InvisibleSecrets has been aquired by East-Tec. Support & development of the product will continue. Check out the new product page...

Cryptography Software

Version 4.7
Windows 7 Compatible

Cryptography Software

Cryptography Software

We are living in the information age.
Data transmissions are vital and became a necessity nowadays. Whether you exchange private messages, or business / commercial secrets, you must protect your confidential information from hackers, your boss, or secret services using cryptography software.

Why use cryptographic software ?

We live in an insecure world where unwanted persons can access your personal information ( like e-mails or personal desktop documents ) and often use it against you.

Encryption pre-dates the Internet by thousands of years. Going back in time, Julius Caesar was an early user of cryptography. He sent messages to his troops using a secret code: a letter in the alphabet was replaced by one say 5 positions to the right. So, an "A" became an "E", "B" became "F" and so on. For example the word RETURN would become VJYZVS. The downside of this practice, this cipher can be easily broken by either figuring out a pattern, by brute force or by getting ones hands on a plaintext and ciphertext combination to deduce the pattern.

Encryption is the translation of data into a secret code. To read an encrypted file, you must know the correct password (also called key) that allows you to decrypt it. Encryption is based on encryption algorithms - a process capable of translating data into a secret code.

Invisible Secrets 4 uses strong cryptography: AES-Rijndael, Blowfish, Twofish, RC4 (RC4 is a registered trademark of RSA Data Securities Inc.), Cast128, GOST, Diamond 2, Sapphire 2.

Cryptography - Encrypt files

Cryptography - Decrypt files

Invisible Secrets 4 - Cryptography software is shell integrated (available from Windows Explorer), so the encryption operations are easier than ever.

Cryptography Software

Some of Our Clients

Special Offers


Invisible Secrets' appeal lies in its ability to demystify the complicated subject of data security and provide even novice users with a valuable tool for safeguarding their data.

Overall, I consider this one of the best-written programs I've looked at. Very well designed. Very functional. The programmers included enough to make it a viable business program, but still have made it attractive to the individual user. A "MUST" for anyone worried about file and password security.

Software Download

More awards...

Functions & Concepts