Why is it important to encrypt your sensitive information?

Simply said – when, not if, your sensitive information has been compromised you want to ensure the data has been rendered useless. Securing your data protects you, your assets and anyone else connected to the information in question.

  • Businesses struggle to find the best encryption solution to protect important information because of these two reasons. Encrypting data should be affordable so that it doesn’t crush their bottom line. Encrypting data should be simple to do so that their employees will implement it. CryptoLock encryption software is the answer.
  • CryptoLock Encryption Software provides quick and easy encryption for all of your files. The simple to use interface allows you to drag and drop your files between CryptoLock encryption software and Windows Explorer to add or extract files from an encrypted archive.
  • Files stored in a CryptoLock Encrypted Archive are first compressed to save space and then encrypted with the password you provided. The whole process is done behind the scenes and only requires you to provide the password to use and the files to encrypt, CryptoLock does all the rest. The only way to retrieve the files from the encrypted archive is with the correct password. Your files are protected and locked away from prying eyes.
  • When you need to access the files stored in your encrypted archive, you open the archive with CryptoLock and extract them back to your computer. Opening the archive will require you to enter the password you provided to encrypt the files. Then you can use drag and drop option to extract a file, or group of files from the archive to your Desktop or any other folder in Windows Explorer®.

CryptoLock supports full copy and paste functionality and provides toolbar and menu items for extracting the selected files, or groups of files to a specific directory.

  • Data within the encrypted archive can not be viewed without a valid password.
  • Drag and Drop interface allows for encryption and decryption of files and entire directories.
  • Choose from 6 different encryption methods and 2 different compression methods.
  • Create Self Extracting Archives which can be decrypted on any Microsoft Windows® based computer without installing CryptoLock on the destination computer.
  • Encryption and Compression methods can be disabled by network administrators to ensure CryptoLock will only allow creation of archives that adhere to your network security policies.
  • ECB – Electronic Code Book
  • CBC – Cipher Block Chaining
  • CFB – Cipher Feedback Mode
  • OFB – Output Feedback Mode
Supported Encryption Algorithms:

  • AES (FIPS 197 Specification)
  • Rijndael (192 and 256 bit blocksize)
  • Blowfish
  • Twofish
  • DES (FIPS 46-2 Specification)
  • TripleDES (FIPS 46-3 Specification)
  • GOST Encryption Standard (GOST 28147-89 Specification)
Compression Algorithms Supported

  • Deflate (RFC 1950)
  • BZip2
  • Blowfish

Misc Specifications:

  • RFC 2898 based Key Derivation based on your password and a randomly generated salt which is unique for each file encrypted.
  • RFC 2104 based HMAC verification of extracted files to ensure your data isn’t corrupted.
System Requirements:

  • Supported OS: Windows® 2000/XP/2003/Vista/Windows 7
  • Processor: AMD Athlon or Intel Pentium
  • RAM: 16MB
  • Hard Disk Space: 2MB

The RTS Portable Security Suite™ is now available through the RTS web-site in a free trial version for anyone with a USB flash drive or iPod digital device

Research Triangle Software, a leading developer in secure and branded electronic commerce solutions, has announced the release of their Portable Security Suite. The RTS Portable Security Suite is available now and offered free of charge in a 30 day trial version for anyone who owns a USB flash drive or iPod mobile digital device. The Portable Security Suite includes a set of applications that can be launched and implemented directly from the users USB flash drive or iPod digital device using any Windows PC.