CryptoSys PKI contains various utilities for handling both the encryption and signing of messages using the cryptographic Public Key Infrastructure. CryptoSys PKI can create, read and manage public/private key pairs, perform RSA-based public/private key encryption/decryption and sign messages using the well-known and mathematically secure RSA public key cryptography algorithm. CryptoSys PKI is unique in its ability to create and manage X.509 certificates, CRLs (Certificate Revocation Lists), and perform 7-pass DOD (Defense Information eXchange) cryptographic wipe routines on message files.
CryptoSys PKI is the first Open Source, multilingual C# solution that enables programmers to perform basic cryptographic operations from a single program. The developer-friendly design includes an easy-to-use and visually impressive.NET user interface. CryptoSys PKI is written in native C# 3.0 code and uses Microsoft’s.NET Framework 2.0 or.NET 3.0, and can be installed from a standard Visual Studio 2005 C# project template.
CryptoSys PKI can create, read, and manage RSA public/private key pairs; perform RSA-based public/private key encryption and decryption; sign and verify the digital signature in a signed-data CMS (Cryptographic Message Syntax) object; generate, read, and manage RSA-based cryptographic hashes of files, (SHA-1, MD5, MD2, SHA-224, SHA-256, SHA-384 and SHA-512), using the well-known and mathematically secure MD2, MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 message digest algorithms; generate HMAC keyed-hash message authentication values, and perform 7-pass DOD (Defense Information eXchange) cryptographic wipe routines on message files.
* A large range of options allow you to customize how CryptoSys PKI works
* Can be used to encrypt and decrypt files.
* Can be used to sign and verify the signature in a signed-data CMS (Cryptographic Message Syntax) object
* Can be used to encrypt and decrypt files using the crypto modules
* Can be used to perform RSA-based digital signature verification in a signed-data CMS object
* Can be used to generate, read, and manage RSA-based cryptographic hashes of files (SHA-1, MD5, MD2, SHA-224, SHA-
CryptoSys PKI Crack Keygen is a toolkit to create and verify cryptographic message objects using the CMS PKCS#7, which are used for communication security purposes.
The toolkit uses a modular design, to provide functionality in separate toolkit components. The user is able to decide what is most useful to them at the time they are creating the cryptographic object. For instance, the encrypted-data CMS object can be generated using one of the toolkit components. If the user wants to create a message that is signed with a public key, they could use the CryptoNet component. If they want to create an object that is verified with a public key, they could use the Certificates component, and so on.
Please note that the software is not “intended to prevent” or “guarantee” the security of your data. Please see the the “Full Disclosure” section at the bottom of this document for more information.
CryptoSys PKI is a software toolkit to encrypt or sign CMS object data using the “data stream” which is specified in the ISO-8859-1 character encoding.
CMSEncryptor consists of three components:
CMSEncryptorStatic: this component provides a data stream input and output utility; and a command-line option for specifying the input data format. This component is optional, and can be used separately.
CMSEncryptorDynamic: this component implements CMS encryption and decryption operations. It creates a binary message signature and a certificate for a message if the –certificate-to-sign option is specified at execution. This component is required.
CMSEncryptorDynamicHelp: this component provides information and options on the use of the CMSEncryptorDynamic component.
CMSEncryptorDynamicCommandLineOptions: this component provides command-line options for the CMSEncryptorDynamic component. It also displays this information at execution.
CMSEncryptorStaticCommandLineOptions: this component provides command-line options for the CMSEncryptorStatic component. It also displays this information at execution.
CryptoSys PKI is a toolkit to create and verify cryptographic message objects using the CMS PKCS#7, which are used for communication security purposes.
Usage: CMSEncryptor [Options]
Key management is a core area of CryptoSys PKI, providing tools for RSA encryption/decryption, generation of public/private key pairs, certificates, revocation lists, X.509 certificates and X.509 certificate signing requests. All in a Windows API environment.
Also included in this part of the toolkit are direct access to the Windows CryptoAPI, the ability to create and read both encrypted and signed enveloped-data objects using the existing CryptSrvr API, create and manage X.509 certificate objects and CRLs, prompt for a password and allow for an external registry to be used for the key and certificate store.
