Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

CryptIt 1.4

Security & Privacy :: Encryption Tools

Screenshot:

(Click to Enlarge)

Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a one-time pad and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. CryptIt can also has some convenience features such as being able to automatically use pad files generated by our program GigAlarm, generate key files (from a stream cipher and thus not best for OTP usage) and also analyse the suitability of your chosen key file. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a word (string), but the advantages of the XOR method are lost then. Descriptions can be stored within the encrypted file, as well as the file name of the code. Command line operation is also supported and CryptIt is written in Assembly Language for maximum efficiency.

Specifications:

Version: 1.4
Author: ACAPsoft

License: Shareware
File Size: 0 MB
Last Virus Scan: 2026-01-04
Downloads: 182
Views: 143
Price: $8.00

Installer: Install and Uninstall
Released: 2-10-2008

Recent Changes:
KeyStore, interface and speed tweaks

Tags:
Encrypt File assembly security Sinner vernam one-time pad XOR


Download

download

Buy Now | Visit Home Page

Runs on:

Windows2000, WinXP, Windows2003, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Ultimate, Windows Vista Home Basic x64, Windows Vista Home Premium x64, Windows Vista Business x64, Windows Vista Enterprise x64, Windows Vista Ultimate x64

Requirements:

 

Similar Products:

ASMWSOFT PC OPTIMIZER 9.1

System Utilities :: System Maintenance
img Asmwsoft PC optimizer Is a collection of over 20 system-maintenance and optimization utility to tune up windows performance. Remove junk files and zero size files to save valuable disk space; Registry Cleaner, to prevent application crashes; backup and restore backup; Startup Manager, to prevent spy applications from running behind your back; erase your navigation tracks to ensure your privacy, available more than 30 ready plug-ins for erasing t
Windows | Shareware
Read More

SURFSOLO 2.0

Security & Privacy :: Other
img Powerful software that allows the user to get totally anonymous and at the same time protects the data exchange on the Internet.The software provides a direct encrypted link with one of the world wide SecurStar high bandwidth security proxy servers. What makes impossible any kind of IP identification. If someone tries to get you real IP number, it will only recognize Securstar server's IP number, never your's real IP number.
Windows | Shareware
Read More

WINZIP 77

System Utilities :: File Compression
img Who knew file compression could be so quick and easy? The world?s most popular zip utility, WinZip®, now includes 4 brand-new WinZip Pro apps that provide streamlined tools including a better PDF reader, image management, secure file backup, and expanded sharing. With a few simple clicks, our latest features allow you to combine and export files faster, add a watermark to your images, and keep a safe copy of your files in the Cloud.
Windows | Shareware
Read More

TRANSMAC 15.4

System Utilities :: File & Disk Management
img TransMac for Windows can open Macintosh HFS and APFS format disk drives, flash drives, HD floppy, CD/DVD/Blu-ray media, DMG, dmgpart, sparsebundle and sparseimage files including encrypted. Features: create, compress, expand, split and merge Mac dmg disk images, built in CD/DVD burner to burn ISO and dmg files, display partition info for disks and images. Burn DMG and ISO files to disks and flash drives.
Windows | Shareware
Read More

 

HOSTED BY N5 Networks