CHOICE OF CRYPTOPRIMITIVES
(FPS-FE edition)
The choice of crypto-primitives is a key feature in the File Protect System
Unlike other types of encryption systems, it is possible to use different combinations of crypto-primitives, which guarantees a much higher degree of protection.
Selection of file encryption primitives
Activation of the file encryption module can be done in two ways as follows:
- By selecting the function from the main menu of the control panel, Encryption - File crypto settings, or by using the key combination [ Ctrl + F7 ];
- By means of the corresponding system button from the encryption setup module.

The module for setting up the crypto process allows the selection of an encryption algorithm, encryption mode, hash function, entering the current password, etc.
Also, the selected combination of crypto-primitives can be stored or modified according to current needs.

The module include the following system buttons:
- Load combination of crypto-primitives.
- Save combination of crypto-primitives.
- Create system report
- Test encryption of the selected file.
- Test decryption of the selected file.
- Enter the settings in the system
- Restore settings to their original state
- Delete settings
- Select a file to be encrypted (or decrypted).
- Select a file in which the result of the encryption (or decryption) will be stored.
- Cancel changes made.
- Operational verification of selected crypto-primitives.
Testing crypto-primitives
Testing the combination of crypto-primitives is crucial for the proper conduct of encryption and decryption processes.
In order to perform the test, you need to select a file that will be encrypted. This is done by clicking on the double arrow selecting the file to be encrypted. As a result, the file explorer is activated and a file is selected to be used for test encryption.

It is recommended that the result of the encryption process be saved in a file with a different name so that a better comparison of the results can be made.
Once the file is selected, click the Encryption button or use the key combination [ Alt + F9 ]. This will allow the file to be encrypted using the selected combination of crypto-primitives, and the results of the process will be recorded in the control table for further analysis. In this way, the operability of the selected set of crypto-primitives will be checked and the parameters of the encryption process will be determined.

The test for decrypting files is performed by clicking on the Decrypt button or using a key combination [ Alt + F10 ] as shown in the image.

IMPORTANT!
It is important to make sure that the decrypted file is absolutely identical to the source file (the file that was encrypted).
Only if the two files are identical can you proceed to record the selected set of crypto-primitives.
If the process is completed successfully, the encryption indicator will be green and the decrypted indicator will be orange. This means that the resulting (encrypted) file is ready for decryption.

Note: If the cipher used is block, the initialization vector (IV) will be used in the encryption process, the value of which is displayed in hexadecimal in the corresponding field.
IMPORTANT!
It is recommended that the combination of crypto-primitives used and tested be properly documented.
To do this, the File Protect System includes an official reporting system that automates this process.
To prepare a report, simply click on the Report button as shown in the image or use the key combination [ Ctrl + P ].

System reports can be printed as well as exported in various formats such as PDF, HTML, RTF, etc ..

Note: You can find more information about system reports in the appropriate section.
Once a combination of crypto-primitives is selected and verified, the information about them needs to be entered into the system. This is done by clicking on the Apply settings button or using the key combination [ Ctrl + Enter ].

This puts the system ready for encryption.
IMPORTANT!
If the used crypto-primitives are not pre-configured, the standard encryption will be performed using the default settings.
For the FE version of Fillet Protect System they are as follows:
- Encryption algorithm - Twofish;
- Encryption mode - OFB;
- Hash function - SHA-384 [ SHA-2 family ].
If necessary, the default settings can be restored by clicking the Trash button or using the key combination [ Alt + Del ]. In this case, the crypto system will be restored to its original appearance, which it had after installing the application.
If you use Refresh or [ Alt + F5 ], the system will restore the last entered settings that have been checked and approved for use.
If this information was useful to you, please click on Like.