Download presentation
Presentation is loading. Please wait.
Published byBranden Morgan Modified over 9 years ago
1
Professional Encryption Software FINECRYPT 8.1
2
Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results Conclusion Conclusion
3
Cryptography Introduction Study of secret writing Study of secret writing Storing information in a form which allows it to be revealed to those you wish to see it yet hides it from all others Storing information in a form which allows it to be revealed to those you wish to see it yet hides it from all others Effective way to reliably protect confidential data Effective way to reliably protect confidential data
4
Benefits of Cryptographic Technologies? Data secrecy Data secrecy Data integrity Data integrity Authentication of message originator Authentication of message originator Non-repudiation Non-repudiation
5
Why FineCrypt? Security software application Security software application Enables to securely store the data using strong encryption Enables to securely store the data using strong encryption Written in Assembly Language Written in Assembly Language 1.5 Times faster the other encryption tools 1.5 Times faster the other encryption tools Uses Symmetric Key Encryption i.e the sender and receiver of a message know and use the same secret key Uses Symmetric Key Encryption i.e the sender and receiver of a message know and use the same secret key
6
Awards of FineCrypt
7
Features? Supports 10 Encryption Algorithms i.e. AES, Blowfish, 3DES etc Uses 4 Encryption Modes i.e. ECB, CBC, CFB and OFB Only program which checks the correctness of encryption FineCrypt Communicator - Exchanging encrypted files and encryption keys with other users
8
Features (cont) Key Management using key manager Encrypt several files either into single encrypted archive or into different encrypted files Encrypt files both with the password and with the key Permanent File Deletion using “Wipe” utility
9
10 Encryption Algorithms
10
Encryption Modes Used with block cipher to encrypt a message of arbitrary length Electronic Cookbook Mode (ECM) Electronic Cookbook Mode (ECM) Cipher Block Chaining mode (CBC) Cipher Block Chaining mode (CBC) Cipher Feedback mode (CFB) Cipher Feedback mode (CFB) Output Feedback mode (OFB) Output Feedback mode (OFB)
11
Reference & System Support Download Sources Download Sources www.finecrypt.net www.finecrypt.net www.finecrypt.net www.download.com www.download.com www.download.com System Support System Support Windows 9x Windows 9x Windows 2000 Windows 2000 Windows XP Windows XP Windows 2003 Windows 2003
12
Once fcinst.exe downloaded on the machine, click the package to start installation Once fcinst.exe downloaded on the machine, click the package to start installation You will come up with the following screen. Click continue to proceed You will come up with the following screen. Click continue to proceed
13
Click Next Click Next
14
Read the license Agreement and if you agree the terms and condition then proceed Read the license Agreement and if you agree the terms and condition then proceed
15
Choose the destination location where you want to install FineCrypt Choose the destination location where you want to install FineCrypt
16
After giving the destination location, click next to proceed After giving the destination location, click next to proceed
17
Click Finish to restart the computer Click Finish to restart the computer
18
ArcViewer Window
19
Encryption using Password Click with the right mouse button on selected files; from the FineCrypt submenu choose "Encrypt with password" menu item Click with the right mouse button on selected files; from the FineCrypt submenu choose "Encrypt with password" menu item
20
Enter the passphrase you want to encrypt a file Enter the passphrase you want to encrypt a file
21
Choose Encryption Algorithm & Encryption Mode. In this example, we selected the algorithm 3DES with CFB mode Choose Encryption Algorithm & Encryption Mode. In this example, we selected the algorithm 3DES with CFB mode
22
Then click on Encrypt button and save the file with.fca format. You will get the encrypted file, as shown highlighted Then click on Encrypt button and save the file with.fca format. You will get the encrypted file, as shown highlighted
23
Decryption using Password In order to decrypt a file or folder, click the desired source In order to decrypt a file or folder, click the desired source
24
Click the file you want to decrypt. FineCrypt will ask you for Password. Enter the Password Click the file you want to decrypt. FineCrypt will ask you for Password. Enter the Password
