Some information is best kept secret no matter whether it’s about your private life or business sensitive data. Now that we’re living in the future, much of that information is stored in computers. One of the ways to keep things secret in a computer is to use cryptography. Kruptos 2 Professional is one way to use Encryption to keep your data safe and this post explains how to encrypt files using Kruptos.
Getting and Starting Kruptos
Kruptos 2 Professional, now in its seventh version, is made by Kruptos 2 Software company. A trial version of the program can be downloaded at the free trial page. It downloads and installs like any other Windows application and your installation should be very smooth without any problem.
Upon running Kruptos for the first time, the program will display a message detailing the conditions of the trial. In short, until the user purchases a license, the program will have full functionality for thirty uses. After that, only decrypting of files will be allowed.
Click the “Continue Trial” button at the lower right of the window to bring up the application proper. Notice the Visa icon at the upper right side of the window, reminding the user to upgrade to the full version. A bit tacky, but convenient for those who get sold on the program.
To encrypt a file, drag it to the project pane. That’s the main area in white in the above picture. You can drag the file from the explorer pane to the left, or from another window or the desktop. You can drag several files at once by shift-clicking or control-clicking. When you’ve put all of the desired files in the project pane. Click on the “Encrypt” icon as outlined in the picture below.
You’ll be asked to give and confirm a password. Since Kruptos is a desktop application, it provides an option to show the password as you type it rather than as a string of asterisks.
Historical Note: Ever wonder why passwords are echoed on the screen as dots or asterisks? Back in ye olden days, no one had personal computers. To use a computer, one had to go to The Computer Room. This was a public or semi-public room holding row upon row of computers or ASCII terminals (a terminal was a computer, a keyboard, a screen, and a modem, minus the computer). There were no partitions to provide privacy. Thus, computer-crackers could steal login credentials by shoulder-surfing. Except for Internet kiosks, this isn’t as much of a concern as it used to be.
Back to work.
Click on the “Encrypt” button at the bottom of the password dialog box and Kruptos will encrypt the selected files.
Encryption completed.
The encrypted file will have an icon that looks like this:
Files that have been encrypted by Kruptos have this icon.
How to Decrypt Files
Decrypting is the reverse of encrypting. Cryptologists (those are the math nerds who make this work) call this restoring the plaintext. The plaintext is the original unencrypted file. To do this with Kruptos, drag the encrypted file to the project pane and click on the “Decrypt” button that’s to the right of the “Encrypt” button. You’ll be prompted for the password.
Enter the password which you chose earlier to get your old file back.
Sometimes, the best way to keep a secret is to get rid of the secret. That means coming to your senses and deleting the directory where you’ve kept your erotic Star Trek/Harry Potter crossover fan fiction. The problem is that it’s possible for someone to “undelete” that directory so that the whole world can laugh at your poor sense and worse taste.
Files are stored on hard disk drives. Accessing hard drives involves moving a physical drive head over a physical platter. In computer terms, that is achingly slow. In order to make hard drives usable, operating system developers have to resort to shortcuts.
One of those shortcuts is to cheat on file deletion. When you delete a file, the file system marks the respective tracks on the hard drive as available for use. If those tracks have not yet been used, then it’s possible for your worst enemy to grab your computer and use an “undelete” utility to retrieve your literary crimes and bring shame on your household.
Securely deleting files (or “shredding” them) requires going over those tracks on the hard drive platter and overwriting them with either zeroes or with random noise. To do this in Kruptos, drag the file you want to shred to the project pane, as in the examples for encrypting and decrypting. Then click on the “Shred” button as shown. The slider next to the button controls how many passes the drive head will make over the platter (the maximum is sixteen). The more passes, the more secure the shredding purportedly is.
Important Note: With modern hard drives, one pass suffices. Extra passes don’t add extra security and they need more time to complete.
Click the button to permanently delete files.
Remember that, of its nature, shredding is irrevocable. If an undelete utility could retrieve the file, then shredding would be useless.
Think twice.
Kruptos in Right-Click Context Menu
In addition to the main Kruptos interface, the installation process also adds items to the desktop right-click menu. This menu allows quick access to Kruptos’ main features without having to go through the trouble of finding the application icon.
Right-click in Windows Explorer to get this menu.
Those of a technical bent may wonder what algorithm Kruptos uses. So Kruptos uses Bruce Schneier’s Blowfish algorithm with a cipher strength of 256 bits. That’s nice to know, especially since Schneier is a well-regarded expert on computer security. To bring up the actual help system, click on the “View Help” button at the bottom of that window.
Now you got some idea how to encrypt file using Kruptos encryption software. Aside from its main purpose of securing information Kruptos also has ancillary functions, such as making self-extracting archive files, sending encrypted emails, integration to all popular cloud folder providers, filename encryption, secure notes storage and creating Zip archives.
Kruptos 2 Encryption software is as also cross-platform compatible includes Windows, Mac OS and Android as well USB version. Having one more program on your computer that does those things shouldn’t be such a burden but this little program makes your life ease by protecting all your sensitive data.
As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it’s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.