Upon receipt of the license fee, we will email you a self-extracting archive file
(.exe). Please allow one business day for delivery,
keeping in mind that business days in your country may not coincide with business
days in ours.
When executed, the package will install the Cryptogra.ph
on your computer or device. Installation is simple and automatic. Registration is
not required as the act of purchase will have registered the purchaser as the user.
The Cryptogra.ph is launched like any other
from the Start Menu, from the Desktop, or from Windows Explorer.
No internet connection is required while the program executes, it does not connect
to any external site and the Cryptogra.ph
does not log any action the user takes.
The Source File is the input file you want to encrypt or decrypt. You can
enter the file name, or use Windows Explorer to locate it by clicking
on the Search button (magnifying glass) next to the textbox.
The Target Folder is the folder, or subdirectory, where the encrypted or
decrypted file (output file) will be stored. In the case of
encryption, the file size will be just a little larger than the input file. The
encrypted (output) file will have an innocuous name,
like A398B6ED43 and no suffix. In the case of decryption, the output file will be
identical in size, name and content to the file
The Key Folder is the most important, as the files in this folder will be
used to generate the thousands to millions of keys
needed for encryption and decryption. The Key Folder must contain at least 32 files,
but the more files it contains, the more secure
the encryption. It is recommended that the Key Folder contain about 100 files but
not more than about 600. The files contained herein
may be of any type, however, high-resolution image files with lots of detail work
best. It is recommended that most of the files
in the Key Folder be image files (.jpg or .png), but all of them can be images.
For best results, mix in some music files, PDF documents and other
file types as well. The contents of the Key Folder must be identical when
decrypting as was used during encryption. The name of the
Key Folder can be different, but if the contained files do not match, decryption
will result in an error. Please see the "FAQ" section below
for some of the best practices.
If decryption is to take place on a different computer that was used to encrypt,
the user decrypting must have a copy of the Key Folder
as well as the Cryptogra.ph
program. It is highly recommended that the decrypting user be given a copy of the
key folder through
a secure channel, such as a USB flash drive, CD-ROM, however other methods can be
used safely, such as downloading from a web site or
sending the Key Folder as a compressed (.zip or .rar) file through email. Never
send the Key Folder with the encrypted message.
The Key Folder may be changed for each encryption-decryption cycle, in fact it is
recommended that the Key Folder be changed often.
Changes might involve adding or replacing files in the folder, or using a different
folder altogether. The entire security of encryption
rests on keeping the Key Folder secure. If the Key Folder is compromised, the encrypted
file can be decrypted with some effort.
The Password is also important but not nearly so as the Key Folder. You chose
a password each time you encrypt a file. It is recommended
that a different password be chosen for each encryption. The password must be at
least eight (8) characters long, but it can be as long as
you wish. Any character (including space, numbers and special characters) in any
language (Chinese, Japanese, Korean, Hindi, Russian, Thai, Arabic,
etc.) may be used. If the file is to be decrypted by a different person, you must
communicate the password via a secure channel. The
password should never be sent along with the encrypted file.
As mentioned above, the Premier Edition works the same way as the Basic Edition,
without any of
the limitations of file size or available memory. Since both versions use the same
engine, the two versions are compatible — files encrypted using Basic can
be decrypted with
Premier, and vice versa, provided that the file is not too large for the
The Premier Edition can also encrypt and decrypt simple text — no input and
are needed. The text may be copied from the output textbox and pasted into an email
or SMS message.
Decryption of text may proceed in reverse, by pasting the received encrypted text
into the Source
Text textbox and clicking the "Decrypt" button to get the clear text.
A Simple Example
Target (Encrypted) File:
Can you see a pattern in the encryption? Well, we cannot, either. The pattern is
obvious in the Source File on the left, but no discernable
pattern exists in the Target (encrypted) File on the right.
Our test cases test for a great variety of files, file types and content to ensure
that the manner of encryption is secure under all
Try it with your own data, there is no risk at all (see "Warranty").