Features... Speedcrypt Features |
Speedcrypt is a software dedicated to protecting users' data through encryption processes that use some of the most powerful and well-known algorithms. It also uses the most sophisticated password derivation techniques through HASH Functions, among the most appreciated and used in the world of cryptography.
The algorithms used are subjected to a Partial Self-Test when Speedcrypt is opened, and can be Fully Tested using the specific functions that the program makes available to users. Let's now take a look at the main features of the Speedcrypt Project, in terms of algorithms, cryptographic functions, and interaction with the system in use.
Crypto Engines |
There are seven encryption engines actives that the program makes available to users: AES-GCM, AES-RIJNDAEL, PGP, AES (String Crypto), CHACA20, and XCHACHA20-POLY1305, AES (String Crypto 256 Bit Key). The first three are used to encrypt and decrypt files, moreover, AES-GCM is also used to encrypt the SALT stored in the archive.
The engines available in Speedcrypt are among the most famous and appreciated in the world of cryptography. They are powerful, effective, and fast in execution processes, offering a very high level of security. They are also equally efficient from the point of view of interaction with hardware, optimized for truly remarkable performance.
Salt Engines |
A string named SALT is added to passwords used for encryption processes. This string is generated by the PRNG engines (pseudo-random number generators) supplied with Speedcrypt. The program provides users with six pseudo-random number generators that can be chosen according to their needs.
The PRNG engines supplied with the program are of excellent quality, some much more reliable than others. Among these Fortuna is certainly preferable, for effectiveness, performance, speed of execution. In any case, this is a choice that the user must make based on his experience and knowledge of Pseudo-Random Number Generators. However, all generators offer a good level of safety and can be used to generate the SALT to be added to the Master Key.
HASH Engines |
There are fourteen HASH Functions available in the program, some dated but still efficient and widely used in the cryptographic field. Some of them can be associated with the PBKDF2 algorithm (Password-Based Key Derivation Function) which is a key derivation function with a sliding computational cost, used to reduce the vulnerabilities of Brute Force Attacks.
Engines | Key Stretching | Parameters | Condition |
Memory Size, Iterations, Parallelism, HASH Size | Very Good | ||
Memory Size, Block Size, Parallelism, HASH Size | Good | ||
BCrypt Rounds R4 R10 R12 R31 | Good | ||
Very Good | |||
Very Good | |||
Good | |||
Good | |||
Good | |||
Good | |||
Good | |||
Good | |||
PBKDF2 Iterations 7000 base -> 350000 | Good | ||
PBKDF2 Iterations 7000 base -> 350000 | Good | ||
PBKDF2 Iterations 7000 base -> 350000 | Good |
Speedcrypt does everything to create strong passwords, using the filling technique, the SALT and the consequent derivation of the Master Keys. However, it is up to you to compose password that are as complicated and difficult to attack as possible. For this reason, you can only use one password for each individual encryption process, even if the processes are connected to the same engine. A process, a Master Key, as will be explained later in the guide when we discuss the procedures related to file encryption.
Compression Algorithms |
The files that undergo the encryption process can be compressed using special engines that Speedcrypt makes available to its users. In fact, there are three powerful compression algorithms that the user can choose from.
The compression algorithms are Open Source components, like all the components used in the Speedcrypt Project. They are powerful, versatile, fast in execution, and all offer a high level of file compression for files undergoing the encryption process.
Secure Deletion |
At the end of the encryption process, Speedcrypt eliminates the original file so that it can no longer be recovered. To perform this operation, there are five deletion algorithms available, some of which are very secure and do not allow the recovery of deleted files in any way.
Algorithms | Execution Speed | Condition |
Very Fast | Not Sure | |
Very Fast | Not Sure | |
Very Fast | Not Sure | |
Fast | Very Sure | |
Very Slow | Very Sure |
The first three algorithms are very fast but not secure, so do not use them. Instead, use the last two, which are secure but slower. The best compromise between speed and security is achieved with the DoD 7 Passes, also used by the US Department of Defense at an industrial level. The Gutmann 35 Passes is instead the most secure in the world, but it takes much longer to complete the procedure. Choose according to your needs.
Shell Link |
The program can associate its icon with encrypted files. For this purpose there is an additional independent tool that can be called from the main window and from the Speedcrypt Settings under the Shell Link option.
Voices | Function |
Call The Windows Registry Tool | |
Associate The Voice Send To ... Speedcrypt |
One of the first things to do when using the program for the first time is to associate its icon with encrypted files. This is an optional but highly recommended operation. In this way, files encrypted by Speedcrypt will be immediately recognizable.
The above are the main functions of the program. The online guide will describe in detail all the other features that the project offers to its users. Speedcrypt does everything possible to help encrypt your data securely and efficiently. To this end, follow the advice and suggestions that you will find in the Online Help Guide!