Logo
 
   
 
     
 
 

CryptIt

More tags: encrypt, file, assembly, security, sinner, vernam, one-time pad, xor,
 Sponsored links
CryptIt

CryptIt
  Category : Utilities -  Security
 Sponsored links
 
  Platform : Windows2000,  WinXP,  Windows2003,  Windows Vista Starter,  Windows Vista Home Basic,  Windows Vista Home Premium,  Windows Vista Business,  Windows Vista Enterprise,  Windows Vista Ultimate,  Windows Vista Home Basic x64,  Windows Vista Home Premium x64,  Windows Vista Business x64,  Windows Vista Enterprise x64,  Windows Vista Ultimate x64  
  Price : USD 8  
  Developer:  
  Rating :  
  License : Shareware  
  Limitations: 30 Days  
  Date : 02/10/2008  
  Size : 0.04 MB  
Download
Software Description:
Software In :
Utilities
Security
encrypt, file, assembly, security, sinner, vernam, one-time pad, xor,
   Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a one-time pad and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. CryptIt can also has some convenience features such as being able to automatically use pad files generated by our program GigAlarm, generate key files (from a stream cipher and thus not best for OTP usage) and also analyse the suitability of your chosen key file. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a word (string), but the advantages of the XOR method are lost then. Descriptions can be stored within the encrypted file, as well as the file name of the code. Command line operation is also supported and CryptIt is written in Assembly Language for maximum efficiency.


IconCreator Pro
Indomie Dash - كنوز إندومي
Honest Hours
Dino Swap - Jurassic World
B.accès cloud
eMapMe
Ninja chicken pk Werewolves
Forever Lost: Episode 1 SD
Siempre Cristo
Cake Doughnut Falling Game
Hunkey

 Sponsored links

Also See

Encryption Xpert 1)    Encryption Xpert
 Want to know what the easiest and the safest way to protect your data is? It's encryption. You can encrypt your files manually, as well as one hundred years ago, or using modern software. Encryption X...
License:Shareware USD 24.95 Size:0.92 MB

VB AntiCrack 2)    VB AntiCrack
 VB AntiCrack is used to make it more difficult to crack your programs written in Visual Basic 6.0. Most crackers will not be able to crack your program because they will not find a single text strings...
License:Shareware USD 39 Size:1.47 MB

S.O.S.Automation 3)    S.O.S.Automation
 Baby - Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Cal...
License:Shareware USD 18 Size:3 MB baby alarm, security, pc alarm, home monitor, ils servers,

CDDVD Lock 4)    CDDVD Lock
 CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. ...
License:Shareware USD 29 Size:0.92 MB

WinDentify 5)    WinDentify
 Windentify is a voice biometric source code for desktop clients. Visit www.windentify.com for live server demo. Includes fully working voice verified windows logon. Now start your machine with your vo...
License:Shareware USD 29 Size:8.77 MB

Outlook Express Protector 6)    Outlook Express Protector
 Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get acce...
License:Shareware USD 29 Size:0.62 MB

IDFile 7)    IDFile
 File verification utility, uses SHA-2 algorithm....
License:Freeware USD 0 Size:0.22 MB

CHAOS Public Key 8)    CHAOS Public Key
 CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send...
License:Shareware USD 59.95 Size:0,4 MB

ANTITHIEFWARE 9)    ANTITHIEFWARE
 ANTITHIEFWARE is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ANTITHIEFWARE is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99 Size:0.45 MB

asquared HiJackFree 10)    asquared HiJackFree
 a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your...
License:Freeware USD 0 Size:1.54 MB
Tags: spyware, browser, tools, adware, toolbar, scripts, virus, trojan, malware, worm, dos, horse, worms, viruses, trojan horse, objects

Active File Recovery for Windows 1)    Active File Recovery for Windows
 Active File Recovery for Windows is an effective data recovery software tool. This recovers data after formatting or loss of partitions. It will also recover files that have been lost by damage, virus...
License:Shareware USD 29.95 Size:2.25 MB

Snare Agent for Windows 2)    Snare Agent for Windows
 Snare for Windows is a Windows NT, Windows 2000, Windows XP, and Windows 2003 compatible service that interacts with the underlying Windows Eventlog subsystem to facilitate remote, real-time transfer ...
License:Freeware  Size:0.67 MB

RAM Defrag 3)    RAM Defrag
 RAM Defrag with following options: - Defrags your RAM - Deletes TEMP-Directory - Clears clipboard - Autostart-function - Start with timer - little SysMon (RAM-Monitor) - Snooze - Multilanguage Winner ...
License:Shareware USD 19 Size:1.082 MB ram defrag system tool catbytes software windows xp 000 me,

SpeedUpMyPC 4)    SpeedUpMyPC
 The award-winning and leading software utility that automatically optimizes and maximizes the performance of all computers within minutes. SpeedUpMyPC automatically fine-tunes all your resources inclu...
License:Demo USD 29.95 Size:3.61 MB

Disk Performance Analyzer for Networks 5)    Disk Performance Analyzer for Networks
 Disk Performance Analyzer for Networks (DPAN) is a free tool allowing you to monitor fragmentation across a network quickly and easily. With DPAN 2.0 you can identify performance bottlenecks, scan sys...
License:Freeware USD 0 Size:34.24 MB

DriveClone 6)    DriveClone
 DriveClone makes a 1:1 copy of your hard drive, allowing you to quickly recover or replace your hard drive in case of ANY catastrophic data disaster. Your software, files, and settings will appear EXA...
License:Demo USD 29.99 Size:35.40 MB

Hot Crypt 7)    Hot Crypt
 HotCrypt is one touch text encryption software. Using algorithms Blowfish, DES, Diamond, IDEA, Mars, MISTY1, RC2, RC4, RC5, RC6, RedocIII, Sapphire, Skipjack, Tea. Support compression and Base64 encod...
License:Trial USD 19.95 Size:0.83 MB

Recovery for Backup 8)    Recovery for Backup
 Recovery for Backup is a powerful data recovery software for damaged Microsoft Backup files (.BKF). There is hardly any other data loss which is as disastrous as having your backup file damaged. In th...
License:Demo USD 149.00 Size:1.57 MB

Key Transformation 9)    Key Transformation
 Key Transformation can customize your keyboard layout, change any key on the keyboard to other keys. Its on-screen-keyboard ( soft keyboard ) is very easy to use. Want the F1 key to type B? Want the D...
License:Shareware USD 44.95 Size:0.77 MB

Solway's Plain Backup 10)    Solway's Plain Backup
 A simple, fast, and powerful backup program. Customize the program to your needs. Allows you to backup whole folders/directories, or individual files, or files matching a search pattern. Organizes you...
License:Freeware USD 0 Size:0.25 MB
Tags: files, management, disk, copy

More tags: encrypt, file, assembly, security, sinner, vernam, one-time pad, xor,
 
 
Copyright © 2013 Appcolt.com    iOS - iOS
Privacy Policy and Terms of Use   All rights reserved.