|
1 Click Encrypt
Did you remember to log off from you PC! Who else has access to your computer?
Today's personal computers aren't personal any more. They are typically
shared by spouses, children and colleagues. Computer privacy and security
is at a all time high.
Passwords are easily lost by one PC user and recovered by another. Log-ins
are often ignored and log-offs forgotten. 1 Click Encrypt is powerful
encryption software that restores personal privacy to your files - and it's easy to use!
1 Click Encrypt for windows provides the simplest yet most secure & safe
way of protecting your confidential data with the ability to quickly
and confidently encrypt files, folders trees to secure your PC. Choose
from three of the world's most reliable cryptographic algorithms to easily
and effectively encode files and block privacy intrusions.
Generate encryption keys in seconds and then all you need do is drop a file
onto the 1 Click Encrypt icon on your desktop and your file is safe from prying
eyes until you choose to reopen it or give its key to someone else.
Software Information |
System Requirements |
Version: |
1.4 |
- Windows 98,NT,2000,ME,XP,2003,Vista
- Pentium II CPU
- 256 MB of RAM
|
License: | Free to try, $29.95 to buy |
Download Size: | 2.49 MB |
Screenshot : |
View Screenshot |
Rating : | |
1 Click Encrypt Key Features:
- Fast and simple one-click encryption and decryption.
- Cryptographic library including the best and most proven cryptographic algorithms.
- An option to destroy or preserve files after encryption.
- Encrypt single files, folders and entire directory trees.
- An option to generate own cipher key to protect your most sensitive data.
- Live updates ensure ongoing protection.
- Supports 98, NT, 2000, ME, XP, 2003 Windows® Versions
Encryption Methods:
- AES: The Advanced Encryption Standard (AES) is a computer security standard
and its cryptography scheme is a symmetric block cipher that encrypts and decrypts 128-bit blocks of data.
Lengths of 128, 192, and 256 bits are standard key lengths used by AES.
- The algorithm consists of four stages that make up a round which is iterated
10 times for a 128-bit length key, 12 times for a 192-bit key, and 14 times for a 256-bit key.
- The first stage ("SubBytes" transformation) is a non-linear byte substitution
for each byte of the block. The second stage ("ShiftRows" transformation) cyclically shifts (permutes) the
bytes within the block.
- The third stage ("MixColumns" transformation) groups 4-bytes together
forming 4-term polynomials and multiplies the polynomials with a fixed polynomial mod (x^4+1).
- The fourth stage ("AddRoundKey" transformation) adds the round key with the block of data.
- AES does not have a Festal structure but is composed of three distinct
invertible transforms based on the Wide Trial Strategy design method.
The Wide Trial Strategy design method provides resistance against linear and differential cryptanalysis.
In the Wide Trail Strategy, every layer has its own function:
- The linear mixing layer: guarantees high diffusion over multiply rounds.
- The non-linear layer: parallel application of S-boxes that have the optimum worst-case non-linearity properties.
- The key addition layer: a simple XOR of the round key to the intermediate state.
Blowfish: Some of the features of Blowfish are:
- Offers 64-bit cipher block
- 32 bits to 448 bits variable key lengths
- Much faster than DES and IDEA
- No license required
- Freely Available
- Designed as a fast, free alternative to existing encryption algorithms
- Offers high level of security, and the keys cannot be broken
- GAMMA: This is a more secure encryption method that allows 32 bits key length and provides much more security than AES and BlowFish.
RELATED SOFTWARE DOWNLOADS FOR 1 CLICK ENCRYPT
|
|