Encryption Profiles

 

This feature allows you to create encryption or decryption profiles.  An encryption profile should be used in an encryption task to encrypt file(s).  A decryption profile should be used in a decryption task to decrypt file(s).  There are various types of encryption methods supported.

Password Based Encryption & Decryption
This is a symmetrical encryption/decryption method, i.e. the same password is used for encryption and decryption.  Two separate profiles are needed, one encryption profile and another decryption profile.  The encryption profile should be used in encryption tasks to encrypt files.  Similarly, the decryption profile should be used in decryption tasks to decrypt files.

OpenPGP Password Based Encryption & Decryption
This is a symmetrical encryption/decryption method, i.e. the same password is used for encryption and decryption.  Two separate profiles are needed, one encryption profile and another decryption profile.  This method is similar to the password based encryption method above, but uses the OpenPGP standard.  Files encrypted using this method can be decrypted by this this and other applications that support OpenPGP password based decryption.  Similarly, files encrypted in other applications using OpenPGP password based encryption can be decrypted in this software.

Secret Key Encryption & Decryption
This is a symmetrical encryption/decryption method, i.e. the same secret key file is used for encryption and decryption.  Two separate profiles are needed, one encryption profile and another decryption profile.

OpenPGP Public Key Encryption
This is an asymmetrical encryption method.  This method is similar to the public key encryption method above, but uses the OpenPGP standard.  You should create an encryption profile based on an OpenPGP public key file.  Files encrypted using this OpenPGP public key can only be decrypted by using its corresponding OpenPGP private key.

OpenPGP Private Key Decryption
This is an asymmetrical decryption method.  This method is similar to the private key decryption method above, but uses the OpenPGP standard.  You should create a decryption profile based on an OpenPGP private key file.  This OpenPGP private key can only decrypt files which were encrypted using its corresponding public key.

Example of Encrypt and Decrypt:
Bobs customers need to send Bob important files securely via email.
Only Bob should be able to read these messages.
If these files are intercepted by a malicous 3rd party, they should not be able to decrypt/read these files.
To do this, Bob creates a Private & Public key pair.
Bob keeps his Private key securely to himself.
Bob distributes his Public key to his customers.
Bobs customers then encrypt these files using Bobs Public key.
Bobs customers send these files to Bob via email.
Only Bob can decrypt these encrypted files because only he has the Private key.

OpenPGP Private Key Signing
This method is used to sign a file using a private key.  Basically, during signing, the file is encrypted with a private key.  The corresponding OpenPGP public key can be used by anyone to verify the signature.

OpenPGP Public Key Verification
This method uses a public key to verify a signed file.  The public key is used to verify that the file was signed and encrypted, using its corresponding private key.  The signed file is automatically decrypted after verification.

Example of Sign and Verify:
Bobs needs to send all his customers very important secret messages (in text files).
His customers need proof that these messages are indeed from Bob.
To do this, Bob creates a Private & Public key pair.
Bob keeps his Private key securely to himself.
Bob distributes his Public key to his customers.
Bob then signs his secret messages using his Private key.
Bob sends these signed messages via email to all his customers.
His customers use his Public key to verify (and decrypt) Bobs messages.