CryptIt.org sells file encryption software for Windows

Title

CryptIT™ by CrypSoft LLC.

Description

Excerpted from the website:

File encryption to secure your privacy. Choose from five of the most secure encryption algorithms available: Rijndael, TripleDES, Twofish, Serpent, and Camellia. Double and triple cascading encryption routines are also available utilizing the Twofish, Serpent, and Camellia.
read more

Languages

English

Address

2482 Clover Field Cir
Herndon VA 20171 US

Additional Information

Product Features:

Two Modes of Operation

- Encryption - Decryption (features a proprietary file browser)

Features of Encryption Mode:

Choose from five of the most secure encryption algorithms currently available

- Rijndael (Advanced Encryption Standard)
- TripleDES (Triple Data Encryption Standard)
- Twofish (Blowfish Successor)
- Serpent (Advanced Encryption Standard Competition Runner-Up)
- Camellia (NESSIE Recommended cipher along with Rijndael)

For even more assurance of security and privacy, there are several combination encryption routines available that are inlined with each other to improve performance overall:

- Twofish >> Serpent
- Serpent >> Twofish
- Camellia >> Serpent
- Serpent >> Twofish >> Camellia
- Twofish >> Serpent >> Camellia
- Camellia >> Twofish >> Serpent

Encryption Key Derivation Features

- Hash (scramble) the passphrase using the industry standard hash functions

- MD5 (128 bit hash)
- SHA1 (160 bit hash)
- SHA256 (256 bit hash)
- SHA384 (384 bit hash)
- SHA512 (512 bit hash)

- Apply password salt before hashing (to lessen the chances that two passphrases will result in the same hash)

- Apply 1 - 9,999 hash iterations during key derivation to strengthen the resulting encryption key

Other Encryption Features

Option to apply randomly generated salt bytes to file data before encrypting (so that two of the same files would be much less likely to result in the same encrypted data)

Encrypt one file or multiple files.

Choose from the industry standard hash functions to make a fingerprint of the original file before encryption (so that data integrity is assured when the file is decrypted)

Choose to keep original filename or employ randomization of encrypted filenames

- 40 Characters (RNG -> MD5)
- 48 Characters (RNG -> SHA1)
- 56 Characters (RNG -> SHA256 - 8 Characters)
- 64 Characters (RNG -> SHA256)

Choose between three post encryption actions:

- Leave the original file in its place
- Only delete the original file (this does not place the deleted file in the recycle bin)
- Choose from four options to securely erase the original file using a cryptographically strong sequence of random bytes:

3 passes
7 passes
17 passes
35 passes

Features of Decryption Mode:

As long as you are sure to remember your password (and password salt if used) you can decrypt your data easily. You do not have to remember any of the other settings.

As long as the password and password salt are entered properly, the proprietary encrypted file browser enables the user to select which files to decrypt by displaying the original filename, not the randomized one.

- Proprietary File Browser for CryptIT™ Files (.crypt):

- Features rich graphics and an overall design modeled after the standard and well-known windows file browser.

- Allows the user to traverse a file system in search of encrypted files

- Prompts for password and password salt when it discovers an encrypted file (only if it doesn't already know the password and password salt)

- If no password is entered, no file information is revealed


CryptIT™ v1.0.127 - Detailed Overview:

CryptIT™ is an encryption and decryption application that enables users to secure confidential data using some of the latest cryptographic techniques. All available encryption algorithms in version 1.0.125 can perform 128 bit, 192 bit, or 256 bit encryption and operate in what is known as Cipher Block Chaining (CBC) mode.

In addition to the secure encryption algorithms, CryptIT™ has a variety of options for strengthening the level of encryption further. For example, after the encryption key has been salted and hashed for the number of iterations specified by the user, the final key and initialization vector (IV) are derived. The user enters the Password Salt value (which is like a second password), then selects the method of hashing (SHA512 is the most secure) and then specifies how many hashing iterations (up to 9,999) to apply when deriving the final key and IV.

On top of that, the user may specify how many randomly generated bytes of salt (between 0-255 bytes) to add to the beginning of the plain text file before encrypting it. This is just one more technique implemented in CryptIT™ to assure that sensitive data remains secure.

CryptIT™ also provides users with the option of randomizing the resulting name of the encrypted file. Choose from 40, 48, 56, or 64 characters of randomization for encrypted filenames. The encrypted filenames are completely random and cannot be used to reverse engineer to determine the original filename.

To provide the user with the option to ensure privacy and confidentiality, CryptIT™ has a few post encryption actions that can be configured. It can either leave the file alone, delete it, or securely erase it after it has been encrypted. The default is to erase the original file using an algorithm that overwrites the file with a cryptographically strong random sequence of bytes in "7 passes."

CryptIT™ provides the user with 3 different options for how to report on its progress during an encryption or decryption process (aggregate, individual or split statistics). The user has the option of viewing 0, 7, 10, 13, 16, or 20 lines of progress at any one time. Shortcuts are also available via the F6, F7, F8, F9, F10, and F11 keys so that the user is always able to either show or hide the progress report. Try 'Alt-S' to toggle between the default and smooth mode of window expansion.

Related Domains

External Links



Retrieved from "http://aboutus.com/index.php?title=CryptIt.org&oldid=38649772"