The Cipher 4.0

The program is designed to encrypt and decrypt files. Features: Encryption and decryption of files using GOST, Blowfish, IDEA, Misty1, Rijndael, Twofish, Cast128, Cast256, RC2, RC5, RC6, DES, TEA on password; Encryption and decryption of files using CHR, and BIT using the file-key; Select one or more methods of encryption; Creation of a separate encrypted file with the extension .Cip; Editor secret message; Total removal of the source file. ...

Author Perun, Ltd
License Free To Try
Price $9.00
Released 2010-02-17
Downloads 359
Filesize 3.19 MB
Requirements Windows, Linux
Installation Install and Uninstall
Keywords cypher, file, directory, encrypt, decrypt
Users' rating
(7 rating)
The CipherEncryption ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7 x32, Windows 7 x64, Win2000, Linux
The Cipher cipher - Download Notice

Using The Cipher Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of The Cipher on rapidshare.com, depositfiles.com, megaupload.com etc. All The Cipher download links are direct The Cipher full download from publisher site or their selected mirrors.
Avoid: cipher oem software, old version, warez, serial, torrent, The Cipher keygen, crack.
Consider: The Cipher full version, cipher full download, premium download, licensed copy.

The Cipher cipher - The Latest User Reviews

Most popular Encryption Tools downloads

USB Flash Security#

4.1.11 download

... AES encryption which is recognized by speedy and cipher strength in encryption algorithm has been adopted. Data ... encryption(AES256bit).AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

File Privacy

0.2 download

... (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The ...

USB Flash Security#g

4.1.11 download

... AES encryption which is recognized by speedy and cipher strength in encryption algorithm has been adopted. Data ... encryption(AES256bit).AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

Digi-Shield (PC)

1.6 download

... Technology, or NIST. Blowfish is a symmetric block cipher and Twofish was a finalist for NIST. These encryption methods protect important files, folders and drives from unwanted access. Digi-Shield encrypts ...

Paranoia Text Encryption for PC

15.0.4 download

... (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. A steganography implementation is included (concealing ... algorithm) is used in combination with chosen symmetric cipher algorithm to make a final steganogram (JPEG image). ...

Paranoia Text Encryption for Mac

15.0.4 download

... (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. A steganography implementation is included (concealing ... algorithm) is used in combination with chosen symmetric cipher algorithm to make a final steganogram (JPEG image). ...

Absolute CHAOS

3.8 download

Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length ...

CryptIt

1.4 download

... program GigAlarm, generate key files (from a stream cipher and thus not best for OTP usage) and also analyse the suitability of your chosen key file. CryptIt also has a ...

The Cipher

4.0 download

The program is designed to encrypt and decrypt files. Features: - Encryption and decryption of files using GOST, Blowfish, IDEA, Misty1, Rijndael, Twofish, Cast128, Cast256, RC2, RC5, RC6, DES, TEA on ...

USB Flash Security

5.0.0 download

... AES encryption which is recognized by speedy and cipher strength in encryption algorithm has been adopted. Data ... encryption(AES256bit).AES encryption which is recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award