The Cipher 4.0

... is designed to encrypt and decrypt files. Features: Encryption and decryption of files using GOST, Blowfish, IDEA, ... Cast256, RC2, RC5, RC6, DES, TEA on password; Encryption and decryption of files using CHR, and BIT ... the file-key; Select one or more methods of encryption; Creation of a separate encrypted file with the extension .Cip; Editor secret message; Total removal of the source file. ...

Author Perun, Ltd
License Free To Try
Price $9.00
Released 2010-02-17
Downloads 345
Filesize 3.19 MB
Requirements Windows, Linux
Installation Install and Uninstall
Keywords cypher, file, directory, encrypt, decrypt
Users' rating
(3 rating)
The CipherEncryption ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7 x32, Windows 7 x64, Win2000, Linux
The Cipher secret key encryption - Download Notice

Using The Cipher Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of The Cipher on rapidshare.com, depositfiles.com, megaupload.com etc. All The Cipher download links are direct The Cipher full download from publisher site or their selected mirrors.
Avoid: secret key encryption oem software, old version, warez, serial, torrent, The Cipher keygen, crack.
Consider: The Cipher full version, secret key encryption full download, premium download, licensed copy.

The Cipher secret key encryption - The Latest User Reviews

Most popular Encryption Tools downloads

abylon SHAREDDRIVE

23.60.1 download

... Explorer on the desktop level and protect your secret files. The complete integration into the Explorer environment simplify using of the software. The encryption and decryption with the e.g. AES algorithm is ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, ... clutter your screen. It also uses military grade encryption for protecting your private files. Program includes 17(!) ...

ArmorTools Home x64

24.12.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...

PrimaSoft Encryption - Service Edition

1.0 download

Service Process: You can run scheduled auto-recurring encryption and decryption sessions as a service process. Encryption Scheduler: PrimaSoft Encryption utility comes with flexible scheduler. You can schedule auto recurring encryption sessions for any future date and time. Encryption ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, ... clutter your screen. It also uses military grade encryption for protecting your private files. Program includes 17(!) ...

Strong File Encryption Decryption

1.0 download

PrimaSoft Strong File Encryption and Decryption utility is a Windows software that ... your computer using the latest industry standard strong encryption algorithms: AES (US Advanced Encryption Standard, secret-key encryption also known as Rijndael), Twofish ...

XorIt

1.9 download

... theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this ... used to be considered that a 56 bit key was unbreakable to brute force attacks, but the ...

5 award

abylon BASIC

23.60.1 download

... But the encrypting of diaries, pictures or other secret documents with the AES- or Blowfish-Algorithm is relatively simple. With the help of the Easy Encryption Technologie (EEnTe) only few steps are necessary to ...

CryptIt

1.4 download

... of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method ... used to be considered that a 56 bit key was unbreakable to brute force attacks, but the ...

ArmorTools

24.12.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret and private information. File-based virtual disks are designed ... your own or use any file as a key to encryption. For example, when sending secret information ...