Installation and uninstallation

Installation

Just run CNG32Setup.exe (32-bit) or CNG64Setup.exe (64-bit) and follow the installation process. All settings will be saved in the Windows registry. The installation process will create a shortcut on your desktop and folder CryptoNG on your Windows start menu.

Uninstallation

Go to "Programs - Uninstall Program" applet in the Control Panel. Select CryptoNG and click "Uninstall" button. All created shortcut, folders and registry settings will be removed automatically.

Registering CryptoNG

It's easy - all it takes is a few simple steps!

  1. Click the main application button and select Register product.
    image001.png
  2. The CryptoNG Registration dialog will be displayed and the User ID field must be populated with alpha-numeric value. Copy the value from the User ID field.
    image002.png
  3. Click the Buy now button. This will take you to a secure payment page through PayPal. Under Special instructions there is a line User ID and an Add link.
    image003.jpg
  4. Click on the Add link. This will open a new window. Paste your User ID. If you skip this step you may email your User ID later to support@cryptong.com from the same email you used in PayPal.
    image004.jpg
  5. Complete your payment.
  6. Your activation code will be sent to the email address you provided to PayPal within 24 hours of the PayPal approval.
  7. Paste the activation in the Activation code field and type your registration name in the User Name field.
  8. Click on the Register button. After a successful registration the Register Product menu item will be disabled.

The CryptoNG interface

CryptoNG1.png
  • Navigation pane - show or hide the folders pane.
  • Caption bar - show or hide the caption bar.
  • Status bar - show or hide the status bar at the bottom of the main window.
  • Up (Alt+Up) - moves one level up in a hierarchy of shell items.
  • Layout - change how the folders look in the window.
  • Refresh (F5) - updates contents of the Folders and Files pane.
  • Set startup folder (Ctrl+S) - saves startup folder location. CryptoNG will reload this folder at startup.
  • Select all (Ctrl+A) - selects all files.
  • Select none (Ctrl+N) - clear all your selections.
  • Invert selection (Ctrl+I) - reverce the current selection.
  • Open (Ctrl+O) - open the selected file with the default program.
  • Properties (Alt+Enter) - view the properties for selected file.
  • Encrypt (Ctrl+E) - encrypt selected files.
  • Hash (Ctrl+H) - calculate SHA256 of a file.
  • Decrypt (Ctrl+D) - decrypt selected files.
  • Wipe (Ctrl+W) - wipe selected files.

Using CryptoNG

CryptoNG is simply run by double-clicking the CryptoNG.exe file (default location: "C:\Program Files\CryptoNG\CryptoNG.exe") or one of the shortcuts on the desktop or in the start menu that you may have created during the installation of CryptoNG.

Encrypting Files

Open the folder with the files you need and select the files to be encrypted. To select multiple files hold down the Ctrl key. To select all files press the button Select All or Ctrl+A. Selecting a single file requires you to simply double click on the file. After you select needed objects, click the Encrypt button (Ctrl+E). Enter the encryption password in the Enter Password field of the dialog box and repeat the password in the Verify Password field. Click OK to encrypt the file. If you want to cancel the encryption, click the Cancel button.

Decrypting Files

Open the folder with the files you need and select the files to be decrypted. To select multiple files hold down the Ctrl key. To select all files press the button Select All or Ctrl+A. Selecting a single file requires you to simply double click on the file. After you select needed objects, click the Decrypt button (Ctrl+D). Enter the decryption password in the Enter Password field of the dialog box. Click OK to decrypt the file. If you want to cancel the decryption, click the Cancel button.

Wiping Files

Open the folder with the files you need and select the files to be wiped. To select multiple files hold down the Ctrl key. To select all files press the button Select All or Ctrl+A. After you select needed objects, click the Wipe button (Ctrl+W). The operation of wiping takes time. By default, the program rewrites the file 3 times, but you can change this parameter. If you want to cancel the wiping, click the Cancel button.

