TigerCrypt 3.2
TigerCrypt is a application to encrypt / decrypt files.
|
TigerCrypt is a application to encrypt / decrypt files. Highest security standards are used, e. g. 256 bit AES. The encrypted data is indistinguishable from random data.
The password used for decryption cannot be verified. Whatever file is used for decryption, and whatever password is used, TigerCrypt always produces an output file. This makes a brute force attack almost impossible.
Open file format, open encryption standard and open source. This makes it possible for any proficient person to verify that no intentional or unintentional security holes or backdoors exist.
Security features
Uses random salt, written as the first 8 bytes to every encrypted file. (new in 3.x)
Uses Bouncycastle provider, which supports the most secure digests and algorithms. By default, SHA-256 is used to generate the key from the password, and 256 bit AES is used for the encryption. (new in 3.x)
Password-erasure in RAM. (new in 3.x)
The encrypted data is indistinguishable from random data. The file format is this: 8 bytes for the (random) salt, then the raw encrypted data as specified in the corresponding algorithm specification.
The password used for decryption cannot be verified. Whatever file is used for decryption, and whatever password is used, TigerCrypt always produces an output file. This makes a brute force attack almost impossible, even more when encrypted files are nested.
Open file format, open encryption standard and open source. This makes it possible for any proficient person to verify that no intentional or unintentional security holes or backdoors exist.
Supported algorithms
256 bit AES (recommended for common purposes)
192 bit AES
128 bit AES
128 bit AES
Twofish (also recommended for common purposes)
DES (not recommended for common purposes)
Triple-DES (slow and not more secure than AES or Twofish)
Requirements
tags
bit aes used for this makes for decryption 256 bit the password recommended for for common encrypted data common purposes file format open source possible for

Download TigerCrypt 3.2
Authors software
TigerCrypt 3.2
kaiwitte.org
TigerCrypt is a application to encrypt / decrypt files.
Similar software
TigerCrypt 3.2
kaiwitte.org
TigerCrypt is a application to encrypt / decrypt files.
BT AES File Encrypt 1.0
Bowers Technologies
BT AES File Encrypt is a utility used to encrypt files with strong AES encryption.
Cix 0.1.1
GlobWare.com
Cix software is a small application that uses a 2048 bit cipher to encrypt/decrypt files.
Encrypt Files 1.5
PowTools
Encrypt Files is free encryption desktop computer software.
Omziff 3.0.9
xtort.net
Omziff is a straightforward encryption utility that uses various cryptographic algorithms to encrypt and decrypt textual files.
CryptoWorks 1.0
Slazetech
CryptoWorks is a useful encryption utility, which allows you to encrypt and decrypt files.
EncryptDecrypt File Utility 1.0
Dragon2Studios
EncryptDecrypt File Utility is a simple application to encrypt and decrypt a file.
Scramit 1.33
Scramit Software
Encrypt and Decrypt files using a small Drag and Drop Window that encrypt files
Encrypt and Decrypt files using a small Drag and Drop Window that can sit on top of your applications or it can be minimised and retreived when convenient.
EncryptOnClick 1.1.4.0
2BrightSparks Pte Ltd
EncryptOnClick is an application that lets you securely encrypt and decrypt files.
SACrypt 1.0
Smaller Animals Software
SACrypt is an Explorer context menu extension that allows you encrypt (and then decrypt) files from within Explorer (or any standard file browsing window).
Other software in this category
VisualICE Report Utility 4.7
Visualize Software
VisualICE Report Utility - so what do you do if you would like to know more about what the hacker tried to do, who he is, where he`s from or how to report him to the proper authorities?
That`s where VisualICE Report Utility comes in.
Gopher Smoker .06
PivX Sollutions, LLC
PivX Solutions, LLC released a program appropriately named `Gopher Smoker`.
Bouncer for Windows 1.0 RC6
Chris Mason
Bouncer is a network tool which allows you to bypass proxy restrictions and obtain outside connections from an internal LAN.
Slap 1.2.2.0
Security Software
If your like me you run firewall software that tells you when someone tries to access your system.
VisualZone Report Utility 5.7
Visualize Software
VisualZone Report Utility is a report utility and an intrusion analyser for ZoneAlarm and ZoneAlarm Pro.