPN client supports port tunneling

  • Deep Packet Inspection (DPI) resistant protocol: handshake and traffic is computationally indistinguishable from random data

  • Polymorphic protocol: random packet length, inter-arrival time and packets generation (noise)

  • Protocol masking: encrypted traffic can be wrapped up into HTTPS protocol to bypass some firewalls

  • Forward secrecy property

  • Low memory consumption: client - 32Mb, server - 256Mb

  • Cascade encryption scheme of 3 randomly selected ciphers.

  • Overall key size range is from 768 to 3328 bits.

  • Key exchange encryption cipher: 256-bit NTRU based on Skein-512

Container features

  • One-time pad derived from Skein PRNG continuously seeded with Hardware RNG values
  • Password derived from Skein PRNG or Lyra2

Crypto engine features

  • High-quality entropy gathered from Hardware RNG based on CPU timing jitter

  • Independent Skein PRNG based random generators for Nonce and Key

  • Random generators are seeded every second

  • Encryption ciphers used in cascade encryption scheme:

Cipher Block size (bits) Key size (bits) Encryption
mode
Increased
rounds
RC6 256 256, 512, 1024, 2048 CFB 30, 38, 42, 46
CAST6 128 256 CFB -
Twofish 128 256 CFB 24
Threefish 256, 512, 1024 256, 512, 1024 CFB -
Serpent 128 256 CFB -
SkeinStream - 256, 512, 1024 Stream -
HC256 - 256 Stream -

Download

continent.jar