FileHashler

Free program that can transfer a file into an encrypted form and then back to cleartext form
Download

FileHashler Ranking & Summary

Advertisement

  • Rating:
  • License:
  • GPL
  • Price:
  • FREE
  • Publisher Name:
  • Wolfgang Keller
  • Publisher web site:
  • Operating Systems:
  • Mac OS X
  • File Size:
  • 201 KB

FileHashler Tags


FileHashler Description

Free program that can transfer a file into an encrypted form and then back to cleartext form FileHashler is a security utility program capable to transfer any single file (up to 2,1 GB) into an encrypted form and back from an encrypted form into the cleartext form.FileHashler protects the contents of the file to be seen by any unauthorized readers.. Authorised access to an encrypted file is checked through a symmetric user keyword or passphrase. "Symmetric" hereby means that you use the same key to encrypt and decrypt the file.Such a key is also named a "secret key". Decryption performs fail-safe; that means the utility authenticates legitimate access by the key value and will not produce any results if access fails to be legitimate.Basically encrypted file and cleartext file are designed to coexist while the utility makes some effort to keep namespaces of both file types separated. There is an option, however, by which the cleartext file can get erased in a safe way after encryption is completed.FileHashler encrypted files store internal information about the original file they keep transformed. This comprises the cleartext file's cataloging information as well as an optional user comment about it. The utility has a "Verify" function which controls data integrity of the encrypted file and shows a printout of the information about the contained cleartext file.Only authenticated access can perform this function. By this it is possible to use FileHashler files as shrowded archive files including an integrity validation functionality. E.g. you may change the filename of encrypted files to meaningless gibberish or misleading names and still are able to obtain the original identity of the file at any time - if you know the access key.By the same method you can at any time make a check whether your archive file is still uncorrupted, in the physical sense.For encryption FileHashler makes use of the TWOFISH algorithm as presented by Bruce Schneier et.al. (http://www.schneier.com/twofish.html). This algorithm is held for one of the leading technologies in combining execution speed and security. It was accepted as one of the fife top candidates for the AES encryption standard in 1999 by the American NIST institute (http://csrc.nist.gov/CryptoToolkit/aes/).The default technical encryption key length is 32 bytes which is the maximum security that can be obtained by this algorithm. By user option this key length can be reduced to 16 bytes, which however lowers the security status of the transformation and therefore is not recommended.The user passphrase is never used directly for the encryption algorithm. It takes it a long and multi-layered path through various program levels until it finally becomes, in a terribly disfigured form, the input of Schneier's encryption machine.An important additional element of security is the application of key modulation based on random data. The effect is that it is impossible to make inferences by the shape of an encrypted file to identify a singular cleartext file. Or in other words, the same cleartext file will result in different encrypted shapes from different encryption processes with the same access key.The drawing of random data is cryptographically optimized so that a deterministic relation between random data and the system time does not exist. To make the confusion of adversary agents perfect, the utility allows to blur the resulting file size by a dimension which the user can determine (see option "+b").A sane cryptographical hash function is at the basis of any reliable encryption service. SHA-256 is used for this purpose here (http://csrc.nist.gov/cryptval/shs.htm). This is a function with a 32 byte hash digest. It was recommended since the common SHA-1 is currently at the verge of becoming outdated and risky (http://www.schneier.com/blog/archives/2005/02/sha1_broken.html).User access keys (or encryption passphrases) require a minimum quality. They must be at least 8 bytes long and possess 6 different characters. If these requirements are not met, the utility will report "bad access key" and terminate undone or repeat the request for user input, depending on the function called.The program has the ability to perform self-tests of the security relevant software modules, such as SHA-256 and Twofish. Ultimately, the target of this feature is to sufficiently control the software code of the program you use and make sure it has not been tampered with or gotten corrupted. Requirements: · Java 1.4.2 or later What's New in This Release: · This first release of FileHashler is regarded of Beta quality and fully functional · except for the "Batch" command which is still pending. The user may · draw a verbose explanatory manual any time directly from the program. · If you just want to use this utility, download the "user" zip. · Developer interests are served with the "devel" file. MD5 of the package files: · fhl-devel-0-1-0.zip : 19c10a55712cdbf6f0fa5f21ffbeef5e · fhl-user-0-1-0.zip : e6f0da70ffa814b46087d7c384167f24


FileHashler Related Software