Search: 

Machine translation:
MBBSoftware
Creating software for businesses, professionals, and the home
our sites: MBBSoftware - Custom Image Presenter - Authenticate Testimonial
Act On File 2012 - The cryptor Module - The decrypt files Functionality Hi guest
Sign up
Login
Act On File Home Discover Modules Download Activation Awards Community Service  
Attributor Authenticator Comparator Compressor Cryptor Eraser Locator Protector Quantifier Act On File TV  
Encrypt Files Decrypt Files  

Decrypt Files - Restore Encrypted Information to a Readable Form Using a Password or Private Key.

Act On File Windows Compatibility Seals

This section discusses the Decrypt Files functionality of the Cryptor module.
The procedure of decrypting a file changes the content of an encrypted file to its original state. To decrypt information, one must have the appropriate password or keys and know the algorithm which was used to encrypt the data. For an explanation of the principles of encryption please review the Introduction to the Cryptor module.
Capture: Decrypt Files
Decrypt Files

Operation

To decrypt files, you need to place the encrypted files and folders into the selected items control of the Decrypt Files functionality. All selected files will be decrypted, regardless of their extension. Adding folders to the selection controls makes Act On File to decrypt either all files contained in the selected folders or all files with ".encrypted" extension depending on the selection in the "Folders content" combo box. If there are any shortcuts in the selected folders, they will be followed or ignored according the selection in the Shortcuts combo-box. To decrypt the selected items you need to supply the private key for decryption, or password and initialization vector depending on the type and algorithm. You also need to adjust the decryption controls and the destination for the decrypted files and then click OK to start the decryption process.

The decrypted files are sent to the target location. The decrypted files have their ".encrypted" extension removed and the files which do not have ".encrypted" extension now have a new appended extension to their names "[file name].[file extension].decrypted".

