Index >> Security & Privacy >> Encryption Tools >> CryptIt
Report SpywareCryptIt 1.4
Software Description:
CryptIt - Assembly Language XOR File encrypter featuring USB key support
Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a one-time pad and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. CryptIt can also has some convenience features such as being able to automatically use pad files generated by our program GigAlarm, generate key files (from a stream cipher and thus not best for OTP usage) and also analyse the suitability of your chosen key file.
CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a word (string), but the advantages of the XOR method are lost then. Descriptions can be stored within the encrypted file, as well as the file name of the code. Command line operation is also supported and CryptIt is written in Assembly Language for maximum efficiency.
What's New: KeyStore, interface and speed tweaks
Limitations: 30 Days Trial
Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a one-time pad and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. CryptIt can also has some convenience features such as being able to automatically use pad files generated by our program GigAlarm, generate key files (from a stream cipher and thus not best for OTP usage) and also analyse the suitability of your chosen key file.
CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a word (string), but the advantages of the XOR method are lost then. Descriptions can be stored within the encrypted file, as well as the file name of the code. Command line operation is also supported and CryptIt is written in Assembly Language for maximum efficiency.
What's New: KeyStore, interface and speed tweaks
Limitations: 30 Days Trial
100% Clean:
CryptIt 1.4 is 100% clean
This download (cryptit.zip) was tested thoroughly and was found 100% clean. Click "Report Spyware" link on the top if you found this software contains any form of malware, including but not limited to: spyware, viruses, trojans and backdoors.
This download (cryptit.zip) was tested thoroughly and was found 100% clean. Click "Report Spyware" link on the top if you found this software contains any form of malware, including but not limited to: spyware, viruses, trojans and backdoors.
Related Software:
- XorIt 1.1 - Extremely compact and simple Assembly Language XOR encrypter
- Invisible Secrets 4.3 - The complete security suite for all your data/communication needs
- Advanced Encryption Package 2008 Professional 4.8.7 - Military grade files encryption, AES, RSA, USB Flash support. 18 Wipe algs.
- Advanced Encryption Package 2017 6.06 - 128-2048 bit file encryption, secure file deletion, self-decrypting files
- Folder Lock 7.6.9 - Data Security Software, Cloud Backup and Encrypted Security Solution
- LetEncrypt 1.0.0.0 - Encrypt your text files with unlimited high levels of encryption algorithms.
- Accent Internet Password Recovery 1.00 - Instantly recover passwords from your Internet apps. Try iy free!
- Armor System5 2.2.2 - Professional, easy-to-use encryption program for serious users.
- AsMask 2.6 - Send secret data securely over the Internet by encrypt and hide it into images
- CryptoForge 5.1.0 - Data encryption software for email, folder and file encryption.
top 10 most downloaded
recommended software
-
- Folder Lock
- Folder Lock is a data security solution that encrypt & secures your files, while keeping an automatic and real-time backup of encrypted files in the b...
-
- Emsisoft Anti-Malware
- Emsisoft Anti-Malware is a premium anti-malware program to clean and protect your PC from all internet threats: viruses, spyware, trojans, bots, adwar...