Grösse: 2,4 MB
Sehr nettes Verschlüsselungsprogramm, es nistet sich ins Kontextmenü ein und es lassen sich Dateien wie auch Ordner verschlüsseln. Es stehen verschiedene Verschlüsselungsmethoden zur Auswahl, die Daten können auch zusätzlich komprimiert werden.
Interessant ist das Feature Public- und Securekeys zu erzeugen und zu verwalten. Alles in allem macht das Programm einen brauchbaren Eindruck, wollen wir mal hoffen, daß es nicht irgendwann in Shareware umgewandelt wird.
The BCArchive software is designed to compress group of files/folders to encrypted archive (i.e. to a single compressed file). Please read about the tasks BCArchive helps to solve in the section When BCArchive can be of use to you and about short list of BCArchive functions as well as about supported standards and specifications in the BCArchive characteristics section.
When BCArchive can be of use to you.
There are many compressing utilities well known in the world (Zip, Arj, RAR and others) and they are really helpful in saving space on hard drives. From the other hand, in many cases the data we compress is private. The question of privacy arises even more when we send the compressed data over insecure Internet connections.
Fortunately strong encryption algorithms and technologies may help people to keep their private data in a secure form. The encryption technologies may help and they really help when people can use the technology for a concrete case with a tool, which:
a) is the most suitable for a concrete task;
b) all the steps in securing data use standard (and proven as strong) algorithms;
c) risk of improper use of encryption by not experienced people is minimal.
For example, you may wish to create compressed and encrypted archive and store it as a backup copy on your hard drive. In this case the only you need is to enter a password for the archive when you create it and enter the same password when you want to decrypt and extract the data from the archive. Looks simple and does not require special knowledge in encryption from the user. But the encrypting part of the software must use strong algorithms, for example, IDEA or Blowfish encryption algorithms and PKCS #5 standard for derivation encryption key from the password string. In other case it is possible that the encrypted archive can be easily decrypted by some freeware utility.
If you wish to create encrypted archive and send it to another user, you may use more advanced technology, based on public/secret key pair encryption algorithm. In this case you don't need in telling the other user the password for the encrypted archive. You simply encrypt the archive file with a public key of the user who is going to receive the file. Public key of the user is not a secret and can be sent to you in any way. At the same time the user keeps a secret key, correspondent to the public key, in a very safe place. Once you have encrypted the archive file with a public key, the file can be decrypted only by correspondent secret key. Hence, only your recipient can decrypt the archive file you send to him, because noone else knows his/her secret key. This technology is used in widely known Pretty Good Privacy software (PGP) and a number of specifications and standards were issued to make using the technology as secure as possible.
Public/secret key algorithms are very convenient, because you do not need to discuss with your recipient what password you are going to use for encrypting the data. But you still need your recipient have the same software installed on his/her computer to be able to decrypt the data you send. It is not very convenient in many cases to ask your recipient to install something before he/she starts to access the data. Solution for the case exists - you can create so-called self-extracted archive. It means that you not only compress and encrypt the data to a single archive file, but also convert the file to an executable program. Later you or your recipient can run the program on computer without any special software installed and get the data extracted.
The BCArchive software helps to solve the tasks discussed in the chapter When BCArchive can be of use to you above. The software allows the user:
* Create compressed and encrypted archive file protected by password.
* Create compressed and encrypted archive file encrypted by public key of another user.
* Add a number of passwords to existing archive file.
* Add a number of public keys to existing archive file so that a number of users can decrypt the archive.
* Generate new or use existing secret/public key pairs in PKCS-12/X.509 format.
* Compress and encrypt data to self-extracted executable program. The user can run the program on computer where BCArchive is not installed and get the data extracted.
BCArchive utilizes the following encryption algorithms, standards and specifications:
* Symmetric algorithms: Blowfish, IDEA, Triple-DES and CAST5.
* Secure Hash Algorithms: SHA-1, MD5 and RIPEMD-160.
* Asymmetric (public/secret key pair) algorithms: RSA, ElGamal / Diffie-Hellman.
* Specifications for public/secret key pair format: PKCS #12, X.509.
* PKCS #5 (recommendations for the implementation of password-based cryptography).
* RFC 2440 specifications for session keys encrypted by symmetric or public key encryption algorithms.
Since BCArchive is compatible with many well-known standards and specifications, the software allows using existing public key databases created for years widely in the world, for example, the keys created for the PGP software.