|
More tags: encrypt, file, assembly, security, sinner, vernam, one-time pad, xor,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
Windows2000, WinXP, Windows2003, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Ultimate, Windows Vista Home Basic x64, Windows Vista Home Premium x64, Windows Vista Business x64, Windows Vista Enterprise x64, Windows Vista Ultimate x64 |
|
|
Price : |
USD 8 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
30 Days |
|
|
Date : |
02/10/2008 |
|
|
Size : |
0.04 MB |
|
|
Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a one-time pad and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. CryptIt can also has some convenience features such as being able to automatically use pad files generated by our program GigAlarm, generate key files (from a stream cipher and thus not best for OTP usage) and also analyse the suitability of your chosen key file. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a word (string), but the advantages of the XOR method are lost then. Descriptions can be stored within the encrypted file, as well as the file name of the code. Command line operation is also supported and CryptIt is written in Assembly Language for maximum efficiency.
IconCreator ProIndomie Dash - كنوز إندوميHonest HoursDino Swap - Jurassic WorldB.accès cloudeMapMeNinja chicken pk WerewolvesForever Lost: Episode 1 SDSiempre CristoCake Doughnut Falling GameHunkey
|
|
Also See
1)
Encryption Xpert
Want to know what the easiest and the safest way to protect your data is? It's encryption. You can encrypt your files manually, as well as one hundred years ago, or using modern software. Encryption X...
License:Shareware USD 24.95
Size:0.92 MB
2)
VB AntiCrack
VB AntiCrack is used to make it more difficult to crack your programs written in Visual Basic 6.0. Most crackers will not be able to crack your program because they will not find a single text strings...
License:Shareware USD 39
Size:1.47 MB
3)
S.O.S.Automation
Baby - Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Cal...
License:Shareware USD 18
Size:3 MB
baby alarm, security, pc alarm, home monitor, ils servers,
4)
CDDVD Lock
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. ...
License:Shareware USD 29
Size:0.92 MB
5)
WinDentify
Windentify is a voice biometric source code for desktop clients. Visit www.windentify.com for live server demo. Includes fully working voice verified windows logon. Now start your machine with your vo...
License:Shareware USD 29
Size:8.77 MB
6)
Outlook Express Protector
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get acce...
License:Shareware USD 29
Size:0.62 MB
7)
IDFile
File verification utility, uses SHA-2 algorithm....
License:Freeware USD 0
Size:0.22 MB
8)
CHAOS Public Key
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send...
License:Shareware USD 59.95
Size:0,4 MB
9)
ANTITHIEFWARE
ANTITHIEFWARE is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ANTITHIEFWARE is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99
Size:0.45 MB
10)
asquared HiJackFree
a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your...
License:Freeware USD 0
Size:1.54 MB
Tags: spyware, browser, tools, adware, toolbar, scripts, virus, trojan, malware, worm, dos, horse, worms, viruses, trojan horse, objects
|
1)
Active File Recovery for Windows
Active File Recovery for Windows is an effective data recovery software tool. This recovers data after formatting or loss of partitions. It will also recover files that have been lost by damage, virus...
License:Shareware USD 29.95
Size:2.25 MB
2)
Snare Agent for Windows
Snare for Windows is a Windows NT, Windows 2000, Windows XP, and Windows 2003 compatible service that interacts with the underlying Windows Eventlog subsystem to facilitate remote, real-time transfer ...
License:Freeware
Size:0.67 MB
3)
RAM Defrag
RAM Defrag with following options: - Defrags your RAM - Deletes TEMP-Directory - Clears clipboard - Autostart-function - Start with timer - little SysMon (RAM-Monitor) - Snooze - Multilanguage Winner ...
License:Shareware USD 19
Size:1.082 MB
ram defrag system tool catbytes software windows xp 000 me,
4)
SpeedUpMyPC
The award-winning and leading software utility that automatically optimizes and maximizes the performance of all computers within minutes. SpeedUpMyPC automatically fine-tunes all your resources inclu...
License:Demo USD 29.95
Size:3.61 MB
5)
Disk Performance Analyzer for Networks
Disk Performance Analyzer for Networks (DPAN) is a free tool allowing you to monitor fragmentation across a network quickly and easily. With DPAN 2.0 you can identify performance bottlenecks, scan sys...
License:Freeware USD 0
Size:34.24 MB
6)
DriveClone
DriveClone makes a 1:1 copy of your hard drive, allowing you to quickly recover or replace your hard drive in case of ANY catastrophic data disaster. Your software, files, and settings will appear EXA...
License:Demo USD 29.99
Size:35.40 MB
7)
Hot Crypt
HotCrypt is one touch text encryption software. Using algorithms Blowfish, DES, Diamond, IDEA, Mars, MISTY1, RC2, RC4, RC5, RC6, RedocIII, Sapphire, Skipjack, Tea. Support compression and Base64 encod...
License:Trial USD 19.95
Size:0.83 MB
8)
Recovery for Backup
Recovery for Backup is a powerful data recovery software for damaged Microsoft Backup files (.BKF). There is hardly any other data loss which is as disastrous as having your backup file damaged. In th...
License:Demo USD 149.00
Size:1.57 MB
9)
Key Transformation
Key Transformation can customize your keyboard layout, change any key on the keyboard to other keys. Its on-screen-keyboard ( soft keyboard ) is very easy to use. Want the F1 key to type B? Want the D...
License:Shareware USD 44.95
Size:0.77 MB
10)
Solway's Plain Backup
A simple, fast, and powerful backup program. Customize the program to your needs. Allows you to backup whole folders/directories, or individual files, or files matching a search pattern. Organizes you...
License:Freeware USD 0
Size:0.25 MB
Tags: files, management, disk, copy
|
|
More tags: encrypt, file, assembly, security, sinner, vernam, one-time pad, xor,
|
|