Product - SCRYPT

Encryption program Scrypt

The encryption/decryption software named Scrypt is developed by Salutis Systems. The program is designed to encrypt/decrypt individual files and then share them via transmission channels such as e-mail or saving files to secure them against leakage of contained information, therein.

Scrypt is a program following specific requirements and meeting the criteria required by the encryption safety standard. The program is designed for the operating system Windows (32 and 64-bit) including Windows XP upto Windows 10. We are preparing a modification for other operating systems, as well. File type or the size is not limited.

Access to the original contents of encrypted files is only allowed to authorized users after successful password authentication, which requires the basic version of the application or after inserting the correct encryption key that is located on the authentication medium - the USB tokens. The second option is for advanced users who require a higher level of data protection.

Features of the Scrypt system

A brief description of the Scrypt v2.1 system properties for Windows 7 to Windows 10 for x86 and x64 processor architectures:

  • Scrypt software is designed for all 32-bit and 64-bit NT (New Technology) operating systems such as Windows Vista, Windows 7 to Windows 10 for 64-bit processor architecture,

  • the outdated Windows XP operating system is only partially supported by the application, which does not provide full operator comfort,

  • up-to-the-minute operating systems, application management is as simple as possible, allowing for encryption or decryption for up to two to three mouse clicks,

  • files are encrypted / decrypted individually or by groups in directories,

  • duplicate and multiple encryption of files is also allowed, as well as under others session created with different master keys,

  • decryption is only available after successful authentication or use advanced 2-factor authentication, after inserting the USB GNT token into the USB slot and enter an authentication password or PIN (optional),

  • Scrypt uses a two-level key management,

  • successful authentication creates so-called an encryption session that holds the main encryption key during its lifetime,

  • the session lifetime is up to the end of the session or the session is automatically terminated after the specified period of inactivity of the PC user, typically 30 minutes for the base version of Scryptu, or 15 minutes for the advanced version of Scrypt, which is necessary for security reasons,

  • ending the session with the keys in the memory safely deleted,

  • session uses the main encryption key of the parent version created by the derivative from an authentication password or in an advanced version is loaded from the token,

  • for each file processing transaction (encryption or decryption), the random number generator dynamically creates a so-called " the second-level data encryption key to which encrypt / decrypt custom file data,

  • the data key is off the session protected by encrypting the main key, which is the key first level,

  • the second level key is stored in the encrypted form in the header of the encrypted file and is always different after the encryption and decryption of the same file is repeated,

  • Protected must be mainly a master encryption key that is created from a secret password or is stored in the token if a higher security requirement is required,

  • Encrypting the high-quality cryptographic algorithm SEA-64A or AES256 (default setting) with the master encryption key stored outside the PC with Scrypt installed will provide a high level of protection for information stored in encrypted files,

  • the original open text file will be safely deleted after encryption. by wiping random data, and on disk or other media where the original file was saved, only an encrypted file remains encrypted after encryption,

  • The encryption system uses a 256-bit AES256 or SEA-64A algorithm to encrypt the software,

  • 100 percent compatibility with the file system that is used by the operating system,

  • Scrypt control is enabled via the system tray icon,

Access passwords for user authentication with USB token have a maximum length of 8 characters. Instead of passwords, PINs with a length of 4 to 8 digits can also be used. When using Scryptu without using an authentication subject, an access password with a length of practically unlimited (maximum 256 characters) is used to make the contents of the encrypted file accessible. The password needs to be remembered well because it will be necessary for decrypted encrypted file or group of files.

System requirements

The following minimum configuration is recommended for installing Scrypt:

  • Intel Pentium CPU and x86 or x64-compliant,

  • Minimum 1 GB RAM for x86 architecture or 2 GB RAM for x64 architecture,

  • at least 100 MB of free disk space,

  • Compatible NT operating system such as Windows Vista, Windows 7 to Windows 10 with x86 or x64 architecture,

  • CD ROM drive for installing from CD ROM or USB port for installation from USB media.

Contact us for more information