Crypto Package Manager is a modern software application designed for strong post-quantum encryption and protection of files and folders located on local storage devices, network storages, servers and external storage arrays.
Crypto Package Manager (CPM II) is a specially designed software application for strong post-quantum encryption of files and folders located on local storage devices, network storages, servers, and/or external data storage arrays.
Crypto Package Manager provides its users with the following functionality:
- Encryption and/or decryption of selected files and folders;
- Generation of secure file packages;
- Encryption of files consisting a single package;
- Decryption of the files consisting a single package;
- File integrity check;
- File modification control;
- Continuous monitoring and control of the status and condition of files, folders, directories, etc.
The encryption process of files for which there is available meta-information in a given package and both files and package are physically accessible is executed through the utilization of specially designed single-session based crypto mechanisms.
Every crypto mechanism combines a set of proven cryptographic primitives. The possible human error and related security risks are reduced with the automatic configuration of the crypto primitives.
All executed operations on the files and folders that contain in a given package are performed only when these files and folders are physically accessible. In case the files and folders cannot be accessed (i.e., deleted, physically inaccessible network drive, etc.), this will be reflected in the package, by generating a time-based record for the time of detection of the occurred event.
Where and when should I use CPM:
Protection of large arrays of files and data that are located on different storage devices and media is a complex and complicated process for implementation. The usage of secured file packages allows the automation of this process, which also increase the QoS, minimize the information security risk, and improve the security procedures and policies implemented in a given enterprise or organization.
The processes of file storage, file editing, file transfer and file destruction are the corner stone in the modern business information processes, as such they possess significant interest for both single users and the professionals responsible for the enterprise security policies and procedures.
Statistics show that threats related with obtaining unsanctioned access by unauthorized persons are related mostly to this problem.
By utilizing CPM, it is possible to neutralize all aforementioned problems through an efficient and professional cryptosystem that allows the usage of secured file packages.
CPM utilize some of the most efficient standard digital data encryption algorithms that are being adopted and used by many government organizations and enterprises.
Technology and Solutions:
The proper choice of algorithms and software technologies for the encryption of digital data guarantees the efficiency and high reliability of CPM.
The application uses a set of standard algorithms to generate specialized mechanisms for encrypting digital data.
In the basic version of Crypto Package Manager is used the following non-exhaustive list of standard algorithms:
Applied standard encryption algorithms:
- Advanced Encryption Standard (block size of 128 bits, key lengths: 128, 192, and 256 bits);
- Blowfish;
- CAST-128 (CAST-5);
- CAST-256 (CAST-6);
- Information Concealment Engine (ICE);
- Information Concealment Engine 2 (ICE-2);
- ICE Encrypt;
- MISTY-1 (Mitsubishi Improved Security Technology);
- Ron’s Code 2 or Rivest’s Cipher 2 (RC-2);
- Ron’s Code 4 or Rivest’s Cipher 4 (RC-4);
- Ron’s Code 5 or Rivest’s Cipher 5 (RC-5);
- Ron’s Code 6 or Rivest’s Cipher 6 (RC-6);
- Serpent;
- Tiny Encryption Algorithm (TEA);
- Twofish;
Available Hash-functions:
- Secure Hash Algorithm 1 [SHA-1];
- RIPEMD-160;
- Haval [256 Bit, 5 passes];
- Message Digest 5 [MD-5];
- Message Digest 4 [MD-4];
- Tiger;
- RIPEMD-128;
- SHA-256 (SHA-2 family);
- SHA-384 (SHA-2 family);
- SHA-512 (SHA-2 family);