Date post: | 02-Jan-2016 |
Category: |
Documents |
Upload: | branden-morgan |
View: | 228 times |
Download: | 4 times |
Professional Encryption Professional Encryption SoftwareSoftware
FINECRYPT 8.1FINECRYPT 8.1
ContentsContents
IntroductionIntroduction FeaturesFeatures InstallationInstallation TestsTests ResultsResults ConclusionConclusion
Cryptography IntroductionCryptography Introduction
Study of secret writingStudy of secret writing Storing information in a form which allows Storing information in a form which allows
it to be revealed to those you wish to see it it to be revealed to those you wish to see it yet hides it from all othersyet hides it from all others
Effective way to reliably protect Effective way to reliably protect confidential dataconfidential data
Benefits of Cryptographic Benefits of Cryptographic Technologies?Technologies?
Data secrecyData secrecy Data integrity Data integrity Authentication of message originatorAuthentication of message originator Non-repudiationNon-repudiation
Why FineCrypt?Why FineCrypt? Security software applicationSecurity software application Enables to securely store the data using Enables to securely store the data using
strong encryptionstrong encryption Written in Assembly LanguageWritten in Assembly Language 1.5 Times faster the other encryption 1.5 Times faster the other encryption
tools tools Uses Symmetric Key Encryption i.e the Uses Symmetric Key Encryption i.e the
sender and receiver of a message know sender and receiver of a message know and use the same secret keyand use the same secret key
Awards of FineCryptAwards of FineCrypt
Features?Features? Supports 10 Encryption Algorithms i.e. AES, Supports 10 Encryption Algorithms i.e. AES,
Blowfish, 3DES etcBlowfish, 3DES etc Uses 4 Encryption Modes i.e. ECB, CBC, CFB Uses 4 Encryption Modes i.e. ECB, CBC, CFB
and OFBand OFB Only program which checks the correctness of Only program which checks the correctness of
encryption encryption FineCrypt Communicator - Exchanging FineCrypt Communicator - Exchanging
encrypted files and encryption keys with other encrypted files and encryption keys with other usersusers
Features Features (cont)(cont)
Key Management using key managerKey Management using key manager Encrypt several files either into single Encrypt several files either into single
encrypted archive or into different encrypted encrypted archive or into different encrypted filesfiles
Encrypt files both with the password and with Encrypt files both with the password and with the keythe key
Permanent File Deletion using “Wipe” utilityPermanent File Deletion using “Wipe” utility
10 Encryption Algorithms10 Encryption Algorithms
Encryption ModesEncryption Modes Used with block cipher to encrypt a Used with block cipher to encrypt a
message of arbitrary length message of arbitrary length
Electronic Cookbook Mode (ECM)Electronic Cookbook Mode (ECM) Cipher Block Chaining mode (CBC)Cipher Block Chaining mode (CBC) Cipher Feedback mode (CFB)Cipher Feedback mode (CFB) Output Feedback mode (OFB)Output Feedback mode (OFB)
Reference & System SupportReference & System Support Download SourcesDownload Sources
www.finecrypt.net www.download.com
System SupportSystem Support Windows 9xWindows 9x Windows 2000Windows 2000 Windows XPWindows XP Windows 2003Windows 2003
Once fcinst.exe downloaded on the machine, click the Once fcinst.exe downloaded on the machine, click the package to start installationpackage to start installation
You will come up with the following screen. Click You will come up with the following screen. Click continue to proceedcontinue to proceed
Click NextClick Next
Read the license Agreement and if you Read the license Agreement and if you agree the terms and condition then proceedagree the terms and condition then proceed
Choose the destination location where Choose the destination location where you want to install FineCryptyou want to install FineCrypt
After giving the destination location, After giving the destination location, click next to proceedclick next to proceed
Click Finish to restart the Click Finish to restart the computercomputer
ArcViewer WindowArcViewer Window
Encryption using PasswordEncryption using Password
Click with the right mouse button on selected files; from the Click with the right mouse button on selected files; from the FineCrypt submenu choose "Encrypt with password" menu FineCrypt submenu choose "Encrypt with password" menu itemitem
Enter the passphrase you want to encrypt a Enter the passphrase you want to encrypt a filefile
Choose Encryption Algorithm & Encryption Mode. In Choose Encryption Algorithm & Encryption Mode. In this example, we selected the algorithm 3DES with this example, we selected the algorithm 3DES with CFB modeCFB mode
