We are living in the information age.
Data transmissions are vital and became a necessity nowadays. Whether you exchange private messages
, or business / commercial secrets
, you must protect your confidential information from hackers, your boss, or secret services using cryptography software
. Why use cryptographic software ?
We live in an insecure world where unwanted persons can access your personal information ( like e-mails or personal desktop documents ) and often use it against you.
Encryption pre-dates the Internet by thousands of years. Going back in time, Julius Caesar was an early user of cryptography. He sent messages to his troops using a secret code: a letter in the alphabet was replaced by one say 5 positions to the right. So, an "A
" became an "E
" became "F
" and so on. For example the word RETURN
would become VJYZVS
. The downside of this practice, this cipher can be easily broken by either figuring out a pattern, by brute force or by getting ones hands on a plaintext and ciphertext combination to deduce the pattern.
Encryption is the translation of data into a secret code. To read an encrypted file, you must know the correct password (also called key) that allows you to decrypt it. Encryption is based on encryption algorithms - a process capable of translating data into a secret code.
Invisible Secrets 4 uses strong cryptography: AES-Rijndael, Blowfish, Twofish, RC4 (RC4 is a registered trademark of RSA Data Securities Inc.), Cast128, GOST, Diamond 2, Sapphire 2.
Invisible Secrets 4 - Cryptography software is shell integrated (available from Windows Explorer), so the encryption operations are easier than ever.