"Understand and use security software, including essential tools such as a firewall, virus/malware protection, file encryption, anti-spam software, and pop-up blockers." — IRS Begins Campaign to Encourage Taxpayers to Protect Personal Information
Cryptosystem ME6 is intended for encryption and decryption of single files or multiple files, for secure storage or secure transmission. Here is a typical screenshot:
Prices Download the
a user license
Software Shop Testimonials Translate to:
Some features of Cryptosystem ME6:
- It is easy to use.
- Files of any type can be encrypted, and there is no limit on file size.
- You can encrypt/decrypt a single file or act on multiple files in a folder (and optionally all subfolders).
- It supports long key phrases (up to 64 characters) for greater security.
- It supports 64-byte random keys (saved as keyfiles).
- It uses a secure symmetric key encryption algorithm (based upon the irreversibility of the MD5 message digest algorithm).
- You can save the settings (except for the encryption key) for the next run, or save them to be loaded later.
- It has a way to test the randomness of bytes in any file, with a graphical display of randomness in single files.
- When the file produced by encryption has the same name as the input file, the original plaintext is wiped securely.
- It prevents accidental encryption of 'exe', 'dll' and other files necessary for proper operation of your Windows PC.
- It guards against accidental double-encryption (attempting to encrypt a file which is already encrypted).
- In this and in other ways it is designed to minimize the chance of user error.
- It is fast (over 1 MB/sec when encrypting, over 2 MB/sec when decrypting).
- It is backwards-compatible with previous versions.
User Manual for Cryptosystem ME6
Encrypting a Single File
Decrypting a Single File
Use of Malware Detection Software
Encrypting a Set of Files in a Folder
Decrypting a Set of Files in a Folder
Use of a File Pattern
Use of a Keyfile
Decryption Using the Trial Version
The Cryptosystem ME6 Encryption Process
and Cryptosystem ME6: Statistical Tests
Dr Aiko Pras, of the University of Twente's Design and Analysis of Communication Systems group, said on May 29, 2013: "[An] interesting development is the cloud: everyone stores all sorts of documents there, but no-one considers that all these files eventually end up in the United States. You can depend on it that the American authorities [NSA] — and soon the Chinese — will be reading them."
"Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian. ... The documents show that the company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide."
So if you store confidential data in the cloud then it's highly advisable to encrypt it before uploading.
In January 1999, the Defense Research and Development Organization (DRDO) [of India] issued a 'red alert' against all network security software developed in the US. ... Specifically, the DRDO is concerned about U.S. "encryption software products" that can be 'broken' by the NSA. The agency pointed out "no encryption software products can be exported from the U.S. if they are too strong to be broken by the U.S. National Security Agency." ... The letter says: "To put it bluntly, only insecure software can be exported. When various multinational companies go around peddling 'secure communication software' products to gullible Indian customers, they conveniently neglect to mention this aspect of the U.S. export law." — Cryptography and Liberty 1999: An International Survey of Encryption Policy
Cryptosystem ME6 was designed and developed in Europe. Thus it was not designed (as most commercial U.S.-developed encryption software is) to be sufficiently weak to qualify for a U.S. export license. On the contrary, it was designed to be as strong as possible (and with no concession to, or advice from, any 'intelligence' agency). This file encryption software has no backdoor, and the encryption key is not hidden in the ciphertext. (The encryption algorithm is described at The Cryptosystem ME6 Encryption Process.)
Trial version: A copy of the Cryptosystem ME6 software can be downloaded freely from this website for the purpose of evaluation. Click on the following link to go to a web page with further information (and see also Decryption Using the Trial Version):
Download Cryptosystem ME6 ...
Price and ordering: A single-user license for the fully-functional software is available for a period of 3 months, 1 year or with no time limit (a 'perpetual' license). Prices for each type of license are given at Purchase a User License. (A multiple-user license is available for this program.) An activation key is required in order to make the trial version permanently fully functional, and can be obtained immediately (or soon after) your purchase. Refund: A refund will be provided promptly up to 30 days after purchase if the software does not perform satisfactorily.
Updates: Purchasers of a user license for this software are entitled to an upgrade to any later version at no additional cost.
An Introduction to the Use of Encryption Hermetic Systems Home Page