Content: fcrypt_1.zip (284.53 KB)
Uploaded: 18.08.2003

Positive responses: 0
Negative responses: 0

Sold: 0
Refunds: 0

$10
Encrypt a file - hence making it available only to authorized users, so you must use some method of identification. A person can be identified by fingerprints, iris, having his key (common key, a magnetic card, an electronic key. Key file), encryption program, which is also a key. However, it is assumed that the attacker has the encryption program, and identification methods other than the key file unacceptable.

If the key generator creates a certain key (e.g., a random number generator), it can be selected enumeration initial values \u200b\u200bused generator. If the key is smaller than the image, it can be picked up by a bust that usually requires no small time and resources. At last the vast majority principle based encryption software that determines their vulnerability. Also, if the key is limited in size, it is necessary to remember or write down, respectively, has the potential to detect key or forget the key. Moreover, the program code encryption is closed, respectively, can not say exactly what this program does exactly what it says in the instructions.

This program uses the files on your computer, larger than a file as encrypted keys, respectively, the key can not be picked up.

Most encryption software, encryption process is associated with algorithms for solving problems of "full backpack" Such a complex encryption method is used to complicate the selection key. However, in this program it uses modulo two, because the selection key is impossible, and the use of complex algorithms do not affect the fundamental nevskryvaemost cipher. Furthermore, the use of modulo-two greatly speeds the process of encryption.

So, in principle nevskryvaemost cipher, easy to understand completely open source, the speed of encryption, simple and nice interface, program size, the ability to encrypt files of unlimited size - this is not a complete list of its advantages.

To transfer data over a network is possible to use a mechanism similar to the principle of PGP, sometimes called a suitcase with two loops (two keys), or "goat wolf cabbage", and the key is not transmitted over the network, and during transmission over the network is always encrypted file . This protection can also be used to transfer applications over a network.
The program is provided with detailed and easy to understand helpom, and updated regularly.

At the same time it is extremely simple to use.

You get all future updates up to and including version 3.0 for free.

No feedback yet