25
By pressing the Ok button you will get the decrypted file By pressing the Ok button you will get the decrypted file
26
Encryption using Key Right Click the file or folder you want to Encrypt. Encrypt the file using “Encrypt with Key…” option Right Click the file or folder you want to Encrypt. Encrypt the file using “Encrypt with Key…” option
27
Click on Settings and then select the algorithm and mode to encrypt the file Click on Settings and then select the algorithm and mode to encrypt the file
28
Click on Password Button and generate the key. Then Save the key, specify name and location for encrypted file and then press Encrypt button Click on Password Button and generate the key. Then Save the key, specify name and location for encrypted file and then press Encrypt button
29
You will get the encrypted file along with the key You will get the encrypted file along with the key
30
Decryption using Key In order to decrypt a file or folder, open the encrypted file and you will get screen above In order to decrypt a file or folder, open the encrypted file and you will get screen above
31
Click the “Read…” button and select the saved key which was used to encrypt the file and then press ok Click the “Read…” button and select the saved key which was used to encrypt the file and then press ok
32
You can see the decrypted file above You can see the decrypted file above
33
Key Manager Interface
34
Checking reliability of FineCrypt's Encryption Comparing the original text and resulting ciphertext, known as "test vectors" Comparing the original text and resulting ciphertext, known as "test vectors" Test vectors - widely published and can find them in the Internet Test vectors - widely published and can find them in the Internet Hexadecimal file editor required for testing Hexadecimal file editor required for testing Download a simple hexadecimal editor "HighLight" @ www.finecrypt.net/mylight22.exe Download a simple hexadecimal editor "HighLight" @ www.finecrypt.net/mylight22.exe www.finecrypt.net/mylight22.exe
35
Testing AES Algorithm with Electronic Codebook Mode Testing AES Algorithm with Electronic Codebook Mode Download the test vectors for AES algorithm from National Institute of Standards and Technology (NIST) Download the test vectors for AES algorithm from National Institute of Standards and Technology (NIST) http://csrc.nist.gov/encryption/aes/rijndae l/rijndael-vals.zip http://csrc.nist.gov/encryption/aes/rijndae l/rijndael-vals.zip http://csrc.nist.gov/encryption/aes/rijndae l/rijndael-vals.zip http://csrc.nist.gov/encryption/aes/rijndae l/rijndael-vals.zip Unzip and open the file "ecb_tbl.txt" Unzip and open the file "ecb_tbl.txt"
36
Create new file in hexadecimal editor Create new file in hexadecimal editor Enter the plaintext exactly as shown in the test vector Enter the plaintext exactly as shown in the test vector
37
Save the file as “aesp” at desired location. Our plaintext is created Save the file as “aesp” at desired location. Our plaintext is created Encrypt “aesp” file using key Encrypt “aesp” file using key Enter the encryption key exactly as shown in the test vector Enter the encryption key exactly as shown in the test vector
38
Select AES with ECB mode Select AES with ECB mode Set “Don’t compress” option on “General” page Set “Don’t compress” option on “General” page Do not change anything in the "initial vector" editor window Do not change anything in the "initial vector" editor window Press the "Encrypt" button and encrypt the file Press the "Encrypt" button and encrypt the file The process is finished The process is finished
39
Now check the ciphertext in the file “aesp” corresponds with NIST’s ciphertext or not Now check the ciphertext in the file “aesp” corresponds with NIST’s ciphertext or not Open the encrypted file in Hex Editor Open the encrypted file in Hex Editor Compare that green text with test vector and make sure they are identical Compare that green text with test vector and make sure they are identical
40
Cracking Encryption
41
Conclusion Information Security is becoming more important after Sept 11, 2001 Information Security is becoming more important after Sept 11, 2001 Encryption products - locks and keys of the Information Age Encryption products - locks and keys of the Information Age FineCrypt - Best freeware Cryptographic tool available on Internet FineCrypt - Best freeware Cryptographic tool available on Internet
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.