Why another file encryption?There are many fantastic tools out there, both free and commercial. We tried most of them, but none fit our exact requirements for: •portability (no installation, no registration codes, no activation)•fair play and privacy (no backdoors, and you don’t know who really has access to your data in Cloud) •small size, single exe file, no drivers, no special permissions, no dependencies on .Net, no dependencies on third party crypto libraries etc...•filename encryption (many tools will just add an extension to the encrypted file, but keep its name plainly readable), •easy view and search the original names in Explorer-Like interface while still being encrypted to the outside world, •simple access to individual encrypted files (not large volume archive like TrueCrypt which makes quick copying or archiving difficult), •ability to work with a backup software or Cloud (individual files are easy to backup, copy and use instead of big archives) etc.. •recovery record embedded in the files itself to help with transition or disk errors. Many encryption tools ignore this crucial part for archiving. (available in the full version)•trace-less image and text viewer and editor (available in the full version)Many of the existing security tools have few of these features but not all of them. How secure is the Encryption?CrypTEA uses Multi-layered encryption schemes (two industrial strength 128-bit ciphers are being used at the same time) in a block chaining mode with high quality random IV generator. The passwords are not stored in the encrypted file nor they could be extracted from the data itself.The CrypTEA encrypted files will look like a random noise when observed in a binary editor, the files do not have any header or any single recognizable block. If you encrypt two exact copies of the same file with the same password, both of the encrypted files will be 100% different from each other. As with any modern cryptography, your password is the single weakest point. Does your software include any backdoors, “ad-ware” or other unwanted things?Absolutely not. This is a tool that was developed for our own use and one of the reason for making our own encryption tool was that we can guarantee there are no hidden things.On how many computers can I install/copy the full version?The full version is sold as Household License, which means you are free to use it on each and every of your household computers without limitation. There is also no activation or registration code (after registration you get an access link and password to download the full version) This simplifies the process and keeps the application fully portable as you don’t have to worry about remembering registration codes etc.Why the file is not digitally signed?You must have older version, all files are now digitally signed. This assures the file has not been compromised by viruses or malware.Can the Password be Recovered if lost?No it cannot. The password is not stored anywhere and there is no know mechanism to decrypt the files without password. So if you lose your password, that’s it. You have a cool collection of files with a random noise. What is the difference between the full and free version?The difference table is on the Overview page. The full version includes Secure text and image viewers, recovery record etc...What is Secure Text editor and Secure Image preview? (Full Version)The CrypTEA full version has build-in internal secure text editor and image viewers for most common formats, including animated gifs. While using windows image preview or text editor require the file to be decrypted somewhere first (an obvious security risk), the internal editor and viewer works directly on the encrypted file in the memory. No traces of decrypted files are stored on the host computer. Additionally the internal text editor can save changes back to encrypted file - so it is ideal for keeping quick notes such as web site passwords, credit card numbers etc...How does the recovery record works? (Full Version)An optional recovery record block can be attached to each of the encrypted file. If the file gets partially damaged because of the transmission or disk error there is a good chance the file can be restored back to the original encrypted state. This has little overhead as the recovery is set to be less than 1% of encrypted data. This is usually enough to fight most probable file failures that spans across few disc sectors.Including recovery record has no security risks because it is generated from the ENCRYPTED data. That means a damaged encrypted file can be recovered only into encrypted file. Should I use recovery record on all files? (Full Version)You should recovery record mostly on encrypted files that could not be easily replaced if damaged. For example there is not much need to add recovery record on encrypted files if an easy access to their backup exist (source code with regular backup, images with existing backup etc). On the other hand if the encrypted files are used as the backup itself, it would be wise to put a recovery files which will increase the chance of successful recovery if the drive fails.Are the encrypted files compatible between free and full versionYes, you can encrypt in one and decrypt in the other and vice versa.Copying Encrypted folders/files to the media (USB, NAS, Cloud) Because the file names are encrypted as well, it is not easy to determine which file or folder is which in Windows Explorer. In CrypTEA Explorer, enter your password in the Tools->Enter Password and you will be able to see the readable file names. A. You can now drag and drop the files from the list to the Windows ExplorerB. Right click on any folder (in the tree or in the list) and select Copy. Then in your Windows Explorer navigate to the destination, right click and select Paste. Note: With both methods only the encrypted files will be copied (the copy operations will not decrypt them) Also the software has been specifically designed to be able to encrypt/decrypt files on the NAS or USB media directly.What is the Integrity TestThis is mostly used during development, but can be used by users to make sure that the encryption/decryption scheme works. Simply open any folder in the CrypTEA Explorer and use the Integrity Test. One-by-one a copy of all the files in the folder and sub-folders will be encrypted, then decrypted and the decrypted file will be bit-by-bit compared with the original. Obviously the files should be the same. If not then the software would be worthless. We run it through gigabytes of data and it is safe function as it never changes the original data.Is there a limit for a single file size?The CrypTEA was developed to handle hundreds of thousands of small files - such as our development code for storage and archival on NAS and Cloud where we can easily and quickly decrypt any part. There is a 4GB hard limit for a single file in the CrypTEA because it doesn’t make much sense to encrypt such huge single chunks of data. CrypTEA will simply skip any file that is > 4GB. This is only a set limitation to avoid accidentally encrypting TrueCrypt, ISO and other large backup archives that may be on discs.What is the difference between CrypTEA file/folder encryption and volume encryption such as TrueCrypt or BitLockerOne of the reason to create CrypTEA was actually the fact that we were using TrueCrypt before for traveling and while it is an excellent tool of its own it become very cumbersome. With our source code archive it was just too easy to create 20GB TrueCrypt volume and that become simply impossible to copy, transfer, backup or to do anything “portable” with it. The goal of CrypTEA is to have immediate random access to thousands of encrypted files and folders and assure their easy portability and backup. For example you can copy or move only some of the CrypTEA encrypted files and folders elsewhere, including the USB memory, SD card, NAT drives or Cloud (and they still stay encrypted). On the other hand a virtual file/volume encryption such as TrueCrypt or BitLocker creates one very large file volume which makes them non-portable and non-archival from the practical point of view (they span into multiples of GB) and mostly impossible or impractical to use in the Cloud.Simple Versioning and Static namesCrypTEA was developed initially for in-place encryption. You can use it for backup encryption where you have few options. By default each time you encrypt files they will be generated with different randomized encrypted file name. This together with the Keep file date attributes (full version) can work as a quick and simple versioning backup - that means you can keep adding new encrypted versions of the same file to the backup folder and they will not overwrite the old ones. Keep file date will allow to differentiate between the versions.This may be not necessary be what you want and for this reason an option to set the Random Filenames to OFF was added. The files will be then always generated with the same encrypted file name, thus allowing you to replace the old encrypted files with the new ones. Note: There is no actual relationship between encrypted file names and the password used to encrypt the content of the file
Sign up to receive Mediachance newsletter featuring new announcements and special offers. No SPAM.
Free version is for personal use only
After buying the license you will receive the link and a pass code to download the unrestricted FULL CrypTEA application. The full version works without any need to enter registration code so it remains fully portable. It is licensed for the whole household - as many computers as you have.
Site license will allow an organization to use CrypTEA on all and every computers within their organization. It is a worldwide license - that means it is not restricted to a single company location.
Vista, Win 7, Win 8, Win 10
Subscribe to stay notified about new releases, discount offers and get instantly 10% off your first order!