geya-92-ood-file-protect-system-logo.jpg

File Protect System

File Protect System

File Protect System (FPS) is a professional solution for the personal data protection.

The application can be used alone to encrypt files and folders, or as a component of a complete cyber defense system. FPS allows you to build a reliable confidential information exchange system using embedded e-mail client.

The application provides the user the option of choosing an encryption algorithm. Encryption can be done using a password or a digital objects (images or arbitrarily chosen file). Encrypted files can be stored on the local disk, on a server, on external storage or in the cloud.

With FPS you can create packages of protected files. This feature is extremely important when creating archives or backups of critical information.

A specialized text editor has been added to the application. The editor lays the protection of the application code in the development process.

If necessary, all processes can be documented in real time, allowing for subsequent analysis and optimization.

The application complies with the requirements of the EU General Data Protection Regulation (GDPR)

The standard encryption algorithms used in the application are validated within NIST’s Cryptographic Module Validation Program (CMVP). FPS was developed in accordance with the requirements of ISO 9797 and ISO 9798-2. The development process complies with the requirements set out in ISO / IEC 15408-1, which guarantees high reliability.

File Protect System can convert any computer with an Windows operating system installed to extremely powerful cipher machine as used by special services and government agencies.

The application includes the following standard encryption algorithms:

– Advanced Encryption Standard (block size of 128 bits, key lengths: 128, 192 and 256 bits)
– Blowfish
– Haval (256 bit, 5 passes)
– CAST-128 (CAST-5)
– CAST-256 (CAST-6)
– Information Concealment Engine (ICE)
– Information Concealment Engine 2 (ICE-2)
– ICE Encrypt
– MISTY-1 (Mitsubishi Improved Security Technology)
– Ron’s Code 2 or Rivest’s Cipher 2 (RC-2)
– Ron’s Code 4 or Rivest’s Cipher 4 (RC-4)
– Ron’s Code 5 or Rivest’s Cipher 5 (RC-5)
– Ron’s Code 6 or Rivest’s Cipher 6 (RC-6)
– Serpent
– Tiny Encryption Algorithm (TEA)
– Twofish

Affordable hash functions:

– Secure Hash Algorithm 1 [SHA-1]
– RIPEMD-160
– Haval [256 Bit, 5 passes]
– Message Digest 5 [MD-5]
– Message Digest 4 [MD-4]
– Tiger
– RIPEMD-128
– SHA-256 (SHA-2 family)
– SHA-384 (SHA-2 family)
– SHA-512 (SHA-2 family)

Accordance with accepted standards:

ISO 10116: Information Processing ? Modes of Operation for an n-bit block cipher algorithm.
ISO 9797: Data cryptographic techniques ? Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.
ISO 9798-2: Information technology ? Security technicues ? Entity authentication mechanisms ? Part 2: Entity authentication using symmetric techniques.
ISO 10118-2: Information technology ? Security technicues ? Hash-functions ? Part 2: Hash-functions using an n-bit block cipher algorithm.
ISO 11770-2: Information technology ? Security technicues ? Key management ? Part 2: Key management mechanisms using symmetric techniques.


Get File Protect System now:


Purchase the full version for unlimited use

Latest posts by GEYA-92 OOD (see all)

You may also be interested in:

  • File Protect System LE File Protect System (FPS) is a semi-professional application for files and folders encryption. The application includes a module for […]
  • Appnimi MD5 Decrypter Appnimi MD5 Decrypter helps in decrypting any MD5 hash. In appropriate infrastructure it works at a speed of more than 1 million […]
  • axsStrongBox axsStrongBox is a COM component which provides secure data encryption (public and private key), digital signatures, hashing, compression […]
  • LogonExpert LogonExpert is a Windows automatic logon tool for your home/office computer or corporate server. LogonExpert quickly and securely logs in […]
  • Do Your Data Recovery for Mac Enterprise Do Your Data Recovery for Mac Enterprise gives enterprise users a comprehensive Mac data recovery solution at an affordable price. This […]
  • Exe Wrapper Exe Wrapper allows you to protect any Exe-file with its own password from non-authorized execution. And it can modify the main icon of […]
  • idoo USB Encryption USB Encryption Software It is your best choice to protect your data in USB drives by idoo USB Encryption Software, which can protect your […]
  • Cool File Encryption You may have a network with a firewall and Windows XP SP2 comes with its own protection, but while these are good to have,  what […]
  • FileStream Secure Disk FileStreamA? Secure Disk is the perfect solution for protecting sensitive information from theft and other attacks. This program makes a […]
  • Image Printer Driver Source Code upgrade NED Image Printer Driver source code upgrade to version 3.1. Includes support for Windows Vista and Windows 7 and the new Exit32 dlls for […]

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>