[Advanced Encryption Package 2014] Strong encryption algorithms to protect your confidential documents

Wednesday, February 19, 2014

Strong and proven encryption algorithms to protect your confidential documents

To secure sensitive data AEP PRO file encryption software uses 20 proven and strong encryption algorithms including AES, Blowfish, Twofish, GOST, Serpent and others.

Easy to use for novices. Integration with Windows context menu.

Encryption technology is a difficult thing, especially if you are not technically savvy. How is an older family member supposed to figure out how to create a self-decrypting file, securely delete a file, or use Public Key Infrastructure to receive mails securely?
This file encryption software is made easy for novices. It integrates nicely with Windows Explorer, allowing you to use Explorer's context menus for file encryption/decryption/secure deletion directly from well known Windows Explorer.
AEP file encryption software can encrypt a single file, multiple files at once or even whole Windows folder(s).

Using USB sticks to store encryption / decryption keys

It is possible to store all your encryption passwords on a USB Flash Drive. You just need to remember a single Master Password for the password vault on the USB memory stick. There is no need to keep 20 passwords in mind when you can store these encryption keys on flash memory in an encrypted form and remember just one password.
It might sound simplistic, but strong passwords are a must for good security. A good password is a combination of several words that aren't themselves a word interspersed with special characters (e.g., !4scOrE&sDayNYeaRs_ag0).
What is the real difference between a weak password and strong randomly generated password?
AEP file encryption software can generate a really strong encryption key (a real example is "(+3!';0.;4{M>tMpRnK7&*u'F7)SYu2Q"). The ability to remember such strong passwords (with the help of a USB memory stick of course) is the key to using modern encryption algorithms 100% effectively.

Securely delete source files after encryption. Never delete confidential files using Windows Explorer!

It is a common misconception of PC users that once they have dropped a file into the recycle bin and emptied it that, there is nothing left to do and that the file is gone for good.
All that happens when you erase a file by either deleting it or putting it into the trash is that Windows has been told to not recognize the file so that you do not see it when you open a folder or your desktop. In fact, it is not erased at all, the data is still there on your hard drive and it will remain there until the information is overwritten by some other file or data.
We know all about this, as we have developed special software to recover accidentally deleted files and we also know all about the file systems used in Windows 7, Vista,  XP and 2003/2000.
AEP file encryption software can wipe the contents of the original pre-encrypted file beyond recovery to make sure that not even a trace remains after shredding. AEP PRO matching and exceeding the specifications of the U.S. Department of Defense to stop software and hardware recovery tools.
AEP supports about 20 ways to securely delete file:  Peter Gutmann algorithm, U.S. DoD 5200.28, VSITR, German Standard, Bruce Schneier algorithm, NATO Data Destruction Standard, GOST P50739-95 Russian Standard, The National Computer Security Center Standard, Canadian Standard, NAVSO P-5239-26, US Navy Standard, AFSSI-5020, US Air-Force Standard, AR380-19, US Army Standard and simple Quick Wipe algorithm.

Symmetric and asymmetric encryption (support for PKI)

AEP PRO file encryption software supports symmetric and asymmetric encryption.
In the first mode (symmetric), you just use the same password and for encryption and for decryption using one of ~20 available symmetric encryption algorithms (AES, Blowfish, Serpent etc).
In the second mode (asymmetric), you create (using AEP PRO) a pair of keys: the public key and the private key. You publish the public key file on a web site (or send it to any person via e-mail). This key is used to encrypt a file and send it back to you. Once encrypted, the file cannot be decrypted using this public key file. You receive the file and use the private key file - i.e. your secret key file to decrypt document.  
  • AEP PRO includes the PKI keys manager and the key generator tool. It generates a pair of public/private keys with the strength: 512, 768, 1024 or 2048 bit.  
  • RSA encryption is used with strong symmetric encryption algorithms together. The public key is used to encrypt a randomly generated password. This password is used to encrypt whole file.  
  • AEP PRO can protect a private key file by way of a password. Therefore, you can store your decryption keys in an open form on USB sticks, windows folders, etc. It can be stolen but cannot be used.

Bonus! Command line utility to automate file encryption and decryption tasks

In a program folder you will find a separate command line utility (aepcmd.exe). It supports all program operations: encryption and decryption with a password, PKI encryption and decryption, secure file deletion, and the generation of PKI keys. This utility understands file masks, can process windows folders recursively, can fetch file/folder list from text file, or can be set in a command line.
This command line utility can easily be integrated with your batch script because this console utility returns status codes on every operation (errorlevel, that can be analyzed in your script). All command line keys and switches and status codes are fully documented in the help file.
AEPCMD can be configured to securely delete file(s) after encryption and you can use it to encrypt all new files in a folder and its subfolders on a scheduled basis (the encryption console utility will recognize and skip already encrypted files).

Easily share confidential documents / safely transfer data via the Internet. No need to have AEP on the other side.

Once encrypted, the document/file can safely be uploaded to your web site, sent as an attachment in an email, sent on a compact disc via postal mail, etc. Your email/compact disc with important documents can be intercepted by a third party. But nobody can read these documents without the password and there is absolutely no way to break this password.
When you burn encrypted files to compact disc, simpy burn our free decryption utlity Crypt4Free to this CD as well. Your recipient can use this utility to decrypt the files on your compact disc. This utility can also be downloaded from our web site abolutely free by everyone.
Alternatively, you can create self-decrypting versions of your encrypted files. A self-decrypting file is just the usual executable file with an encrypted file inside. The recipient of this secure document simply lanches this executable file and will then see a text field in order to enter the decryption password and then click the"decrypt" button. Therefore, the recipient of your files has no need to purchase an AEP program to decrypt your files.

Additionally, in a situation when both the sender and recipient have AEP PRO file encryption software, they can use Public Key Infrastructure to exchange files. You just generate a public/private key pair and send the public key to your recipient. The recipient uses your public key file to encrypt a confidential file and then sends it back to you in an encrypted form. You decrypt it using another key - private key file. In this situation you will never need to reveal the decryption password via telephone to your friends/colleagues and it cannot be heard/recorded by a third party.
In addition, AEP PRO compresses  the file before encryption to reduce its size significantly.

Scrambling text messages

AEP includes a special utility: Clipboard Encryptor. Its icon is located in the tray notification area and it monitors the Windows Clipboard.
By pressing the special global hot key, the text in the clipboard can be scrambled and then you can paste it into your email message.

AEP prevents the use of 'weak' passwords and enhances total security

AEP file encryption software controls entered encryption password is different ways. On the one hand it has a special password quality indicator. It turns red for weak passwords (short passwords, passwords consisting of characters only or digits only, etc.). On the other hand, AEP maintains an internal dictionary of 45,000 common English words and recognizes these words in the password and warns you when you use a weak dictionary password to prevent a well known dictionary attack.

Subscribe via e-mail for updates!