The user can create, read and write enveloped data, signed enveloped data, and either encrypted or signed objects. CryptoSys PKI’s primary use is to enable the creation and verification of such objects. The toolkit does not rely on any commercial cryptographic libraries, and the functionality is provided using the existing Windows CryptoAPI. This is ideal for Windows developers who wish to integrate cryptographic tools into their applications.
CryptoSys PKI Architecture:
CryptoSys PKI consists of a core C++ class library, the X.509 libraries and the Cryptography Utilities with links to CryptoAPI. It is compiled for both 32-bit and 64-bit Windows platforms.
The toolkit is based around the CryptSrvr API. This allows a developer to create, read, write and verify enveloped-data and signed-data objects using the existing CryptSrvr API, and to create, read, write and verify X.509 certificates and X.509 certificate signing requests.
The core CryptoSys PKI class library is written in C++ and consists of four core classes:
CryptoSys: Defines the interface for a high level message encrypting and decryption toolkit; the CryptoSys utility class provides all the tools for encryption and decryption of encrypted and signed messages.
CryptoSys::CryptoKey: Represents a symmetric key to be used in encryption or decryption.
CryptoSys::CryptoData: Represents an enveloped data or a signed data object; both contain a header and data section which are protected with symmetric keys.
CryptoSys::Certificate: Represents an X.509 certificate to be used in the signing of enveloped data or signed data objects.
The X.509 libraries also include a class library to process the encoding of X.509 certificates and certificate signing requests
CryptoSys PKI was developed to be a programmer’s toolkit for Windows systems that enables the user to create and read secure cryptographic messages encrypted or signed using RSA public key encryption. It provides strong crypto using established non-patented technology to international standards.
You can create and read both enveloped-data (encrypted) and signed-data Cryptographic Message Syntax (CMS, PKCS#7) objects, which you can use in S/MIME email messages. You can verify the digital signature in a signed-data CMS object; generate and manage RSA public and private keys; carry out “raw” RSA encryption and decryption, and create, read and manage X.509 certificate files and CRLs.
Other utilities included in the toolkit are the ability to generate message digest hash values using SHA-1, MD5, MD2, SHA-224, SHA-256, SHA-384 and SHA-512; generate HMAC keyed-hash message authentication values, wipe files using 7-pass DOD standards, generate cryptographically-secure random numbers to the strict NIST SP800-90 standard, prompt for a password, and convert to and from base64- and hexadecimal-encoded formats.
CryptoSys PKI System Requirements:
CryptoSys PKI was designed to be used on the Windows platform and is intended to be used in an offline non-networked environment. CryptoSys PKI can be used to sign emails without the need for network connectivity.
CryptoSys PKI Software License:
CryptoSys PKI is a freeware application available for non-commercial use. It has been tested under Windows XP, Vista and 7.
General Instructions on How to Use CryptoSys PKI:
CryptoSys PKI will provide you with some examples of how to encrypt and sign email. However, you will need to decide on your own if this is suitable for you. To start encrypting and signing an email with CryptoSys PKI:
Click on the button “Convert to Encrypted and Signed CMS Format”. CryptoSys PKI will prompt you for the email address that you wish to encrypt. Enter the email address that you wish to encrypt, then click on “Next”. You will be prompted to enter a password that will be used to encrypt the email, and click on “Next”. You will then be prompted for a “Key Info” file to use for encrypting the email. The file that is specified is usually in “.pki” extension, and is usually in your profile folder (i.e. C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\CryptoSys PKI\CryptoProviders\%USERNAME%_%TIME%\keyinfo\*). CryptoSys PKI will then prompt you for a password, then click on “
OS: Windows® 8 / 7 / Vista / XP (32-bit / 64-bit)
• 2 GHz
• Intel Core i3 (Sandy Bridge and Ivy Bridge)
• AMD Phenom II X2
• 1 GB RAM
• Nvidia GeForce GTX 460 / ATI Radeon HD5870 / Intel HD3000
• Intel HD4000
Hard Disk Space:
• 700 MB free space
• DirectX 9
104 total views, 4 views today