(There are many possible ways to realize unbreakable file encryption. Here is the basic idea and key processing method based on one-time encryption. The following is the software's [Overview and Instructions]
If the software is used correctly, the encrypted files can not be cracked. Achieve the effect of security encryption. Encryption is unbreakable is the direction that practitioners have been striving for. There were such applications at the beginning of the last century. Now is the era of rapid computer development. It is easier to implement secure encryption. Practice has proved that a small number of keys (user passwords) are used to encrypt a large number of Data is insecure. If you want to encrypt securely, you must configure at least a key for each encrypted information, so that the key is as big as the original file, causing difficulties in key storage and distribution, and the cost must be paid. , The solution here is to make the key form a file to make it securely put together with the ciphertext of the original file. To do this is to encrypt the key file or ciphertext again, pay attention to the current ciphertext and key file It is garbled data, and its encryption method is unbreakable, because you don’t know any information of garbled files, you can’t decrypt it, and there is no judgment standard. As a result, the cost of achieving secure encryption is 1) double the space occupied, and 2) the operation is more complicated. This should be no problem for modern computers where the speed of computers is getting faster and the storage space is getting cheaper.
There are two encryption programs here, each of which can be run independently, and their interfaces have their own instructions for use, which can complete the encryption of files, and users need to be proficient in applying them. The functions of these two programs are not the same. Program 1 encrypts the file in a word-by-word manner. After encryption, it also generates a key file in addition to the ciphertext. Program 2 is used to encrypt garbled files. Program 2 uses random replacement encryption to encrypt garbled data. It is efficient and fast. You need to enter a password. For specific usage, see the instructions on the interface of each program. Encryption is all After completion, the ciphertext and the ciphertext of the garbled file can be placed anywhere, and anyone's attack on these two files will fail. When decrypting, first decrypt the file encrypted by program 2, and then use the key file to decrypt the cipher text.
Why can't the file encrypted by program 1 be cracked? The reason is very simple. Program 1 generates a byte unknown number for each byte of the original file, and uses this unknown number to encrypt the source file bytes to generate a ciphertext byte, which is
plain ciphertext byte + key byte = ciphertext byte
It can be seen that there is no solution for two unknowns in an equation. The key byte is required to solve.
We see that the ciphertext and the ciphertext of the key file are garbled. If you don’t encrypt the key file, you need to save the key file in a safe place, but if there is a safe place to save the file, why don’t you save the original file directly? Forget it, why bother, and after encryption, you just need to remember the password. Is the encrypted key file safe? If the file is garbled and encrypted properly, it cannot be cracked. If you use winrar and other encryption software that can report your password error, it is insecure. In essence, that kind of software is sold out. We need encryption software that does not detect the correctness of the result, so that we can not provide information to the thief and ensure information security. The cracker was unable to decrypt because he did not know any criteria.
There are three options here, 1) Use program 2 to encrypt the key file. 2)
Use Procedure 2 to encrypt the cipher text. 3) Use program 2 to encrypt the key file and cipher text. All are possible, but the user must be aware that it is almost impossible to return the original way when decrypting.
【User Notice】
Basic skills-first find some files, use program 1 and program 2 to perform encryption and decryption experiments respectively, starting from a single file, to processing several files at the same time, practice to be accurate.
Then you can practice the following:
Practice one encryption part
Use program 1 to encrypt file A, get A ciphertext and A key file (the feature of the key file is that the extension is my at the end), then use program 2 to encrypt the key file of A, and the encryption ends. Note that when the file is encrypted, the name of the file has not changed, and the operator must remember it clearly.
Practice one decryption part
The order of operation must be clear. The last encrypted one must be decrypted first. First, use Program 2 to decrypt the encrypted key file, and then use Program 1 to decrypt the ciphertext.
The above exercise one is the first of the three encryption methods. Readers can try the other two methods.
Program 1 is indispensable, because this method is theoretically unbreakable, which other software can’t do. You can use program 2 to encrypt the key file, and use any one with good performance. The program that detects the correctness of decryption to encrypt key files, etc., can also be safely encrypted.
How to choose third-party software
1) If you use this software to encrypt a large single-character file of more than 10M, the resulting cipher text can pass the NIST test, indicating that this software performs well.
2) During decryption, if the password is entered incorrectly, no error will be reported. This one will tell.)