CryptoNG is stable, reliable, and easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files by encrypting them with AES-GCM 256-bit authenticated encryption algorithm which simultaneously provides both data authenticity (integrity) and confidentiality. AES-GCM is the best performing authenticated encryption combination. GCM can detect both accidental modifications of the data and intentional, unauthorized modifications. This makes the encryption very secure.
What is authenticated encryption? Authenticated encryption, is the process of both encrypting and authenticating data. The process will associate an authenticator, also known as a tag, with the data. Plain text is transformed into cipher text with an authenticator. When it comes time to decrypt the data, the cipher text is validated using the tag.
Main features: • Encrypting and decrypting files of any type on any media using the AES-256 bit key length algorithm in Galois/counter chaining mode (GCM). • Hashing files (SHA-256 algorithm). SHA-256 is one of the strongest hash functions available. • Permanently wiping files. Three pass overwriting algorithm: first pass - with zeroes, second pass - with ones and the last pass with random bytes. • Large files (4GB and more) support. • Works with multiple files. • No unencrypted temporary files ever created. • No encryption passwords are saved within the encrypted files. • The software does not include any backdoor. No one will be able to get access to the encrypted data. Hence, do not forget your password. • Microsoft Windows 7 and 8 compatible. • Available in 32-bit and 64-bit versions. • Friendly interface, easy to operate. • All user settings are automatically saved. • Does not allow multiple instances. • Guaranteed high speed. • The program does not contain any form of malware (such as spyware, adware, viruses, trojans and backdoors).
Other Windows Software of Developer «Vassil Arabadjiev»:
RawPrint RawPrint is a tool for sending text files (*.txt, *.prn) directly to a Windows printer, bypassing the printer driver. In this case printer drivers formatting routines are ignored. The main purpose of RawPint is to be used as a printing tool for text editor
CryptoNG (64-bit) CryptoNG is stable, reliable, and easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files by encrypting them with AES-GCM 256-bit authenticated encryption algorithm which simu
RawPrint (64-bit) RawPrint is a tool for sending text files (*.TXT and *.PRN) directly to a Windows printer, bypassing the printer driver. In this case printer drivers formatting routines are ignored. The main purpose of RawPint is to be used as a printing tool for text edi
Best Disk Lock DoGoodSoft Best Disk Lock is a powerful disks lock and USB storage devices control package. It can protect your data on disks and USB storage devices from leakage.
To meet different users' need, this software provides three different lock levels - elem
A+ File Protection A+ File Protection encrypts and hides a file within a BMP image file. A+ File Protection is an easy to use tool that hides a specified file into a password protected BMP file. The carrier file preserves its initial format, allowing access and view mode as
Yazsys New - encryption algorithm YAz to encrypt messages (e-mail), and documents more strongly than 9000 bits, you can encrypt all the world's languages in a single message because they rely on encryption Binary Code and ASCII Code and HEX Code in the encryption
Activity Keylogger Activity Keylogger records all typed keystrokes, chat conversations, screens viewed, and Web sites visited. It also keeps track of the system Clipboard. During monitoring sessions, Activity Keylogger can be customized to be completely invisible and cannot
SafeSex SafeSex allows you to have some notes that are easily accessible, but relatively secure. It sits on your screen, waiting for a click, and on a click it will activate and give you access to your notes. That is, of course, if you enter the passphrase that yo
Akkai MD5 One of the purposes of MD5 signature is to verify the file integrity. The procedure is simple: the publisher provides the MD5 signature of the file and the user confirms it by calculating the signature again and comparing it to the one provided by the publ
Credit Card Knight Prevent your credit card data from being stolen. When you shop on-line, Internet Explorer may save your credit data into a special place with the other autocomplete fields. It is possible for violator to read autocomplete fields and access the credit card
Password 2000 Password 2000 is a convenient way to store all your passwords. It can even keep your URLs, e-mail addresses, and personal notes. It uses encryption and password protection to safely keep information. Password 2000 also includes password generation, a passw
PDF Password Protect Free This small free utility allows you to set protection to PDF documents. Especially it is useful in cases where there are no computer tools to work with pdf files. The program allows you to set passwords on the pdf document of two types: a user password and
TotalRecall A lot of different information about a user's activity is kept within the personal computer. Usually the user does not know about its existence. TotalRecall is a forensic analysis tools to reconstruct Internet Explorer and user's activity. TotalRecall inve
Supported Operating Systems:
Windows 7 |
Comments on CryptoNG (32-bit):
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10