Controls

  
Selection Controls
Decrypt Files Selection Controls
These controls are used to select and display the files and folders for the operation. In addition to the Add Files, Add Folders and Remove buttons, you can use the standard clipboard, drag and drop, and keyboard operations.
ShortcutsSelect the behavior of the functionality in respect to any shortcuts that might be present in the selected folders.
TargetAny shortcut located in selected folder will be dereferenced and its target file or folder will be treated as if it were selected.
IgnoreAny shortcut located in selected folder will be ignored.
Folders contentSelect the behavior of the functionality in respect to the files located in the selected folders.
Decrypt only files with extension .encryptedOnly files with the extension ".encrypted" will be decrypted. Decrypted files with the ".encrypted" extension will be renamed and have the ".encrypted" extension removed. Files without the ".encrypted" extension will be unaffected.
Decrypt all filesDecrypt all files in the selected folders. Decrypted files with the ".encrypted" extension will be renamed and have the ".encrypted" extension removed. Files with any other extension will be renamed and have the ".decrypted" extension added to their names.
Operation Controls
Decrypt Files Operation Controls
and also
Decrypt Files Operation Controls Appendix
These controls are used to control the operation of the module and thus directly affect results. In order to restore the original data these parameters (and the password/key) must be the same as the ones used to encrypt the data.
TypeSelect the type of decryption required.
AsymmetricUse an asymmetric encryption algorithm to decrypt the data.
SymmetricUse a symmetric encryption algorithm to decrypt the data.
AlgorithmSelect the particular algorithm to encrypt the data.
RSA- asymmetric - Public-Private Key pair algorithm (AKA RSA). Key size should be larger than 1024 bit (128 byte), key sizes are currently typically between 1024 and 4096 bits (128 to 512 bytes).
AES 256- symmetric - AES (Advanced Encryption Standard aka Rijndael) block encryption algorithm with 256 bit key size.
AES 192- symmetric - AES (Advanced Encryption Standard aka Rijndael) block encryption algorithm with 192 bit key size.
AES 128- symmetric - AES (Advanced Encryption Standard aka Rijndael) block encryption algorithm with 128 bit key size.
RC2- symmetric - RC2 block encryption algorithm.
RC4- symmetric - RC4 stream encryption algorithm.
DES- symmetric - DES encryption algorithm.
3 DES- symmetric - The DES encryption algorithm internally applied three times.
3 DES 2 Key- symmetric - Two key triple DES encryption algorithm with a key length of 112 bits.
PaddingThe encrypting algorithms require the data which is being encrypted to be of a particular size. To adjust the size of the data to that required, the system may have used padding while encrypting it. Select the padding mechanism that has been used to encrypt the data.
None; 11B adj- asymmetric - Use basic padding.
OAEP+, 42B adj (aka: PKCS#1v2)- asymmetric - Use Optimal Asymmetric Encryption Padding.
PKCS#5- symmetric - Use PKCS#5 padding.
Cipher Mode Encryption and decryption work on blocks of data. This option controls how these blocks will be mixed.
ECB(electronic codebook) - the simplest mode - each block of data is encrypted independently.
CBC(cipher-block chaining) - uses an initialization vector, stronger than ECB, similar to the CFB mode. For symmetric encryption, the user must know the secret initialization vector. For asymmetric encryption the user is not concerned with the initialization vector, however for software developers: the initialization vector is produced by repeated concatenation (to match the size of the modulus and when required removing the extra data at the end) of the big-endian SHA1-256 hash of the public key used to encrypt the data.
CFB(cipher feedback) - uses an initialization vector, stronger than ECB, similar to the CBC mode. Not applicable for asymmetric encryption.
Byte OrderWhen blocks of data are encrypted, they can be stored in one of two directions. Different platforms work with one of these directions. Choose the same direction as the one used when encrypting the data.
Big-EndianBlocks of encryption data were stored in Big-Endian byte order.
Little-EndianBlocks of encryption data were stored in Little-Endian byte order.
Private Key
(Used for asymmetric (RSA) encryption.)
Select or enter the path to the Private Key that is to be used for decrypting the selected items. This key must be the complement of the Public Key that was used to encrypt the data. Remember to keep Private Keys safe and secret until such time as they are to be destroyed using True Delete.
Password
(Used for symmetric encryption.)
Enter the password that is to be used to decrypt the data.
Confirm [Password]Enter the password again to confirm it.
HashThe symmetric algorithms work with keys of particular sizes. In order to make any user-entered passwords usable, it is hashed, and the hash is further used to produce a key with size appropriate for the particular symmetric algorithm. Select the hash algorithm that was used when encrypting the data. The same hash algorithm must be used for both encryption and decryption or else the data will not be decrypted successfully.
I. Vector (Initialization Vector)
(Used for symmetric encryption.)
Enter the initialization vector, if applicable, which was used when encrypting the data. Entering another IV will result in failed decryption process. Initialization Vector (IV) is a block of data which is used to start the encryption with feedback algorithms. Using IV greatly strengthens the encryption, and although it is not absolutely required it is highly recommended that IV is kept secret and treated as a second "password".
Confirm [I. Vector]Enter the initialization vector again to confirm it.
LegibleToggle this checkbox to make the password and initialization vector readable or not.
Set DefaultsThe Set Defaults is a user friendly button to set the Operation Controls to a default selection of properties in order help users who might find the settings confusing.
Destination Controls
Decrypt Files Destination Controls
These controls are used to direct the output location there the module will store the decrypted files.
DestinationSelect the output type and location. Each decrypted file will have the ".encrypted" extension removed, if it had it. If not, the extension ".decrypted" will be appended to its name.
Common PlaceAll decrypted files are stored in the selected target folder. Caution is required as encrypted files with matching names may overwrite each other.
Original LocationAll decrypted files are stored in the folder where the encrypted (source) file is located.
Reflecting TreeThe same directory structure as the directory structure of the selected files and folders is replicated, starting from the selected target folder. The decrypted files are deposited in the newly created folders respective to the folder containing the encrypted.
at folderSelect folder to be used for the "Common Place" and "Reflecting Tree" options.
Further Actions Controls
Decrypt Files Further Actions Controls
These controls are used to help to automate some common activities after the process is successfully completed.
Delete Source ItemsSet this checkbox to request the module to send the source items to the Recycle Bin after a successful decryption process.
Confirm Delete [Source Items]Set this checkbox to confirm the request to delete the source items after a successful decryption process.
Window Controls
Decrypt Files Window Controls
These controls have generic meanings.
On TopSets and clears the Always On Top flag on the window. This checkbox adds or removes the window from the group of Top-most windows.
OKCommits to work and decrypts the selected items. Note, an Enter Key (password) dialog will be displayed first.
CancelCloses the window without doing any work. The last selected properties are stored.
Community Content
(To enter your comments you must be signed in. Log in or create FREE account.)
MemberComments
Be the first to comment.
Products
Act On File
Audio Control
Custom Image Presenter
Photo Window
EMCOS
Vat # Validator
Custom Image Presenter
Homepage
for Galleries and Museums
for Hotels, Resorts and Cruises
for Parks of any kind
for Any Business
Learning
Encryption and Authentication
Safe Online Communication
Authenticable Website Testimonials
Learn how to store private keys
Make The Most From Your Files
Convenient Volume Control
Photo Window - an Awesome Gift
Support
My Account
FAQ - Forum
 
Community
Blog
Email this page
Newsletter
MBBSoftware
About
Contact
Buy Now
Download
Public Authentication Key
Public Encryption Key

Sitemap
Disclaimer
Privacy
Antispam
© Copyright 2017 MBBSoftware. All Rights Reserved.

Email this page
To:
use semicolon to separate emails eg: joe@abc.com; lea@abc.com
Subject:
Message:
a link to this page will be automatically added to your message
From:
Please type the anti-bot text below.
Type text:
Thank you for subscribing to the MBBSoftware newsletter.
Enter your email address:
Please type the anti-bot text below.
Type text: