Answers to Frequently Asked Questions about Able Encryption Software:
Who needs Encryption Software?
What is Cryptography?
What is Public Key Cryptography?
What is an Unalterable Public Key?
What is the Serial Number?
What is Sender Authentication?
What is Document Integrity protection?
Can I encrypt on any media?
Can I Encrypt ".jpg" or ".exe"
Files
If I lose my Password, can you help me?
What are AES's Implementation Limits?
What if I change my version of Windows?
What is a Digital Signature?
Everyone can benefit from encryption software. Everyone, from individuals to corporations, wants be reassured that their
confidential information remains confidential.
Public key encryption protection can provide that reassurance.
Cryptography is the art and science of keeping files and messages secure. It works by mathematically transforming plaintext
messages or files into a ciphertext, a process known as encryption.
Public Key cryptography is an encryption method that uses two different but related keys: a public key which is used for
encryption and the secret key (password) used to decrypt the data. It is best suited for the storage and/or exchange of
private or confidential data between two or more parties.
Safe Soft Public Key File Encryption Software offers a public key with a name that cannot be altered or modified, because
any change makes it invalid. In fact, identification elements are integrated into the public key function. This unique
feature ensures that a public key transmitted by a third party for encryption is the exact one intended for the user.
Therefore, if the user receives an altered public key with a name similar to the one intended for
him (i.e. to mislead him) and uses that key to encrypt confidential information, the system will
reject the key and will give an error message.
The Serial Number consists of 13 characters. It is sent to you
via email once you have purchased your encryption software application.
Sender Authentication is one of the objectives of cryptography: Typically, it is the assurance that a message was sent by
the purported author. By creating a Safe Soft Digital Signature for a document, encrypted or not, it assures the document's
recipents that it truly originates from the Sender and remains unchanged.
Document Integrity is assurance that a document has not been modified during transmission.
It also is one of the key objectives of cryptography, i.e. proof that information
is what it appears to be: uncorrupted (unchanged) information from
the source.
Your source data can come from any media that you can read and write to: hard disk, floppy, CD-ROM, flash memory, USB or
Firewire portable drives, etc.
Yes. All file suffixes are accepted. No distinction is made between one file type and another, since all reads and writes
are made in binary mode. A single encrypted file can contain encryptions from text, .jpg, .exe, .doc, .zip and/or anything else.
No. It is impossible for anyone, including Safe Soft Corporation design team members, to determine how many characters or
which characters were used to form the secret key (password).
There is no limit to the size of files nor to the total number of files that may be encrypted at one time.
Changing your Windows version will prevent you from using your
encryption software application.
A digital signature is a signature in digital format which permits you to detect whether
the message has been altered in transit. It is a value that acts
like a digital thumbprint. More precisely, it is the hash value
of an electronic document which provides for its authentication.
|