Nhà phát triển: | Gatelink Ltd (10) | ||
Giá bán: | * $2.49 | ||
Xếp hạng: | 5 (1) | ||
Đánh giá: | 5 (1) Viết đánh giá | ||
Danh sách: | 0 + 0 | ||
Điểm: | 0 + 3 ¡ | ||
Điểm + 1 |
Mô tả
File Protect System (version FPS-II se) is a specialized, hybrid application for managing the life cycle of critical information that is stored on local or server data devices.
The application allows the following actions:
• Encrypt or decrypt selected files and folders;
• Management of the cryptographic primitives used;
• Storing the used primitives in secure electronic notebooks;
• Management of delta cryptographic primitives (implicit security primitives, ISP);
• Formation of session secret keys based on randomly selected delta primitives (CDP encryption);
• Recording the critical information in implicit security form.
• Management of digital certificates (generation, export, signing, etc.);
• Secure electronic notebooks for storing digital certificates and secret keys;
• Management of cryptographic processes for file packages;
• Design and implementation of meta scenarios for the protection of digital data;
• Real-time processes control;
• Automatic formation of official reports;
• Management of the processes related to the destruction of critical information, etc.
FIELD OF APPLICATION
Protecting large arrays of files located on different media is a complex and difficult process to perform.
Procedures related to the storage, editing, transfer, and destruction of files are of utmost importance to ensure compliance with security protocols during the exploitation cycle.
Statistics show that most unauthorized access attempts aim at the critical information in specific files, including the authentication certificates used.
FPS enables the maximum reduction of risks by using a set of highly effective professional solutions to protect both specific groups of files and any information located on data storage devices
The application uses some of the most effective standard encryption algorithms used by government organizations and corporate structures.
The module for the formation of service reports makes the application an indispensable tool when building cyber security systems that meet the requirements of ISO - ISO/IEC 27001 and ISO - ISO/IEC 27002.
The development process used both standard algorithms described in NIST SP 800-88 and NIST SP 800-90A, which include Hash DRBG (based on a hash function), HMAC DRBG (based on HMAC), and CTR DRBG (based on block ciphers in counter mode), as well as some specific solutions used in the technology BS 1443, BS 7122, etc.
TECHNOLOGICAL SOLUTIONS
The correct choice of algorithms and software technologies for digital data encryption is a guarantee of the high efficiency and reliability of the application.
The application uses a set of standard and modified algorithms for encrypting mechanisms.
The following standard algorithms are used in the base versions:
STANDARD ENCRYPTION ALGORITHMS
(basic technologies)
• Blowfish
• CAST-128 [ CAST-5 ]
• CAST-256 [ CAST-6 ]
• Data Encryption Standard [ DES ]
• Triple DES [ 3DES ]
• Information Concealment Engine [ ICE ]
• Thin-ICE [Information Concealment Engine]
• Information Concealment Engine 2 [ ICE-2 ]
• IDEA [ PGP ]
• MARS
• MISTY1 [ MISTY-1 ]
• Ron’s Code or Rivest’s Cipher 2 [ RC-2 ]
• Ron’s Code or Rivest’s Cipher 4 [ RC-4 ]
• Ron’s Code or Rivest’s Cipher 5 [ RC-5 ]
• Ron’s Code or Rivest’s Cipher 6 [ RC-6 ]
• Advanced Encryption Standard [ AES, Rijndael ]
• Serpent
• Tiny Encryption Algorithm [ TEA ]
• Twofish
AFFORDABLE HASH FUNCTIONS
(basic technologies)
• Haval [ 256 Bit, 5 passes ]
• Message Digest 4 [ MD-4 ]
• Message Digest 5 [ MD-5 ]
• RIPEMD-128
• RIPEMD-160
• Secure Hash Algorithm 1 [ SHA-1 ]
• SHA-256 [ SHA-2 family ]
• SHA-384 [ SHA-2 family ]
• SHA-512 [ SHA-2 family ]
• Tiger
STANDARD ENCRYPTION MODES
(basic technologies)
• CBC (Cipher Block Chaining)
• CFB (Cipher Feedback)
• CFB8 (Cipher Feedback 8)
• CTR (Counter Mode )
• OFB (Output Feedback Mode)
The available hybrid solutions for the non-special purpose versions are as follows:
SPECIAL ALGORITHMS
(hybrid technology)
• BS Standard Protection Mode (SPM) - Crypto-mechanisms are generated by using specialized control panels. Each of these crypto mechanisms uses a set of cryptographic primitives that can be session-based or stored in highly secure digital containers.
BS Package Protection Mode (PPM) - The crypto mechanisms used are common to each of the files, information about which is contained in the file package. In case of need, individual elements of the crypto mechanisms can be hardware dependent or be tied to the use of control strings.