Encryption algorithm

About encryption

Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption.

Advanced Encryption Standard (AES)

Advanced Encryption Standard (AES) is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. In the United States, AES was announced by National Institute of Standards and Technology on November 26, 2001 after a five-year standardization process in which fifteen competing designs were presented and evaluated before it was selected as the most suitable. It became effective as a Federal government standard on May 26, 2002 after approval by the Secretary of Commerce. AES is the first publicly accessible and open cipher approved by the National Security Agency for top secret information.

Galois/Counter Mode (GCM)

Galois/Counter Mode (GCM) is a mode of operation for symmetric key cryptographic block ciphers that has been widely adopted because of its efficiency and performance. It is an authenticated encryption algorithm designed to provide both data authenticity (integrity) and confidentiality. GCM is ideal for protecting packetized data, because it has minimum latency and minimum operation overhead. GCM has been proven secure in the concrete security model.

License agreement

This is a legal agreement ("License Agreement") between you (either personal or corporate) and Vassil Arabadjiev ("Author") for the software product "CryptoNG" ("Software"). BY COPYING OR USING THE SOFTWARE IN ANY KIND, YOU AGREE TO BE BOUND BY ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, DO NOT USE OR COPY THE SOFTWARE.

The Author Owns the Software

The Software is owned exclusively by Vassil Arabajiev. The price paid by you for the Software is only for a license fee granting you only the rights set forth in this License. The rights granted in this License are limited to Vassil Arabajiev's intellectual property rights in the Software and do not include any other patents or intellectual property rights.

You are Only Granted a Limited, Non-Exclusive and Revocable License to the Software

Vassil Arabajiev grants to you, and you accept, a limited, non-exclusive and revocable license to use the Software, in machine-readable, object code form only. You shall only use the Software only as authorized in this License. This License does not convey to you any ownership rights or any other interest in the Software.

Scope of License

This License allows you to install and use one copy of the Software on a single computer. A valid license must be purchased for each computer on which the Software is installed. You may not copy, adapt, translate, decompile, reverse engineer, disassemble, attempt to derive the source code of, modify, or create derivative works of the Software or any part thereof. You shall use all reasonable efforts to protect the Software from unauthorized use, modification, reproduction, distribution or publication. You may not lend, rent, lease or sublicense the Software or make any uses or copies of the Software that are not specifically authorized by the terms of this License Agreement.

Term

This license will become effective on the date you acquire the Software and will remain in force until terminated. You may terminate the license, at any time, by removing the Software from your computer and destroying the original Software. This License will automatically terminate if you breach any of the terms or conditions set out in this License. Upon termination of this License for any reason, you shall immediately cease all use of the Software, remove the Software from your computer.

Disclaimer of Warranties

YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT USE OF THE SOFTWARE IS AT YOUR SOLE RISK AND THAT THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCURACY AND EFFORT IS WITH YOU. THE SOFTWARE IS PROVIDED "AS IS", WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND.

Limitation of Liability

TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR PERSONAL INJURY, OR ANY INCIDENTAL, SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES WHATSOEVER, INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, LOSS OF DATA, BUSINESS INTERRUPTION OR ANY OTHER COMMERCIAL DAMAGES OR LOSSES, ARISING OUT OF OR RELATED TO YOUR USE OR INABILITY TO USE THE SOFTWARE, HOWEVER CAUSED, REGARDLESS OF THE THEORY OF LIABILITY (CONTRACT, TORT OR OTHERWISE) AND EVEN IF THE AUTHOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME JURISDICTIONS DO NOT ALLOW THE LIMITATION OF LIABILITY FOR PERSONAL INJURY, OR OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION MAY NOT APPLY TO YOU.

Severability

If for any reason a court of competent jurisdiction finds any provision of this License, or portion thereof, to be unenforceable, the remainder of this License shall continue in full force and effect.

Let's Get in Touch

Top