$49 app can put your files under lock and key
Have you ever seen an air courier with a briefcase handcuffed to his arm? CryptoGram is a lot like that.
By John Breeden II
GCN Staff
Have you ever seen an air courier with a briefcase handcuffed to his arm? CryptoGram is a lot like that.
It locks down e-mail attachments and File Transfer Protocol files so only users with the correct keys can see inside. Others see unintelligible garbage, if they can get the files open at all.
Although a handy tool, CryptoGram has poor documentation. The manual seems almost encrypted, it's so difficult to read in spots. The diagrams are downright illegible.
Fortunately, the program is simple to use: Select a file and right-click on it. The back-end engine does 168-bit Triple Data Encryption Standard encryption. Other security elements in the program hamper use of code-breaking systems, a factor that influenced my favorable grade.
After CryptoGram counts three improper decryption entries, it doubles the amount of time before it will recognize each new attempt.
At first this is hardly noticeable because the interval is only a few seconds. But as math students know, doubling and redoubling numbers quickly makes them astronomical.
There's a fable about the man who invented the game of checkers to amuse a powerful king. As his reward, the inventor asked for only a single grain of rice for the first square of the game, two for the second, double again for the third and so on for all 64 squares.
The king readily agreed, not imagining that by the 64th square, he would owe quintillions of grains of rice. He learned his math lesson the hard way, and so would a code breaker. Pretty soon, he would be waiting years between hack attempts.
CryptoGram's interface is quite good and flexible. You create the crypto keys on floppy disks for distribution to your authorized users. There could be one key for all department heads and another for all program officials, for example. If only the program officials were allowed to open a particular document, it would be encrypted for their key.
Each token, generally a floppy disk, is password-protected, which reduces worry about lost tokens.
Tokens, however, can be dispensed with altogether. The recipient of an encrypted file does not need to have the program installed because there is a self-extracting file option.
To make a self-extracting file, the sender creates a pass phrase, which must be at least 10 characters long and can be a maximum of 100 characters. The phrase might be something such as '13 eggs make a Baker's dozen,' which combines case-sensitive capitalization and numbers, or something simpler, such as 'I enjoy hamburgers.'
Box Score | |
CryptoGram Personal and group encryption tool
|
Opens a hole
NEXT STORY: Section 508: Feds push for industry shift