3.01
PADGen 3.0.1.38 http://www.padgen.org
Portable Application Description, or PAD for short, is a data set that is used by shareware authors to disseminate information to anyone interested in their software products. To find out more go to http://www.asp-shareware.org/pad
ACAPsoft
PO Box 1669 GPO Hobart
Hobart
Tas
7001
Australia
http://www.ACAPsoft.com
Andrew
Glina
Support@ACAPsoft.com
Andrew
Glina
Support@ACAPsoft.com
Support@ACAPsoft.com
Support@ACAPsoft.com
Support@ACAPsoft.com
040 998 3019
040 998 3019
040 998 3019
CryptIt
1.4
02
10
2008
8
AUD
10
Shareware
Minor Update
Install and Uninstall
Windows2000,WinXP,Windows2003,Windows Vista Starter,Windows Vista Home Basic,Windows Vista Home Premium,Windows Vista Business,Windows Vista Enterprise,Windows Vista Ultimate,Windows Vista Home Basic x64,Windows Vista Home Premium x64,Windows Vista Business x64,Windows Vista Enterprise x64,Windows Vista Ultimate x64
English
KeyStore, interface and speed tweaks
Utilities
Security & Privacy::Encryption Tools
43670
42
0.04
Y
30
Days
Encrypt, File, assembly, security, Sinner, vernam, one-time pad, XOR
Assembly Language XOR File encrypter
Assembly Language XOR File encrypter featuring USB key support
CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book.
Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption of the file. But this method may not work forever. CryptIt is designed to use XOR encryption on keys that are the same size as the file to be encrypted. CryptIt also has a ability to use removable media as a key code book and integrates with the key generator built into our program GigAlarm.
Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a one-time pad and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt it could result in any file, and there would be no way to verify that it has decrypted correctly. CryptIt can also has some convenience features such as being able to automatically use pad files generated by our program GigAlarm, generate key files (from a stream cipher and thus not best for OTP usage) and also analyse the suitability of your chosen key file.
CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book, further increasing the security and convenience of the method. If your needs are more simpler then you can also use a word (string), but the advantages of the XOR method are lost then. Descriptions can be stored within the encrypted file, as well as the file name of the code. Command line operation is also supported and CryptIt is written in Assembly Language for maximum efficiency.
http://www.acapsoft.com/det.php?prog=CryptIt
http://www.acapsoft.com/buy.php?prog=CryptIt
http://www.acapsoft.com/img/ss/cryptits.gif
http://www.acapsoft.com/img/ico/cryptitl.gif
http://www.acapsoft.com/pads/cryptit.xml
http://www.acapsoft.com/prog/cryptit.zip
Permission is given for all forms of distribution, including CD compilations and Websites, providing the ZIP file is unaltered and it is made clear that CryptIt is a Shareware program and that registration is required for continued usage. Full terms are on the payment page on our website.
Permission is given to evaluate CryptIt for a period of 30 days. After this time you are required to either register or remove CryptIt. CryptIt is a copyrighted work and thus permission is not given for you to decompile, disassemble, modify, translate, enhance or create derivative works from this program. If you feel that you need to do any of those actions, and that those rules do not apply to you, contact us first.
ACAPsoft accepts no liability for this software to the maximum extent allowable by law. Installing this software is the decision of the installer, and signifies that you agree with this liability statement. Thus, any unintentional damage/loss caused by the use of this software is not in any way ACAPsoft's responsibility, even if it is ACAPsoft's fault. This includes, but is not limited to, physical damage, or loss of income/time. If at any time you do not find these conditions agreeable you are required to remove this software.