• BS Hybrid Protection Mode (HPM) - In this case, each of the files in the package is encrypted using a session crypto mechanism, which is formed based on the information in the electronic notebook and the specialized areas in the control strings. In addition, individual elements of the meta-information about the files and folders stored in the package are used.
ACCORDANCE WITH ACCEPTED STANDARDS:
• ISO 10116: Information Processing - Modes of Operation for an n-bit block cipher algorithm.
• ISO 9797: Data cryptographic techniques - Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.
• ISO 9798-2: Information technology - Security techniques - Entity authentication mechanisms - Part 2: Entity authentication using symmetric techniques.
• ISO 10118-2: Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher algorithm.
• ISO 11770-2: Information technology - Security techniques - Key management - Part 2: Key management mechanisms using symmetric techniques.
• FIPS 140 - Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, May 25, 2001
(including Change Notices as of December 3, 2002).
• FIPS 180 - Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard (SHS), March 2012.
• FIPS 197 - Federal Information Processing Standard (FIPS) 197, Advanced Encryption Standard (AES), November 2001.
• FIPS 198 - Federal Information Processing Standard (FIPS) 198-1, The Keyed-Hash Message Authentication Code (HMAC), July 2008.
• SP 800-38D - National Institute of Standards and Technology Special Publication (SP) 800-38D, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, November 2007.
• SP 800-57 - NIST Special Publication (SP) 800-57 Part 1 Revision 3, Recommendation for Key Management - Part 1: General, July 2012.
• SP 800-90B - NIST Special Publication (SP) 800-90B (Draft), Recommendation for the Entropy Sources Used for Random Bit Generation, August 2012.
• SP 800-90C - NIST Special Publication (SP) 800-90C (Draft), Recommendation for Random Bit Generator (RBG) Constructions, August 2012.
• SP 800-107 - NIST Special Publication (SP) 800-107 Revision 1, Recommendation for Applications Using Approved Hash Algorithms, August 2012 etc.
Thêm ↓ The application allows the following actions:
• Encrypt or decrypt selected files and folders;
• Management of the cryptographic primitives used;
• Storing the used primitives in secure electronic notebooks;
• Management of delta cryptographic primitives (implicit security primitives, ISP);
• Formation of session secret keys based on randomly selected delta primitives (CDP encryption);
• Recording the critical information in implicit security form.
• Management of digital certificates (generation, export, signing, etc.);
• Secure electronic notebooks for storing digital certificates and secret keys;
• Management of cryptographic processes for file packages;
• Design and implementation of meta scenarios for the protection of digital data;
• Real-time processes control;
• Automatic formation of official reports;
• Management of the processes related to the destruction of critical information, etc.
FIELD OF APPLICATION
Protecting large arrays of files located on different media is a complex and difficult process to perform.
Procedures related to the storage, editing, transfer, and destruction of files are of utmost importance to ensure compliance with security protocols during the exploitation cycle.
Statistics show that most unauthorized access attempts aim at the critical information in specific files, including the authentication certificates used.
FPS enables the maximum reduction of risks by using a set of highly effective professional solutions to protect both specific groups of files and any information located on data storage devices
The application uses some of the most effective standard encryption algorithms used by government organizations and corporate structures.
The module for the formation of service reports makes the application an indispensable tool when building cyber security systems that meet the requirements of ISO - ISO/IEC 27001 and ISO - ISO/IEC 27002.
The development process used both standard algorithms described in NIST SP 800-88 and NIST SP 800-90A, which include Hash DRBG (based on a hash function), HMAC DRBG (based on HMAC), and CTR DRBG (based on block ciphers in counter mode), as well as some specific solutions used in the technology BS 1443, BS 7122, etc.
TECHNOLOGICAL SOLUTIONS
The correct choice of algorithms and software technologies for digital data encryption is a guarantee of the high efficiency and reliability of the application.
The application uses a set of standard and modified algorithms for encrypting mechanisms.
