CryptoNG (64-bit) 15.1.5 download by Vassil Arabadjiev
CryptoNG is stable, reliable, and easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files by encrypting them with AES-GCM 256-bit authenticated encryption algorithm which simultaneously provides both data authenticity (integrity) and confidentiality. AES-GCM is the best performing authenticated encryption combination. GCM can detect both accidental modifications of the data and intentional, unauthorized modifications. This makes the encryption very secure. What is authenticated encryption? Authenticated encryption, is the process of both encrypting and authenticating data. The process will associate an authenticator, also known as a tag, with the data. Plain text is transformed into cipher text with an authenticator. When it comes time to decrypt the data, the cipher text is validated using the tag. Main features: Ã¢â‚¬Â¢ Encrypting and decrypting files of any type on any media using the AES-256 bit key length algorithm in Galois/counter chaining mode (GCM). Ã¢â‚¬Â¢ Hashing files (SHA-256 algorithm). SHA-256 is one of the strongest hash functions available. Ã¢â‚¬Â¢ Permanently wiping files. Three pass overwriting algorithm: first pass - with zeroes, second pass - with ones and the last pass with random bytes. Ã¢â‚¬Â¢ Large files (4GB and more) support. Ã¢â‚¬Â¢ Works with multiple files. Ã¢â‚¬Â¢ No unencrypted temporary files ever created. Ã¢â‚¬Â¢ No encryption passwords are saved within the encrypted files. Ã¢â‚¬Â¢ The software does not include any backdoor. No one will be able to get access to the encrypted data. Hence, do not forget your password. Ã¢â‚¬Â¢ Microsoft Windows 7 and 8 compatible. Ã¢â‚¬Â¢ Available in 32-bit and 64-bit versions. Ã¢â‚¬Â¢ Friendly interface, easy to operate. Ã¢â‚¬Â¢ All user settings are automatically saved. Ã¢â‚¬Â¢ Does not allow multiple instances. Ã¢â‚¬Â¢ Guaranteed high speed. Ã¢â‚¬Â¢ The program does not contain any form of malware (such as spyware, adware, viruses, trojans and backdoors).
Tags: Advanced , Aes , AES-256 , AES-GCM , Authenticated , Cipher , CryptoNG , Decrypt , Decryption , Encrypt