TigerCrypt 3.2

TigerCrypt 3.2 Screenshot TigerCrypt is a application to encrypt / decrypt files.

Developer:   kaiwitte.org
      software by kaiwitte.org →
Price:  0.00
License:   Freeware
File size:   0K
Language:   
OS:   Windows Vista (?)
Rating:   0 /5 (0 votes)

TigerCrypt is a application to encrypt / decrypt files. Highest security standards are used, e. g. 256 bit AES. The encrypted data is indistinguishable from random data.

The password used for decryption cannot be verified. Whatever file is used for decryption, and whatever password is used, TigerCrypt always produces an output file. This makes a brute force attack almost impossible.

Open file format, open encryption standard and open source. This makes it possible for any proficient person to verify that no intentional or unintentional security holes or backdoors exist.

Security features
Uses random salt, written as the first 8 bytes to every encrypted file. (new in 3.x)
Uses Bouncycastle provider, which supports the most secure digests and algorithms. By default, SHA-256 is used to generate the key from the password, and 256 bit AES is used for the encryption. (new in 3.x)
Password-erasure in RAM. (new in 3.x)
The encrypted data is indistinguishable from random data. The file format is this: 8 bytes for the (random) salt, then the raw encrypted data as specified in the corresponding algorithm specification.
The password used for decryption cannot be verified. Whatever file is used for decryption, and whatever password is used, TigerCrypt always produces an output file. This makes a brute force attack almost impossible, even more when encrypted files are nested.

Open file format, open encryption standard and open source. This makes it possible for any proficient person to verify that no intentional or unintentional security holes or backdoors exist.

Supported algorithms
256 bit AES (recommended for common purposes)
192 bit AES
128 bit AES
128 bit AES
Twofish (also recommended for common purposes)
DES (not recommended for common purposes)
Triple-DES (slow and not more secure than AES or Twofish)

Requirements
  • Java VM (will run on all common systems)

    tags bit aes  used for  this makes  for decryption  256 bit  the password  recommended for  for common  encrypted data  common purposes  file format  open source  possible for  

    TigerCrypt 3.2 screenshot


    Download TigerCrypt 3.2

     Download TigerCrypt 3.2


    Authors software

    TigerCrypt 3.2 TigerCrypt 3.2
    kaiwitte.org

    TigerCrypt is a application to encrypt / decrypt files.

    Similar software

    TigerCrypt 3.2 TigerCrypt 3.2
    kaiwitte.org

    TigerCrypt is a application to encrypt / decrypt files.

    CommuniCrypt File Encryption Tools 1.01 CommuniCrypt File Encryption Tools 1.01
    CommuniCrypt Software

    File encryption/decryption tools with strongest RSA/AES algorithms.

    TrueCrypt 5.0a TrueCrypt 5.0a
    TrueCrypt Foundation

    Free open-source disk encryption for Windows XP/2/2003.

    SACrypt 1.0 SACrypt 1.0
    Smaller Animals Software

    SACrypt is an Explorer context menu extension that allows you encrypt (and then decrypt) files from within Explorer (or any standard file browsing window).

    Amelix File Cryptor Lite 1.0 Amelix File Cryptor Lite 1.0
    Amelix.com

    Amelix FCL allows for the easy decryption and encryption of all your private files.

    Crypto-Lock 2.02 Crypto-Lock 2.02
    RTSoftware

    Crypto-Lock is a program that will encrypt your files.

    CryptoMailer Reader 4.08 CryptoMailer Reader 4.08
    Sistech SA

    CryptoMailer was developed to be the fastest and the simplest encryption application on the market.

    Crypditor 1.21 Crypditor 1.21
    ProtectCom GmbH

    Cypditor is a text editor to save data with a high-secure encryption algorithm (AES).

    Encrypt Files 1.5 Encrypt Files 1.5
    PowTools

    Encrypt Files is free encryption desktop computer software.

    BCArchive 2.06.4 BCArchive 2.06.4
    Jetico, Inc.

    BCArchive software you may encrypt and compress a group of files/folders to an encrypted archive (i.

    Other software in this category

    VisualICE Report Utility 4.7 VisualICE Report Utility 4.7
    Visualize Software

    VisualICE Report Utility - so what do you do if you would like to know more about what the hacker tried to do, who he is, where he`s from or how to report him to the proper authorities? That`s where VisualICE Report Utility comes in.

    Gopher Smoker .06 Gopher Smoker .06
    PivX Sollutions, LLC

    PivX Solutions, LLC released a program appropriately named `Gopher Smoker`.

    Bouncer for Windows 1.0 RC6 Bouncer for Windows 1.0 RC6
    Chris Mason

    Bouncer is a network tool which allows you to bypass proxy restrictions and obtain outside connections from an internal LAN.

    Slap 1.2.2.0 Slap 1.2.2.0
    Security Software

    If your like me you run firewall software that tells you when someone tries to access your system.

    VisualZone Report Utility 5.7 VisualZone Report Utility 5.7
    Visualize Software

    VisualZone Report Utility is a report utility and an intrusion analyser for ZoneAlarm and ZoneAlarm Pro.