Avoid being a driveby victim — Stop convenient access to your data

More than 15 years ago Motorola's Information Protection Chief called his forward to our book, Cryptography Decrypted, e Everything —writing about eEverything good along with eEverything bad. (Noticeably) more true now than then.

To help deter attack we developed

DoCrypt Crypto Tools


the current US & world-wide standard and DES (previous standard) for
     message & file encryption –using password based or keyStore keys.

 Crypto fingerPrinter for data authenticity and integrity

  Logon–Password Manager stores web logon & password data

  Key Store (aka keychain, ring...)  One of cryptography's main benefits is
      one (1) key can protect all your other keys.

 

 &  options


videos chapters hands-on puzzles

some examples

· Compare security of computer-made keys to human-made keys

   · Evaluating vulnerabilities

 

· Compare secret key strengths ( DES–56,  AES–128, 256 )

   · How encryption can be corrupted

4 computerized preComputer methods demonstrate / explain method and key,
   –and how they evolved to AES.

   (more in program)

key creation & storage is done on your computer because...


...a computer that makes or shares your keys → can use your keys like you can.


*Even though one can always add more security, encryption is the best and

most simple way to protect your and our society's data from bad actors.

 

Click book for chapters

Addison-Wesley 2000