Search

2016-10-25

Pharaoh. English

Text and files encryption.

Features:
 - AES-128 and AES-256
 - Up to 3 encryption levels
 - Ability to select vectors of encryption
 - The keys (passwords) are not saved nowhere and not transmitted over the network of any kind
 - There is a version for Android
 - Supplement for verify the files identity (checksum)
 - Supplement for reliable file deletion
 - Languages: English, Russian
 - Compatibility of versions for mobile platforms and computers
 - Tutorial. Have versions with images

Key (password) have only those who encrypt data and those who decrypt them
So without knowing keys parameters, data is almost impossible to decrypt

By "almost impossible" is mean the following (for 128-bit key):
1) Possible one key combination: 3.4x10^38
2) Time required to find key: 1.02x10^18 years
For example, if we take a trillion machines, each of which is capable of processing a billion combinations per second, it will require 2 billion years to find the key
And this is only for one level of encryption

!ATTENTION!
Accordingly, if you forget AT LEAST ONE encryption parameter, data will be lost
Program DOES NOT SAVE keys (passwords) and DOES NOT REMEMBER selected vectors!

Necessary information about key length (128-bit/256-bit), vectors and about interaction with other applications is in application Help
Before using read the section "Summary", ibid

In sum, were conducted more than 1000 tests:
  - of applications for mobile platforms
  - of applications for computers
  - application compatibility

Detailed information about all existing versions

In occasion of that the application does not store keys (passwords) and the selected vectors
Yes! This is inconvenient
BUT! The probability that the third party will know the passwords, reduced
Even if your phone gets into someone's hands, decrypting the data will not help them, because the passwords has only owner of device

You asking: Three encryption levels. Why?
Paranoia will respond: Well, even if we assume that AES has long been "hacked" and we do not know about it, then encrypted data, and encrypted data again, and then again encrypted data will probably be more difficult decrypt.