Transcript

Professional Encryption Professional Encryption SoftwareSoftware

FINECRYPT 8.1FINECRYPT 8.1

ContentsContents

IntroductionIntroduction FeaturesFeatures InstallationInstallation TestsTests ResultsResults ConclusionConclusion

Cryptography IntroductionCryptography Introduction

Study of secret writingStudy of secret writing Storing information in a form which allows Storing information in a form which allows

it to be revealed to those you wish to see it it to be revealed to those you wish to see it yet hides it from all othersyet hides it from all others

Effective way to reliably protect Effective way to reliably protect confidential dataconfidential data

Benefits of Cryptographic Benefits of Cryptographic Technologies?Technologies?

Data secrecyData secrecy Data integrity Data integrity Authentication of message originatorAuthentication of message originator Non-repudiationNon-repudiation

Why FineCrypt?Why FineCrypt? Security software applicationSecurity software application Enables to securely store the data using Enables to securely store the data using

strong encryptionstrong encryption Written in Assembly LanguageWritten in Assembly Language 1.5 Times faster the other encryption 1.5 Times faster the other encryption

tools tools Uses Symmetric Key Encryption i.e the Uses Symmetric Key Encryption i.e the

sender and receiver of a message know sender and receiver of a message know and use the same secret keyand use the same secret key

Awards of FineCryptAwards of FineCrypt

Features?Features? Supports 10 Encryption Algorithms i.e. AES, Supports 10 Encryption Algorithms i.e. AES,

Blowfish, 3DES etcBlowfish, 3DES etc Uses 4 Encryption Modes i.e. ECB, CBC, CFB Uses 4 Encryption Modes i.e. ECB, CBC, CFB

and OFBand OFB Only program which checks the correctness of Only program which checks the correctness of

encryption encryption FineCrypt Communicator - Exchanging FineCrypt Communicator - Exchanging

encrypted files and encryption keys with other encrypted files and encryption keys with other usersusers

Features Features (cont)(cont)

Key Management using key managerKey Management using key manager Encrypt several files either into single Encrypt several files either into single

encrypted archive or into different encrypted encrypted archive or into different encrypted filesfiles

Encrypt files both with the password and with Encrypt files both with the password and with the keythe key

Permanent File Deletion using “Wipe” utilityPermanent File Deletion using “Wipe” utility

10 Encryption Algorithms10 Encryption Algorithms

Encryption ModesEncryption Modes Used with block cipher to encrypt a Used with block cipher to encrypt a

message of arbitrary length message of arbitrary length

Electronic Cookbook Mode (ECM)Electronic Cookbook Mode (ECM) Cipher Block Chaining mode (CBC)Cipher Block Chaining mode (CBC) Cipher Feedback mode (CFB)Cipher Feedback mode (CFB) Output Feedback mode (OFB)Output Feedback mode (OFB)

Reference & System SupportReference & System Support Download SourcesDownload Sources

www.finecrypt.net www.download.com

System SupportSystem Support Windows 9xWindows 9x Windows 2000Windows 2000 Windows XPWindows XP Windows 2003Windows 2003

Once fcinst.exe downloaded on the machine, click the Once fcinst.exe downloaded on the machine, click the package to start installationpackage to start installation

You will come up with the following screen. Click You will come up with the following screen. Click continue to proceedcontinue to proceed

Click NextClick Next

Read the license Agreement and if you Read the license Agreement and if you agree the terms and condition then proceedagree the terms and condition then proceed

Choose the destination location where Choose the destination location where you want to install FineCryptyou want to install FineCrypt

After giving the destination location, After giving the destination location, click next to proceedclick next to proceed

Click Finish to restart the Click Finish to restart the computercomputer

ArcViewer WindowArcViewer Window

Encryption using PasswordEncryption using Password

Click with the right mouse button on selected files; from the Click with the right mouse button on selected files; from the FineCrypt submenu choose "Encrypt with password" menu FineCrypt submenu choose "Encrypt with password" menu itemitem

Enter the passphrase you want to encrypt a Enter the passphrase you want to encrypt a filefile

Choose Encryption Algorithm & Encryption Mode. In Choose Encryption Algorithm & Encryption Mode. In this example, we selected the algorithm 3DES with this example, we selected the algorithm 3DES with CFB modeCFB mode

