File, Drive Encryption and password protection, Data Recovery software for Windows 10 and 7

 

Site Map |  Friday, November 22, 2024

File Encryption Software

Drive Encryption

USB Encryption. DVD Encryption Software.

Files Recovery/Deletion

PIMs

Free Programs

 

What is encryption?

Encrypting data means getting it transformed into a string of characters undecipherable by others.

What actually happens is that by using a secret-key i.e. the equivalent of a code (see glossary), the cryptography system transforms your data into gibberish. If the scrambling of the data is done properly, the original file can only be unscrambled and read by someone who knows the secret key i.e. the code used to encrypt the file.

Encrypting a file ensures that even if someone gets access to your computers/he would not be able to read the data stored there. Encrypted files can safely be sent by e-mail or placed on a network with the assurance that the data can be read only by those who were meant to have it.

Basic encryption systems have been used to protect secrets for many centuries. But today's encryption methods are far more sophisticated and reliable than ever before because the encryption code itself is a very complex computational transformation that is only feasible with desktop machines in the early 1990s

How does encryption work?

When you use encryption, your data gets converted into meaningless symbols by using a key, which is nothing but the code that helps you to encrypt or decrypt data.

The more random the method of key conversion, the stronger the encryption will be. A pass phrase generally needs to be easy to remember, so it has significantly less randomness than its length suggests. For example, a 20-letter English phrase, rather than having 20 x 8 = 160 bits of randomness, only has about 20 x 2 = 40 bits of randomness.

So, cryptographic software converts a pass phrase into a key through a process called ``hashing'' or ``key initialization.'' (see glossary)

At the heart of the process is the algorithm (see glossary), which is devised so as to make deciphering the encrypted file impossible without using the secret key. Some of the popular encryption algorithms include Blowfish, DES, Diffie-Hellman, IDEA, RC4, RSA and Skipjack. Many of these use 64 and 128 bit encryption systems i.e. devise keys of 2*64 or 2*128 length.

The Blowfish encryption algorithm on which CryptoExpert is based was specially designed to encrypt data on 32-bit microprocessor. It is significantly faster than DES and GOST when implemented on 32-bit microprocessors, such as the Pentium or Power PC.


Is encryption safe?

I n ordinary user may find it difficult to unscramble even a simple algorithm. However, experts using sophisticated methods can employ a number of means to break an algorithm. The most common of these is "brute force" wherein a number of computers are simultaneously employed to break the code by a "trial and error" system which physically checks all possible combinations.

However, a well developed encryption system can withstand even such brutal attacks. Encryption based on the algorithms mentioned above are generally immune to these kinds of attack assuming that no backdoors exist in the programme. Calculations show that the period of time required to crack them through brute force is gigantic. This table will give an idea of the

dimensions.

2 to power of Approximates to

30 Age of planet earth (in years)

33 Probability of being killed by a lightning (per day)

61 Lifetime of universe in seconds

170 Amount of atoms on our planet

223 Amount of atoms in our galaxy

446 Amount of possible keys used by GUIDESX

2048 Amount of possible keys

The probability of being killed by a lightning is 2³³ to 1, this is about 8.5 billion to 1. Note: 128 bit keys generally provide maximum security. For most private and commercial applications 60 bit key length is sufficient. Only 56 bit and below keys can theoretically be broken by the "brute force" method.

To see how difficult this is let us look at estimates of the time required using brute force to break symmetric ciphers assuming that:

I. Every single computer (estimated at 3*108) on the earth is used full time.

ii. Every computer has the processing power of a PII 450Mhz. Then a single (3DES) key can be brute forced in an average of 457,351,814,728 years.

The table below shows how long the various types of keys remain secure for.

A number of assumptions are made:

i. The number of computers in the world is equal to 100 Billion (that's ten for every single person on earth in the year 2014 - there are expected to be 10 billion people alive in 2014).

ii. Each of the computers obey Moore's law (the power and speed of computers doubles approximately every 18 months) for the entire period of cracking. (NOTE: this assumption may break current theories on speed of light, quantum physics etc). In reality, Moore's Law is predicted to become infeasible within 10 years or so.

Cipher Effective Years until break
Key Size feasible with
500 10 100,000
Supercomputers Billion Deep Crack
computers machines
(PII 450)
3DES 112 61 44 45
CAST 128 85 65 69
IDEA 128 85 66 69