Crypteze 1.1.0.512
Crypteze provides an easy and effective way to achieve secure data storage and communication through the encryption of your files and e-mail messages.
|
Crypteze provides an easy and effective way to achieve secure data storage and communication through the encryption of your files and e-mail messages.
It protects your privacy by allowing you to effectively lock and unlock your own files and e-mail messages so that only you and the people you choose to communicate with can view them. It also enables e-mail messages to be digitally signed and verified.
The Cryptographic Services built into Microsoft Windows are used by Crypteze to create your own "digital ID", encrypt and decrypt files, and via Microsoft Outlook Express and Outlook, to encrypt and decrypt, sign and verify e-mail messages.
Although there are other digital ID providers, they usually provide the additional service of authenticating your digital ID when dealing with others. For this they typically require an annual fee and the provision of much personal information.
Crypteze and Public Key Technology
Public key technology (PKT) provides the basis for most of the world's secure data storage and communication. There are two aspects of PKT which you should be aware of in order to use Crypteze: digital IDs and encryption algorithms.
Digital IDs:
Everyone must have a unique digital ID in order to perform encryption and digital signing operations. A digital ID has two components: a private key and a public key. These are generated together as a pair and have a reciprocal nature. When a file or e-mail message is encrypted, the public key is used. When it is decrypted, the private key is used. When an e-mail message is signed, the private key is used. When it is verified, the public key is used.
When a digital ID is created for you, your private key is stored securely on your computer and your public key is packaged, along with other pertinent information such as your name, into a "certificate" which is also stored on your computer. Certificates are exchanged - typically by e-mail - between people who want to securely communicate with each other. Your certificate is effectively your "public" digital ID.
Encryption Algorithms:
Various algorithms are available for encryption. These have different strengths, meaning that they require different levels of effort to defeat them. A greater strength generally implies greater effort not only to encrypt something but also to decrypt it.
There are a common set of algorithms available on Microsoft Windows systems, but some systems may have stronger algorithms. In order to communicate securely with someone you may have to agree on using a common algorithm.
Digital ID Creation
Crypteze enables a person to generate their own digital ID. Your digital ID can be used for encrypting and decrypting files and e-mail messages as well as signing and verifying e-mail messages.
You may communicate with anyone that has a digital ID whether it was created by Crypteze or some of other digital ID provider.
File Encryption
Crypteze permits any file to be simply encrypted and decrypted. This may be performed by granting access to specific people, using their digital IDs, or simply by a password.
To encrypt a file that is to be accessed by digital IDs, you must have your own digital ID. If it is to be shared with others, you must also have their digital IDs in the form of certificates. A certificate contains a person's public key with which the file is encrypted. The person's corresponding private key can then be used to decrypt the file.
Secure File Deletion
Crypteze provides the ability to securely delete a file. The Secure Delete operation will first overwrite a file with random data and then delete it.
Secure E-Mail
Crypteze works in conjunction with Microsoft Outlook Express and Outlook to provide e-mail encryption and signing. You must use Crypteze to generate your own digital ID - containing your e-mail address - prior to using this.
To send an encrypted e-mail to others, you must have their digital IDs in the form of certificates. A certificate contains a person's public key with which the e-mail message is encrypted. The person's corresponding private key can then be used to decrypt the message.
To digitally sign an e-mail message all that is required is your own digital ID. Your private key is used to sign a message. Typically your digital ID's certificate (containing your public key) is included in any message that you sign. This permits the recipient to verify the signature and also to save the certificate for future communication.
tags public key private key digital ids mail messages own digital your own used when you must files and mail message your public there are communicate with
Download Crypteze 1.1.0.512
Purchase: Buy Crypteze 1.1.0.512
Authors software
Crypteze 1.1.0.512
kcSystems Inc
Crypteze provides an easy and effective way to achieve secure data storage and communication through the encryption of your files and e-mail messages.
Similar software
Crypteze 1.1.0.512
kcSystems Inc
Crypteze provides an easy and effective way to achieve secure data storage and communication through the encryption of your files and e-mail messages.
FileCrypt Desktop Pro 1.7
Veridis
FileCrypt Desktop Pro allows you to communicate and exchange information securely with other people.
Antrasoft Secure Messenger 3.5
AntraSOFT
AntraSOFT Secure Messenger is an independent email program which provides end-to-end security for highly confidential information communicated via electronic mail using security public & private 1024-bit key (security certificate) and POP3/SMTP protocol.
Mirramail 1.2.2
Mirrasoft Pty Ltd
Mirramail is a complete email program, like Outlook or Outlook Express, except the emails you send can be easily secured with 256 bit AES Encryption at the click of a button.
DevSolutions SecureFile 3.1
DevSolutions
DevSolutions SecureFile is an easy to use encryption and compression program, which is able to encrypt your personal files and sensitive data quickly, easily and securely.
Privacy.FILE v6.13 02.0808.0012
Digital Privacy, Inc
A Unique File Encryption Application
Organizations, in both the public and private sector, as well as individuals, are all lacking in the ability to secure proprietary informational assets.
PlexCrypt Compression - Encryption 4.2.1
PlexObject Solutions, Inc.
PlexCrypt will protect documents and folders based on both asynchronous encryption based on Public-Key-Infrastructure (PKI) and synchronous encryption based on passwords.
Signature995 4.5
pdf995
Signature995 uses native PDF encryption, offering a high level of protection for all your Internet communications, including legal documents and financial transactions.
.NET Encryption Component 1.0
Chilkat Software
.
FileAssurity OpenPGP 2.02
ArticSoft
FA OpenPGP lets you generate self-signed certificates/keys or you can import x.
Other software in this category
Paragon Encrypted Disk 3.02
Paragon Technologie GmbH
Paragon Encrypted Disk - protect private and sensitive data from potential unauthorized access.
Info-Lock Home Edition 1.1
Info-Lock
Info-Lock Home Edition offers you the perfect solution for securely locking your home desktop computer files from prying eyes.
Adhaero Transit 1.010
Adhaero Technologies
Adhaero Transit is a tool that enables safe e-business.
Chameleon 2.0
Globe Masters Software
Encode It 2.01
Skylark Utilities
Encode It will allow users to safely decrypt, encrypt or shred one or more files, including complete folders and all it`s sub folders in one easy step.