The following standard algorithms are used in the base versions:
STANDARD ENCRYPTION ALGORITHMS
(basic technologies)
• Blowfish
• CAST-128 [ CAST-5 ]
• CAST-256 [ CAST-6 ]
• Data Encryption Standard [ DES ]
• Triple DES [ 3DES ]
• Information Concealment Engine [ ICE ]
• Thin-ICE [Information Concealment Engine]
• Information Concealment Engine 2 [ ICE-2 ]
• IDEA [ PGP ]
• MARS
• MISTY1 [ MISTY-1 ]
• Ron’s Code or Rivest’s Cipher 2 [ RC-2 ]
• Ron’s Code or Rivest’s Cipher 4 [ RC-4 ]
• Ron’s Code or Rivest’s Cipher 5 [ RC-5 ]
• Ron’s Code or Rivest’s Cipher 6 [ RC-6 ]
• Advanced Encryption Standard [ AES, Rijndael ]
• Serpent
• Tiny Encryption Algorithm [ TEA ]
• Twofish
AFFORDABLE HASH FUNCTIONS
(basic technologies)
• Haval [ 256 Bit, 5 passes ]
• Message Digest 4 [ MD-4 ]
• Message Digest 5 [ MD-5 ]
• RIPEMD-128
• RIPEMD-160
• Secure Hash Algorithm 1 [ SHA-1 ]
• SHA-256 [ SHA-2 family ]
• SHA-384 [ SHA-2 family ]
• SHA-512 [ SHA-2 family ]
• Tiger
STANDARD ENCRYPTION MODES
(basic technologies)
• CBC (Cipher Block Chaining)
• CFB (Cipher Feedback)
• CFB8 (Cipher Feedback 8)
• CTR (Counter Mode )
• OFB (Output Feedback Mode)
The available hybrid solutions for the non-special purpose versions are as follows:
SPECIAL ALGORITHMS
(hybrid technology)
• BS Standard Protection Mode (SPM) - Crypto-mechanisms are generated by using specialized control panels. Each of these crypto mechanisms uses a set of cryptographic primitives that can be session-based or stored in highly secure digital containers.
BS Package Protection Mode (PPM) - The crypto mechanisms used are common to each of the files, information about which is contained in the file package. In case of need, individual elements of the crypto mechanisms can be hardware dependent or be tied to the use of control strings.
• BS Hybrid Protection Mode (HPM) - In this case, each of the files in the package is encrypted using a session crypto mechanism, which is formed based on the information in the electronic notebook and the specialized areas in the control strings. In addition, individual elements of the meta-information about the files and folders stored in the package are used.
ACCORDANCE WITH ACCEPTED STANDARDS:
• ISO 10116: Information Processing - Modes of Operation for an n-bit block cipher algorithm.
• ISO 9797: Data cryptographic techniques - Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.
• ISO 9798-2: Information technology - Security techniques - Entity authentication mechanisms - Part 2: Entity authentication using symmetric techniques.
• ISO 10118-2: Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher algorithm.
• ISO 11770-2: Information technology - Security techniques - Key management - Part 2: Key management mechanisms using symmetric techniques.
• FIPS 140 - Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules, May 25, 2001
(including Change Notices as of December 3, 2002).
• FIPS 180 - Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard (SHS), March 2012.
• FIPS 197 - Federal Information Processing Standard (FIPS) 197, Advanced Encryption Standard (AES), November 2001.
• FIPS 198 - Federal Information Processing Standard (FIPS) 198-1, The Keyed-Hash Message Authentication Code (HMAC), July 2008.
• SP 800-38D - National Institute of Standards and Technology Special Publication (SP) 800-38D, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, November 2007.
• SP 800-57 - NIST Special Publication (SP) 800-57 Part 1 Revision 3, Recommendation for Key Management - Part 1: General, July 2012.
• SP 800-90B - NIST Special Publication (SP) 800-90B (Draft), Recommendation for the Entropy Sources Used for Random Bit Generation, August 2012.
• SP 800-90C - NIST Special Publication (SP) 800-90C (Draft), Recommendation for Random Bit Generator (RBG) Constructions, August 2012.
• SP 800-107 - NIST Special Publication (SP) 800-107 Revision 1, Recommendation for Applications Using Approved Hash Algorithms, August 2012 etc.
Tính năng mới
- Phiên bản: PC
- Cập nhật:
Giá bán
-
*Trong ứng dụng mua hàng
- Hôm nay: $2.49
- Tối thiểu: Miễn phí
- Tối đa: $2.49
Theo dõi giá
Nhà phát triển
- Gatelink Ltd
- Nền tảng: Windows Ứng dụng (10)
- Danh sách: 1 + 0
- Điểm: 5 + 4 ¡
- Xếp hạng: 5 (3)
- Đánh giá: 5 (2)
- Giảm giá: 7
- Video: 0
- RSS: Đăng ký
Điểm
Không tìm thấy ☹️
Xếp hạng
-
- 35 Semes
- 5
Danh sách
Không tìm thấy ☹️
Đánh giá
-
- 35 Semes
- 5
An amazing product with great features.
The mail client was something I had never seen.
In the paid version, it can also encrypt messages.
Very good interface.
easy to break down and a very convenient product.
It is a pity that there is no editor that was in the old version, but as far as I understand it will be offered as a separate solution.
