AES-256 STRONG Encryption

This program will securely encrypt and decrypt data.
Download

AES-256 STRONG Encryption Ranking & Summary

Advertisement

  • Rating:
  • License:
  • Freeware
  • Publisher Name:
  • Alexei Korennykh
  • Publisher web site:
  • Operating Systems:
  • Windows All
  • File Size:
  • 104 KB

AES-256 STRONG Encryption Tags


AES-256 STRONG Encryption Description

This program will securely Encrypt and Decrypt data. Most importantly, its True Input Shield eliminates the weakest Link in securing the data - the password entry point. By using lookup tables proposed by Florencio and Herley, it is possible to exclude password stealing possibility altogether. The built-in proxy emulation described in the above paper ensures that the data can be accessed without revealing the password, even on a computer that is known to run malware and hardware designed to steal the password during communication between the user and the program. Such programs can Extract passwords as plain text in minutes without much computation. If this happens to encrypted data, it no longer matters how "unbreakable" the encryption Algorithm was. Therefore, password entry rather than the encryption algorithm is most often the weakest link in data security. The most common methods of password entry and their issues: Hardware keyboar Keystrokes are easily intercepted by software or hardware keyloggers. Virtual on-screen keyboard. Some of them send the same keystrokes as hardware keyboards and do not additional security.Others are compromised by keyloggers that take screen shots of area near cursor. screen key is photographed when pressed and send to an attacker. Pasting from clipboard. Clipboard content can be read by many malware. Drag-dropping the password from source text in a whole, or Letter By Letter. Can be compromised by keyloggers that intercept DragDrop events. Shuffled key entry. (Type letter in password box, switch to MS-Word or other place, type bogus text, switch to password box, type password letter; repeat). Simple keyloggers will see single text string with no password apparent. Advanced keyloggers will record switching between different text boxes and restore password instantly


AES-256 STRONG Encryption Related Software