Home
Products
Glossary
About us  
FAQ
Support
Links
 
 
 

Answers to Frequently Asked Questions about Able Encryption Software:

Faq Who needs Encryption Software?
Faq What is Cryptography?
Faq What is Public Key Cryptography?
Faq What is an Unalterable Public Key?
Faq What is the Serial Number?
Faq What is Sender Authentication?
Faq What is Document Integrity protection?
Faq Can I encrypt on any media?
Faq Can I Encrypt ".jpg" or ".exe" Files
Faq If I lose my Password, can you help me?
Faq What are AES's Implementation Limits?
Faq What if I change my version of Windows?
Faq What is a Digital Signature?

Faq Who needs encryption software?

Top

Everyone can benefit from encryption software. Everyone, from individuals to corporations, wants be reassured that their confidential information remains confidential. Public key encryption protection can provide that reassurance.

Faq What is Cryptography?

Top

Cryptography is the art and science of keeping files and messages secure. It works by mathematically transforming plaintext messages or files into a ciphertext, a process known as encryption.

Faq What is a Public Key Cryptography?

Top

Public Key cryptography is an encryption method that uses two different but related keys: a public key which is used for encryption and the secret key (password) used to decrypt the data. It is best suited for the storage and/or exchange of private or confidential data between two or more parties.

Faq What is an Unalterable Public Key?

Top

Safe Soft Public Key File Encryption Software offers a public key with a name that cannot be altered or modified, because any change makes it invalid. In fact, identification elements are integrated into the public key function. This unique feature ensures that a public key transmitted by a third party for encryption is the exact one intended for the user.

Therefore, if the user receives an altered public key with a name similar to the one intended for him (i.e. to mislead him) and uses that key to encrypt confidential information, the system will reject the key and will give an error message.

Faq What is the Serial Number?

Top

The Serial Number consists of 13 characters. It is sent to you via email once you have purchased your encryption software application.

Faq What is Sender Authentication?

Top

Sender Authentication is one of the objectives of cryptography: Typically, it is the assurance that a message was sent by the purported author. By creating a Safe Soft Digital Signature for a document, encrypted or not, it assures the document's recipents that it truly originates from the Sender and remains unchanged.

Faq What is Document Integrity protection?

Top

Document Integrity is assurance that a document has not been modified during transmission. It also is one of the key objectives of cryptography, i.e. proof that information is what it appears to be: uncorrupted (unchanged) information from the source.

Faq Can I encrypt on any media?

Top

Your source data can come from any media that you can read and write to: hard disk, floppy, CD-ROM, flash memory, USB or Firewire portable drives, etc.

Faq Can I Encrypt «.jpg» or «.exe» Files?

Top

Yes. All file suffixes are accepted. No distinction is made between one file type and another, since all reads and writes are made in binary mode. A single encrypted file can contain encryptions from text, .jpg, .exe, .doc, .zip and/or anything else.

Faq If I lose my Password, Can You Help Me?

Top

No. It is impossible for anyone, including Safe Soft Corporation design team members, to determine how many characters or which characters were used to form the secret key (password).

Faq What are AES's Implementation Limits?

Top

There is no limit to the size of files nor to the total number of files that may be encrypted at one time.

Faq What if I change my version of Windows?

Top

Changing your Windows version will prevent you from using your encryption software application.

Faq What is a Digital Signature?

Top

A digital signature is a signature in digital format which permits you to detect whether the message has been altered in transit. It is a value that acts like a digital thumbprint. More precisely, it is the hash value of an electronic document which provides for its authentication.

 

Top