Password Generator - Speedcrypt File Encryption

File Encryption
Encrypted Files
Go to content
Password Generator...
Classic Password Generation, Generation with Speedcrypt
Speedcrypt provides its users with a Password Generator to create highly robust Master Keys, ensuring a significant level of security. This tool is very simple to use and offers two different methods for generating appropriate Passwords. It allows the creation of strings within a range of Seven to Thirty-two characters in length. Let's now explore the features of this Password Generator.

As previously mentioned, there are two methods to generate robust, secure, and reliable passwords. The first method generates passwords in the classic way, while the second method uses mouse movements within a designated area.
Classic Password Generation
In this version, the Password Generator provides the usual options to generate  classic Master Keys with composite characters and numbers. Here are the details:

  • Upper Case Letters
  • Lower Case Letters
  • Numbers [0-9]
  • Symbols [!@#$%]

By selecting the mentioned options, preferably in combination, you can obtain strong Passwords. Clearly, the length of each generated string is very important, the longer it is, the more robust the Master Key will be. Specifically, you can select strings with a length of up to 32 characters without worrying about remembering them. Speedcrypt will assist you with this as well. You can save the password inside an encrypted file, which will be stored using a Personal PIN. This PIN should be as complex as possible, compatible with your ability to remember it.
Once you have chosen the combination that suits you, all you need to do is generate the strings using the dedicated Generate button. You can create a Personal List that can be saved and accessed whenever you deem necessary. From this list, you can select the Password that you consider to be the best Candidate for encrypting a list of files.
Generation with Speedcrypt
The generation of passwords using the Speedcrypt Method utilizes the movement of the mouse within a designated area. You can move the mouse within this area and click at your preferred point: a string will be generated based on the mouse coordinates, combined with the following Pseudo-Random Number Generators:

  • Fortuna
  • Mersenne Twister

This technique ensures that the generated Passwords are highly unpredictable and secure, leveraging both user input and robust algorithms to create strong encryption keys.

Note: If you keep the mouse cursor stationary at any point within the designated area, each click will yield a different string. It is recommended to continuously vary the points where you click to generate the password. Regarding the length of the string, the same principles apply as those for generating classical strings. This approach ensures that each Password generated is unique and unpredictable, enhancing the security of your encryption keys.

Once you've selected the Pseudo-Random Number Generator that you feel best suits your needs, you can generate passwords by moving the mouse within the designated area and clicking wherever you see fit. Also in this case You can create a personal list that can be saved and accessed whenever you deem necessary. From this list, you can select the Password that you consider to be the best Candidate for encrypting a list of files.
The Password List
To create your Password List using either the Classic Generation Method or the Speedcrypt Method, navigate to the page named Options, where you will find, beyond those already mentioned, the following, checkboxes:

  • Add to List
  • Click on the List to enter a Password

Selecting the first checkbox ensures that each generated password, whether through the Classic Method or the Speedcrypt Method, is automatically added to your list of passwords for easy management and retrieval. By selecting the second checkbox, you can choose and insert the Password you consider most suitable for the file encryption process into the text box. This Password will then be transferred to the encryption procedure.

Note: Please keep in mind that Speedcrypt only accepts Candidate Passwords that score higher than 2.

Let's now see how Speedcrypt organizes your Password List, including each individual string with its generation characteristics and arranging them in the following fields:

  • TYPE: Password Type
  • PASSWORD: the String of Values
  • LEN: Password Length
  • BITS / SCORE: Bits of Entropy and Score

You can add as many passwords to your list as you deem necessary, even forming lists with many strings. However, I recommend keeping your lists as streamlined as possible for use during various encryption processes and then quickly overwriting the old list with a newly created one. Do not keep a Password List for too long, frequently renew it with a new list.

Password search

If you decide to create password lists with multiple strings, Speedcrypt allows you to perform targeted searches based on the following keys, some of which are already preset:

  • By Classic method
  • BY Speedcrypt method
  • By Score
  • By Length

The fields matching the selected search criteria will be highlighted, making it easy to scroll through the entire list and quickly locate the relevant entries. The first two fields are automatically configured by Speedcrypt; simply click the button to obtain the desired fields. In the third and fourth fields, you only need to click on the values set by Speedcrypt.

Note: The field for searching by Password length is automatically populated with the actual values present in the Password List.
List Storage
After creating a Password List that you deem suitable for containing strings that can potentially serve as Master Keys in an encryption process, you can save and retrieve the list by assigning it a specific name. Here’s how Speedcrypt stores your lists:

  • Assigning a Name: Each password list can be given a unique and descriptive name to easily identify it later. This name should reflect the purpose or the set of files it will be used for, making it simpler to manage multiple lists.
  • Encryption and Storage: The list is encrypted to ensure its security. This means that even if someone gains access to the file containing your password list, they won't be able to read the contents without the correct decryption key.
  • Retrieval: You can load a previously saved password list by selecting its name from a dropdown menu or a file selection dialog within Speedcrypt. This allows you to quickly switch between different sets of Master Keys as needed.
  • Management Options: Speedcrypt provides options to edit, update, or delete password lists. This way, you can keep your lists current and remove any outdated or unnecessary entries. By organizing and managing your password lists in this structured manner, Speedcrypt helps maintain the security and efficiency of your encryption processes.

Storing a List

When your list is ready, you can proceed to save it after entering your personal Password. Remember that for it to be accepted by Speedcrypt, it must have a score higher than 2. During the entry, it will be evaluated, and you can see its effectiveness. Do not enter simple strings that are easy for an attacker to interpret.

Note: When you enter a personal PIN and a Password to save your list, Speedcrypt is exposed to Rainbow Table Attacks. It is your responsibility to minimize this risk by entering passwords that are as complex as possible while still being easy for you to remember. If you do not adhere to this rule, the risk of an attacker capturing your password is extremely high!

After entering an effective Password, the save button named Export will become active: you just need to click on it and enter the name you deem appropriate. By default, Speedcrypt will propose the following name: Password List. The file will be saved with the .SRPN extension. This file will be managed and encrypted using the Serpent Encryption Algorithm, within the following parameters:

  • Encryption Key Length: 256 bits
  • Algorithm Mode: BitSlice
  • Operation Mode: CBC (Cipher Block Chaining)
  • Rounds 32

As already mentioned ensure you choose a strong, memorable Password, as this is crucial for the security of your encrypted Password List.

To import a list into the designated grid, you need to perform the reverse process: enter your Password and click the button named Import. If the Password matches, your list will be loaded correctly.

Note: when you initially save the list, the file will have the .psw extension, and then it will be encrypted with Serpent, changing the extension to .SRPN. The original file will be deleted using the DOD-7 Algorithm. Speedcrypt will overwrite files with the same name without asking for prior authorization, so if you want to create multiple Password lists, be sure to assign a unique name to each one.
If you follow the above mentioned rules precisely, the password generator can be extremely useful in terms of security for encryption processes. Additionally, you can transfer the encrypted password lists to any system where Speedcrypt is installed or where the portable version is used. The password lists are fully compatible with all versions of the project!
Back to content