Then click on Encrypt button and save the file Then click on Encrypt button and save the file with .fca format. You will get the encrypted file, with .fca format. You will get the encrypted file, as shown highlightedas shown highlighted
Decryption using PasswordDecryption using Password
In order to decrypt a file or folder, click the In order to decrypt a file or folder, click the desired sourcedesired source
Click the file you want to decrypt. FineCrypt Click the file you want to decrypt. FineCrypt will ask you for Password. Enter the Passwordwill ask you for Password. Enter the Password
By pressing the Ok button you will get By pressing the Ok button you will get the decrypted filethe decrypted file
Encryption using KeyEncryption using Key
Right Click the file or folder you want to Right Click the file or folder you want to Encrypt. Encrypt the file using “Encrypt with Encrypt. Encrypt the file using “Encrypt with Key…” optionKey…” option
Click on Settings and then select the Click on Settings and then select the algorithm and mode to encrypt the filealgorithm and mode to encrypt the file
Click on Password Button and generate the key. Then Click on Password Button and generate the key. Then Save the key, specify name and location for encrypted Save the key, specify name and location for encrypted file and then press Encrypt buttonfile and then press Encrypt button
You will get the encrypted file along with the keyYou will get the encrypted file along with the key
Decryption using KeyDecryption using Key
In order to decrypt a file or folder, open the In order to decrypt a file or folder, open the encrypted file and you will get screen aboveencrypted file and you will get screen above
Click the “Read…” button and select the Click the “Read…” button and select the saved key which was used to encrypt the saved key which was used to encrypt the file and then press okfile and then press ok
You can see the decrypted file aboveYou can see the decrypted file above
Key Manager InterfaceKey Manager Interface
Checking reliability of Checking reliability of
FineCrypt's EncryptionFineCrypt's Encryption Comparing the original text and resulting Comparing the original text and resulting
ciphertext, known as ciphertext, known as "test vectors""test vectors" Test vectors - widely published and can Test vectors - widely published and can
find them in the Internetfind them in the Internet Hexadecimal file editor required for Hexadecimal file editor required for
testingtesting Download a simple hexadecimal editor Download a simple hexadecimal editor
"HighLight" @ "HighLight" @ www.finecrypt.net/mylight22.exe
Testing AES Algorithm with Electronic Testing AES Algorithm with Electronic Codebook ModeCodebook Mode
Download the test vectors for AES Download the test vectors for AES algorithm from National Institute of algorithm from National Institute of Standards and Technology (NIST)Standards and Technology (NIST)
http://csrc.nist.gov/encryption/aes/rijndael/rijndael-vals.zip
Unzip and open the file "ecb_tbl.txt"Unzip and open the file "ecb_tbl.txt"
Create new file in hexadecimal editorCreate new file in hexadecimal editor Enter the plaintext exactly as shown in Enter the plaintext exactly as shown in
the test vectorthe test vector
Save the file as “aesp” at desired Save the file as “aesp” at desired location. Our plaintext is createdlocation. Our plaintext is created
Encrypt “aesp” file using keyEncrypt “aesp” file using key Enter the encryption key exactly as Enter the encryption key exactly as
shown in the test vectorshown in the test vector
Select AES with ECB modeSelect AES with ECB mode Set “Don’t compress” option on “General” Set “Don’t compress” option on “General”
pagepage Do not change anything in the "initial vector" Do not change anything in the "initial vector"
editor windoweditor window Press the "Encrypt" button and encrypt the Press the "Encrypt" button and encrypt the
filefile The process is finishedThe process is finished
Now check the ciphertext in the file “aesp” corresponds Now check the ciphertext in the file “aesp” corresponds with NIST’s ciphertext or notwith NIST’s ciphertext or not
Open the encrypted file in Hex EditorOpen the encrypted file in Hex Editor
Compare that green text with test vector and make sure Compare that green text with test vector and make sure they are identicalthey are identical
Cracking EncryptionCracking Encryption
ConclusionConclusion
Information Security is becoming more Information Security is becoming more important after Sept 11, 2001important after Sept 11, 2001
Encryption products - locks and keys of the Encryption products - locks and keys of the Information AgeInformation Age
FineCrypt - Best freeware Cryptographic tool FineCrypt - Best freeware Cryptographic tool available on Internetavailable on Internet