CryptoNG is easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files, by encrypting them with AES-256 encryption algorithm. Authenticated encryption algorithm provide both data authenticity (integrity) and confidentiality. This makes the encryption very secure. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network /like the Internet/ and still remain secret. Later, the information can be decrypted into its original form. CryptoNG integrates the strongest encryption available today into the Windows environment.
• Encrypting files. AES-256 algorithm with Galois/counter chaining mode (GCM). • Decrypting files. • Permanently wiping files. Three pass overwriting algorithm: first pass - with zeroes, second pass - with ones and the last pass with random bytes. • Large files (4GB and more) support. • Works with multiple files. • No unencrypted temporary files ever created. • No encryption passwords are saved within the encrypted files. • Guaranteed high speed. • Available in 32-bit and 64-bit versions. • Friendly interface, easy to operate. • All user settings are automatically saved. • Does not allow multiple instances. • The program does not contain any form of malware (like spyware, adware, viruses, trojans and backdoors).
Authenticated encryption software
What is authenticated encryption? Authenticated encryption, is the process of both encrypting and authenticating data. The process will associate an authenticator, also known as a tag, with the data. Plain text is transformed into cipher text with an authenticator. When it comes time to decrypt the data, the cipher text is validated using the tag.
We all have some files that we would like to keep encrypted so they are kept out the reach of others.