CryptoNG is stable, reliable, and easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files by encrypting them with AES-GCM 256-bit authenticated encryption algorithm which simultaneously provides both data authenticity (integrity) and confidentiality. AES-GCM is the best performing authenticated encryption combination. GCM can detect both accidental modifications of the data and intentional, unauthorized modifications. This makes the encryption very secure.
What is authenticated encryption? Authenticated encryption, is the process of both encrypting and authenticating data. The process will associate an authenticator, also known as a tag, with the data. Plain text is transformed into cipher text with an authenticator. When it comes time to decrypt the data, the cipher text is validated using the tag.
Main features: • Encrypting and decrypting files of any type on any media using the AES-256 bit key length algorithm in Galois/counter chaining mode (GCM). • Hashing files (SHA-256 algorithm). SHA-256 is one of the strongest hash functions available. • Permanently wiping files. Three pass overwriting algorithm: first pass - with zeroes, second pass - with ones and the last pass with random bytes. • Large files (4GB and more) support. • Works with multiple files. • No unencrypted temporary files ever created. • No encryption passwords are saved within the encrypted files. • The software does not include any backdoor. No one will be able to get access to the encrypted data. Hence, do not forget your password. • Microsoft Windows 7 and 8 compatible. • Available in 32-bit and 64-bit versions. • Friendly interface, easy to operate. • All user settings are automatically saved. • Does not allow multiple instances. • Guaranteed high speed. • The program does not contain any form of malware (such as spyware, adware, viruses, trojans and backdoors).
Other Windows Software of Developer «Vassil Arabadjiev»:
RawPrint (64-bit) RawPrint is a tool for sending text files (*.TXT and *.PRN) directly to a Windows printer, bypassing the printer driver. In this case printer drivers formatting routines are ignored. The main purpose of RawPint is to be used as a printing tool for text edi
RawPrint RawPrint is a tool for sending text files (*.txt, *.prn) directly to a Windows printer, bypassing the printer driver. In this case printer drivers formatting routines are ignored. The main purpose of RawPint is to be used as a printing tool for text editor
CryptoNG (64-bit) CryptoNG is stable, reliable, and easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files by encrypting them with AES-GCM 256-bit authenticated encryption algorithm which simu
Free Windows Password Recovery There are many instances in which users forget their Windows passwords and lose out on valuable time. It is an especially trying situation to be in when there are deadlines to be met or important meetings to be attended. In order to come out of the same wi
Shredder When a file is deleted, it is not completely removed from the hard disk. So, it is actually possible for somebody to recover these files using file recovery programs. This is a threat if you have some sensitive data that you wish to remove. Shredder is a f
Password Administrator Keep a firm grip on all your password information with Password Administrator. This program is available from the system tray and allows you to set up multiple password-protected databases, each with multiple categories to organize your passwords. You can
NeoExec Professional NeoExec is an operating system extension for Windows 2000/XP that allows the setting of Administrative privileges at the application level rather than at the user level. NeoExec is the ideal solution for applications that require elevated privileges to run
Cryptime The Cryptime program is intended for information encryption with TimerLock. You can set the password and TimerLock and encrypt any files or folders with files: documents, photos, databases. The TimerLock is supposed to set the time when it will be possible
MD5 & SHA Checksum Utility MD5 & SHA Checksum Utility is a standalone freeware that can generate MD5, SHA-1, SHA-256 & SHA-512 hashes from a file. In addition, you can verify the hash to ensure the file integrity is correct with the matching file.What is new in this release:Version
Secrets Secrets gives the users the possibility to safely store passwords into an encrypted file format. Backup/Restore of password data, resorting of data capabilities, ability to change where the data file resides. Automatic shutdown or lockout feature and other
MailCloak Pro MailCloak is a groundbreaking new GPG encryption plug-in from Global Web Security Systems (gWebs). MailCloak was designed from the ground up to be the first encryption killer app for IE, FF & mail clients. MailCloak Pro uses the GNU Privacy Guard (Aka. Gnu
ContentVault ContentVault is a low-price content security system with digital rights management, allowing individuals and small, low-budget companies to seal and protect content with a level of security equal to, or exceeding, most DRM systems. The program prevents cop
OneClick Encryption Software Easy to use OneClick Encryption Software makes public key encryption accessible to everyone. No special computer skills are required. Create your public keys and distribute them to your correspondents to secure your exchanges. Encrypt files individually as
Supported Operating Systems:
Windows 7 |
Comments on CryptoNG (32-bit):
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10