Then click on Encrypt button and save the file Then click on Encrypt button and save the file with .fca format. You will get the encrypted file, with .fca format. You will get the encrypted file, as shown highlightedas shown highlighted

Decryption using PasswordDecryption using Password

In order to decrypt a file or folder, click the In order to decrypt a file or folder, click the desired sourcedesired source

Click the file you want to decrypt. FineCrypt Click the file you want to decrypt. FineCrypt will ask you for Password. Enter the Passwordwill ask you for Password. Enter the Password

By pressing the Ok button you will get By pressing the Ok button you will get the decrypted filethe decrypted file

Encryption using KeyEncryption using Key

Right Click the file or folder you want to Right Click the file or folder you want to Encrypt. Encrypt the file using “Encrypt with Encrypt. Encrypt the file using “Encrypt with Key…” optionKey…” option

Click on Settings and then select the Click on Settings and then select the algorithm and mode to encrypt the filealgorithm and mode to encrypt the file

Click on Password Button and generate the key. Then Click on Password Button and generate the key. Then Save the key, specify name and location for encrypted Save the key, specify name and location for encrypted file and then press Encrypt buttonfile and then press Encrypt button

You will get the encrypted file along with the keyYou will get the encrypted file along with the key

Decryption using KeyDecryption using Key

In order to decrypt a file or folder, open the In order to decrypt a file or folder, open the encrypted file and you will get screen aboveencrypted file and you will get screen above

Click the “Read…” button and select the Click the “Read…” button and select the saved key which was used to encrypt the saved key which was used to encrypt the file and then press okfile and then press ok

You can see the decrypted file aboveYou can see the decrypted file above

Key Manager InterfaceKey Manager Interface

Checking reliability of Checking reliability of

FineCrypt's EncryptionFineCrypt's Encryption Comparing the original text and resulting Comparing the original text and resulting

ciphertext, known as ciphertext, known as "test vectors""test vectors" Test vectors - widely published and can Test vectors - widely published and can

find them in the Internetfind them in the Internet Hexadecimal file editor required for Hexadecimal file editor required for

testingtesting Download a simple hexadecimal editor Download a simple hexadecimal editor

"HighLight" @ "HighLight" @ www.finecrypt.net/mylight22.exe

Testing AES Algorithm with Electronic Testing AES Algorithm with Electronic Codebook ModeCodebook Mode

Download the test vectors for AES Download the test vectors for AES algorithm from National Institute of algorithm from National Institute of Standards and Technology (NIST)Standards and Technology (NIST)

http://csrc.nist.gov/encryption/aes/rijndael/rijndael-vals.zip

Unzip and open the file "ecb_tbl.txt"Unzip and open the file "ecb_tbl.txt"

Create new file in hexadecimal editorCreate new file in hexadecimal editor Enter the plaintext exactly as shown in Enter the plaintext exactly as shown in

the test vectorthe test vector

Save the file as “aesp” at desired Save the file as “aesp” at desired location. Our plaintext is createdlocation. Our plaintext is created

Encrypt “aesp” file using keyEncrypt “aesp” file using key Enter the encryption key exactly as Enter the encryption key exactly as

shown in the test vectorshown in the test vector

Select AES with ECB modeSelect AES with ECB mode Set “Don’t compress” option on “General” Set “Don’t compress” option on “General”

pagepage Do not change anything in the "initial vector" Do not change anything in the "initial vector"

editor windoweditor window Press the "Encrypt" button and encrypt the Press the "Encrypt" button and encrypt the

filefile The process is finishedThe process is finished

Now check the ciphertext in the file “aesp” corresponds Now check the ciphertext in the file “aesp” corresponds with NIST’s ciphertext or notwith NIST’s ciphertext or not

Open the encrypted file in Hex EditorOpen the encrypted file in Hex Editor

Compare that green text with test vector and make sure Compare that green text with test vector and make sure they are identicalthey are identical

Cracking EncryptionCracking Encryption

ConclusionConclusion

Information Security is becoming more Information Security is becoming more important after Sept 11, 2001important after Sept 11, 2001

Encryption products - locks and keys of the Encryption products - locks and keys of the Information AgeInformation Age

FineCrypt - Best freeware Cryptographic tool FineCrypt - Best freeware Cryptographic tool available on Internetavailable on Internet

top related