Restore Encryption Archives - Speedcrypt File Encryption

Speedcrypt
File Encryption
Speedcrypt
Encrypted Files
Go to content
Restore Encryption Archives ...
Restore Encryption Decryption Archives
Speedcrypt stores the archives required to decrypt files through a file called Speedcrypt.config.xml, which is the least secure available method to store sensitive data. Anyone could trace back to this file and see the archives used by Speedcrypt in clear. However, this is not a concern for us, as the only sensitive data contained in these archives are the SALT encrypted with the available engines and storing it this way is very convenient. The SALT is a portion of the password, so the attacker must first know the user's Master Key, decrypt the SALT, add the string, and finally execute the HASH Function of the complete string.


The same applies to the Backup Files created by Speedcrypt to store these archives. They are available to anyone who wants to examine them, including the attacker. These archives are essential for a proper decryption procedure, so be sure to store them on a USB Pen Drive or other mass storage device to use them when needed, especially on systems different from those where you encrypted the files.
The Window Restore
The window displays, on the left-hand side, two panels named respectively Speedcrypt Encryption Archives and Percentage. The first one shows the number of parameters, files, and counters. The second one shows, through a Pie Chart, the percentages relative to the number of encrypted files with their respective engines.

On the right-hand side of the window, there are two other panels named respectively Speedcrypt Backup Files and Restore. The first one has a reading grid and a button bar used to interact with the list of Backup Files, while the second one allows you to restore the archives.
Speedcrypt Backup Files
In the grid where the configuration Backup File is located, you can make the selection and related procedures necessary to get a complete picture of the situation regarding the file to be restored. Let's now take a closer look at all the available options and the role of the various buttons configured in the appropriate bar:

  • Backup file grid: it is possible to make the file selection
  • First button: opens and displays the contents of the selected file
  • Second button: opens and displays the contents of the folder of the selected file
  • Third button: displays the properties of the selected file
  • Fourth button: clear the Backup File. Use with caution!
  • First and second labels: displays the mouse movements in the grid
  • Third label: displays the number of the selected row

Note: If you decide to delete the Backup File, Speedcrypt will ask for confirmation. Once the procedure is authorized, the file will be deleted not only from the list but also from the disk where it reside. It can no longer be recovered as it is subject to deletion with the DoD 7 Passes Algorithm.
Restore
As previously mentioned, archives are very useful if you decide to make copies of encrypted files and move them to another system. To decrypt them, it is necessary to restore the conditions in which the encryption processes were carried out. This is possible thanks to the backup file previously created by Speedcrypt, which must be moved together with the copies of the encrypted files. The procedure for restoring the archives via backup files is a rather simple operation that can be done like this:

  • Select the appropriate button and authorize the restore procedure

After restoring the archives, Speedcrypt will restore the conditions in which the encryption processes were carried out and will recreate the group membership to allow decryption within the program without the use of the Windows Shell, as described in the Encrypted Files page of this Online Guide.
As mentioned earlier, it is a good practice to store the Backup File in an external mass storage device, preferably on a USB pen drive if you need to move the encrypted files. Speedcrypt is easily portable in the version that does not require installation setup, and can be made to work on any PCs simply by copying its folder and, if necessary, restoring the archives to start the decryption processes.
Back to content