Thông tin bổ sung
- Danh mục:
Windows Ứng dụng
›Tiện ích & công cụ
- HĐH:
PC
- Kích thước:
92 Mb
- Ngôn ngữ được hỗ trợ:
English
- Xếp hạng nội dung:
EVERYONE
- Windows Store Xêp hạng:
1.0
(3) - Cập nhật:
- Ngày phát hành:
Danh bạ
- Trang web: https://fps.g-92.com
Bạn cũng có thể thích
- -95%
- File Protect System - LE
- Windows Ứng dụng: Tiện ích & công cụ Bởi: Gatelink Ltd
- $4.49
$84.99-95% - Danh sách: 0 + 0 Xếp hạng: 5 (1) Đánh giá: 0
- Điểm: 0 + 0 Phiên bản: PC File Protect System (version FPS-II se) is a specialized, hybrid application for managing the life cycle of critical information that is stored on local or server data devices. The ...
-
- File Destruct - Permanent File Shredder
- Windows Ứng dụng: Tiện ích & công cụ Bởi: Evlar
- $2.99
- Danh sách: 0 + 0 Xếp hạng: 0 Đánh giá: 0
- Điểm: 0 + 1 Phiên bản: PC File Destruct is a powerful Windows app designed to permanently delete your sensitive files beyond recovery. With its advanced shredding algorithms, File Destruct ensures that your ...
-
- Folder & File Locker Pro
- Windows Ứng dụng: Tiện ích & công cụ Bởi: NxeCcde24 Labs
- * $9.99
- Danh sách: 0 + 0 Xếp hạng: 0 Đánh giá: 0
- Điểm: 0 + 7 Phiên bản: PC Folder & File Locker let you protect your precious photos, videos, audios, document and other files in windows device with password lock. Folder & File Locker Pro is the easiest and ...
-
- FW Admin Tech Tools Pro
- Windows Ứng dụng: Tiện ích & công cụ Bởi: Fullyworked
- $3.39
- Danh sách: 0 + 0 Xếp hạng: 0 Đánh giá: 0
- Điểm: 1 + 2 Phiên bản: PC Introducing Tech Tools: Your All-in-One System Optimizer and Utility Suite Tech Tools is a comprehensive software toolkit designed to empower users of all levels with a range of ...
-
- Cleaner One - Free PC Cleaner & Optimizer
- Windows Ứng dụng: Tiện ích & công cụ Bởi: Trend Micro Inc.
- Miễn phí
- Danh sách: 2 + 0 Xếp hạng: 0 Đánh giá: 0
- Điểm: 3 + 9,994 Phiên bản: PC Best Free PC Cleaner in 2022. Clean junk files, cache, temporary files, useless duplicate files and optimize your PC for better performance with only a few clicks. Easily check your ...
-
- Advanced SystemCare Free
- Windows Ứng dụng: Tiện ích & công cụ Bởi: Placeholder_824100
- * Miễn phí
- Danh sách: 0 + 0 Xếp hạng: 0 Đánh giá: 0
- Điểm: 1 + 13 Phiên bản: PC Advanced SystemCare is an all-in-one yet easy-to-use utility to clean, optimize, speed up, and protect your PC, as well as guard your privacy. Extremely Easy to Use With the clean, ...
-
- 高级加密软件EFArmor
- Windows Ứng dụng: Tiện ích & công cụ Bởi: 高级文件加密软件
- * Miễn phí
- Danh sách: 1 + 0 Xếp hạng: 0 Đánh giá: 0
- Điểm: 1 + 0 Phiên bản: PC EFArmor is one file encryption and decryption software. It uses standard cryptography algorithms and security protocol to encrypt files. Anyone cannot modify, read and use these ...
-
- IObit Advanced SystemCare
- Windows Ứng dụng: Tiện ích & công cụ Bởi: IObit (Both Talent International Limited)
- * Miễn phí
- Danh sách: 0 + 0 Xếp hạng: 0 Đánh giá: 0
- Điểm: 0 + 8 Phiên bản: PC Elevated permissions are required to install and run IObit Advanced SystemCare. IObit Advanced SystemCare is an all-in-one yet easy-to-use utility to clean, optimize, speed up, and ...
Bạn cũng có thể thích
- Windows Ứng dụng
- Mới Windows Ứng dụng
- Tiện ích & công cụ Windows Ứng dụng : Mới
- Video Windows Ứng dụng
- Phổ biến Windows Ứng dụng
- Tiện ích & công cụ Windows Ứng dụng : Phổ biến
- Giảm giá Windows Ứng dụng
- Tiện ích & công cụ Windows Ứng dụng : Giảm giá
- Xếp hạng Windows Ứng dụng
- Đánh giá Windows Ứng dụng
- Danh sách Windows Ứng dụng
- Điểm Windows Ứng dụng