The application provides:
- encryption and secure protected storage of files including public cloud storage;
- files exchange with other users with the ability to group and individual access to encrypted files, as well as between different user devices (work and home computer, laptop, tablet, mobile phone);
- the possibility of storage in a single encrypted container (safe) of the various user files.
Install the application, exchange with friends by e-certificates of public keys (public key) encrypts files before sending, and no one except those to whom they are intended will not be able to access the contents of files.
Secure storage and transmission of encrypted files provides a reliable cryptographic public key and is determined by the following basic principles:
- each user has two related keys: secret and public (key pair);
- secret key is only in its owner and only it can be used to decrypt files intended for the owner of the secret key;
- public key is used to encrypt files to transfer owner secret key connected with the public key (public key is not secret and can be accessed by anyone);
- to be able to exchange encrypted files, firstly users must generate a key pair and to exchange public keys (public key certificates) in any convenient way (by e-mail, using an external storage or use a cloud service provided by the program);
- the user can use a secure storage software or additional hardware device to store the secret key;
- software depository provides secure storage of the secret key in an encrypted form in the memory of a mobile phone or tablet
- additional hardware devices based on smart cards provides maximum protection, the secret key never leaves the hardware device and it is not even theoretically possible to get.
The application uses cryptographic algorithms guaranteed durability:
- for the generation of key information using algorithms RSA (key length - 1024-2048 bits) or DSTU 4145-2002 (algorithm based on elliptic curves with a key length - 163-509 bits);
- for file encryption - AES or DSTU GOST 28147: 2009 (with a key length of 256 bits).
Differences from similar programs are:
- optimized encryption of large volume data;
- ability to select use of cryptographic algorithms and key lengths;
- simple exchange and synchronization of public key certificates using the cloud service CryptoFiles;
- support for hardware storage of key information;
- easy and clear graphic interface;
- the ability to export / import settings and the list of recipients.
You are allowed to use this product only within the laws of your country/region. SharewareOnSale and its staff are not responsible for any illegal activity. We did not develop this product; if you have an issue with this product, contact the developer. This product is offered "as is" without express or implied or any other type of warranty. The description of this product on this page is not a recommendation, endorsement, or review; it is a marketing description, written by the developer. The quality and performance of this product is without guarantee. Download or use at your own risk. If you don't feel comfortable with this product, then don't download it.
Reviews for CryptoFiles Pro
Click Here to Read Reviews for CryptoFiles Pro >> Click Here to Submit Reviews for CryptoFiles Pro >>