File Package Manager (FPM II) is a specialized application for strong encryption of files and folders located on local, networks, servers, or external data drives.
File Package Manager is one of the main modules of the CRYPTHOR cybersecurity and cyber defense system. FPM is a is a specialized easy-to-use software application for encryption and protection of files and folders that are located and stored at local, network, server or external storage arrays and devices.
File Package Manager provides the following functionality pack:
- Encrypt and/or decrypt selected files and folders;
- Secure file packages;
- Electronic crypto notebooks;
- Encrypting single files in a formed package;
- Decrypting single files in a formed package;
- File integrity check;
- File modification control;
- Continuous monitoring and control over files and directories status;
- Shredding and/or sanitizing of files saved in a formed package;
- Etc.;
The encryption process of files for which there is available meta-information in a given package and both files and package are physically accessible is executed through the utilization of specially designed single-session based crypto mechanisms.
Every crypto mechanism combines a set of proven cryptographic primitives. The possible human error and related security risks are reduced with the automatic configuration of the crypto primitives.
All executed operations on the files and folders that contain in a given package are performed only when these files and folders are physically accessible. In case the files and folders cannot be accessed (i.e., deleted, physically inaccessible network drive, etc.), this will be reflected in the package, by generating a time-based record for the time of detection of the occurred event.
Where and when should I use FPM:
Protection of large arrays of files and data that are located on different storage devices and media is a complex and complicated process for implementation. The usage of secured file packages allows the automation of this process, which also increase the QoS, minimize the information security risk, and improve the security procedures and policies implemented in a given enterprise or organization.
The processes of file storage, file editing, file transfer and file destruction are the corner stone in the modern business information processes, as such they possess significant interest for both single users and the professionals responsible for the enterprise security policies and procedures.
Statistics show that threats related with obtaining unsanctioned access by unauthorized persons are related mostly to this problem.
By utilizing FPM, it is possible to neutralize all aforementioned problems through an efficient and professional cryptosystem that allows the usage of secured file packages.
FPM utilize some of the most efficient standard digital data encryption algorithms that are being adopted and used by many government organizations and enterprises.
As opposed to some similar solutions, FPM allows real-time control and administration of the file package processes, along with working with databases of package information and continuous reporting functions. All these features make File Package Manager an irreplaceable tool when developing and implementing cybersecurity systems that comply with the requirements of ISO/IEC 27001 and ISO/IEC 27002.
The application’s hybrid functions utilize proven in practice and over time algorithms that are described in NIST SP 800-88 and NIST SP 800-90A, which include Hash DRBG (Hash Function Based), HMAC DRBG (HMAC Based), and CTR DRBG (based on block ciphers in counter mode), as well as some specific solutions used in BS 1443 technology.
Technology and Solutions:
The proper choice of algorithms and software technologies for the encryption of digital data guarantees the efficiency and high reliability of FPM.
The application uses a set of standard algorithms to generate specialized mechanisms for encrypting digital data.
In the basic version of CRYPTHOR File Package Manager is used the following non-exhaustive list of standard algorithms:
Applied standard encryption algorithms:
- Advanced Encryption Standard (block size of 128 bits, key lengths: 128, 192, and 256 bits);
- Blowfish;
- CAST-128 (CAST-5);
- CAST-256 (CAST-6);
- Information Concealment Engine (ICE);
- Information Concealment Engine 2 (ICE-2);
- ICE Encrypt;
- MISTY-1 (Mitsubishi Improved Security Technology);
- Ron’s Code 2 or Rivest’s Cipher 2 (RC-2);
- Ron’s Code 4 or Rivest’s Cipher 4 (RC-4);
- Ron’s Code 5 or Rivest’s Cipher 5 (RC-5);
- Ron’s Code 6 or Rivest’s Cipher 6 (RC-6);
- Serpent;
- Tiny Encryption Algorithm (TEA);
- Twofish;
Available Hash-functions:
- Secure Hash Algorithm 1 [SHA-1];
- RIPEMD-160;
- Haval [256 Bit, 5 passes];
- Message Digest 5 [MD-5];
- Message Digest 4 [MD-4];
- Tiger;
- RIPEMD-128;
- SHA-256 (SHA-2 family);
- SHA-384 (SHA-2 family);
- SHA-512 (SHA-2 family);