Win a copy of Secure Financial Transactions with Ansible, Terraform, and OpenSCAP this week in the Cloud/Virtualization forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Ron McLeod
  • Paul Clapham
  • Jeanne Boyarsky
  • Bear Bibeault
Sheriffs:
  • Rob Spoor
  • Henry Wong
  • Liutauras Vilda
Saloon Keepers:
  • Tim Moores
  • Carey Brown
  • Stephan van Hulst
  • Tim Holloway
  • Piet Souris
Bartenders:
  • Frits Walraven
  • Himai Minh
  • Jj Roberts

TigerCrypt: free, most secure file encryption software

 
Ranch Hand
Posts: 356
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
TigerCrypt 3.2 has been released. For many common situations it is the most secure file encryption software.
direct Java WebStart link

Security features include:
  • Uses random salt, written as the first 8 bytes to every encrypted file. (new in 3.x)
  • Uses Bouncycastle provider, which supports the most secure digests and algorithms. By default, SHA-256 is used to generate the key from the password, and 256 bit AES is used for the encryption. (new in 3.x)
  • Password-erasure in RAM. (new in 3.x)
  • The encrypted data is indistinguishable from random data. The file format is this: 8 bytes for the (random) salt, then the raw encrypted data as specified in the corresponding algorithm specification.
  • The password used for decryption cannot be verified. Whatever file is used for decryption, and whatever password is used, TigerCrypt always produces an output file. This makes a brute force attack almost impossible, even more when encrypted files are nested.
  • Open file format, open encryption standard and open source. This makes it possible for any proficient person to verify that no intentional or unintentional security holes or backdoors exist.


  • It is also possible to play an encrypted media file (for example from DVD or CD) directly without decrypting it to persistent storage.

    TigerCrypt website
    launch TigerCrypt with Java WebStart

    Kai Witte
    [ January 11, 2007: Message edited by: Kai Witte ]
     
    Getting married means "We're in love, so let's tell the police!" - and invite this tiny ad to the wedding:
    SKIP - a book about connecting industrious people with elderly land owners
    https://coderanch.com/t/skip-book
    reply
      Bookmark Topic Watch Topic
    • New Topic