Those of you who need to encrypt data may have a closer look at F-Secure at http://www.datafellows.com
Their product is *free* for academic use, it works under Windows 3.x/95/NT, has a military grade, 256 bits Blowfish/DES encryption, allows multitasking (runs in the background), has a useful 'Make Encrypted Package' (autoexecutable) function, secure deletion of files, automatic encryption of subdirectories, etc. all of which may be run from the right button of the mouse.
All in all: A highly useful, free package (which has won several European Security awards for it's incrackability, easy of use, design and not the least it's price for academic use).
WARNING: If you are up to use encryption software, read the documentation **very carefully** and test the package ***before*** encrypting critical files. I suggest that you only use the 'Make Encrypted Package' function if you are not familiarized with encryption keys. Try to choose a good pass phrase such as something which may only make sense to you: For example, 'auntseulaliasfunnygreyparrot', etc.
Below [1] information about the program is included. Cheers, APS.
[1] F-Secure Desktop's Encryption Technology
F-Secure Desktop is designed with two objectives in mind: ease of use and top security. The ease of use comes from the fact that the files to be kept confidential are transparently encrypted/decrypted when starting and closing your Windows session. You kn] ow that your information is safe whenever you have logged out in a normal fashion. Top security is provided with state-of-the-art encryption technology. F-Secure Desktop uses a fast well-known public block-cipher encryption algorithm called Blowfish. Blowfish was designed specifically for 32-bit computers by Bruce Schneier, a well known] cryptography author. The Blowfish encryption algorithm has lasted several years of public cryptanalysis and reviews in numerous cryptography conferences.
F-Secure Desktop uses Blowfish with 256-bit encryption keys generated using a cryptographically strong random number generator. During installation a master key is generated for access to all encrypted files. This master key is used to encrypt a random encryption key, generated for each file at the beginning of the encryption process. Each encrypted file contains two sets of encrypted information; the random encryption key encrypted with the master key and the original file contents encrypted using the random encryption key.
To decrypt the file, first the random encryption key is recovered using the master key. The random encryption key can then be used to restore the original file in an unencrypted format.
The master key is never stored unprotected on your hard disk. It is encrypted using a 256-bit key generated from the userAEs passphrase. Blowfish is again used to encrypt the master key.
Data Fellows Ltd. .... eof
---- Aldo-Pier Solari <[log in to unmask]>, Fish.Res.Gr./ULP H-page: http://segate.sunet.se/fish-ecology/aps/index.html Oath: 'I will not fail those with whom I serve' ----
|