Krypteringsprogram i praktiken - en översikt
Sammanfattning: The purpose of this project is to identify and evaluate encryption software that can be downloaded, free of charge from the web. We scanned the market and found a relatively large number of encryption programs. Of these we selected, based on the criterias: to be able to encrypt on file-, folder- or disk-level, as well as having support for Windows or Linux. We excluded Mac and older systems. The programs would also be free because of the limitations we set before the project began. A paid application (Folder Lock) was added by request from the client. The final selection consisted of six programs. We developed test criterias: usability, functionality and safety. The results are presented in a table. In conclusion, Folder Lock proved to have the best interface and user guidance. True Crypt was the dominant candidate among the free of charge programs when it came to the interface and user guidance, while AxCrypt provides the most when a user prefers speed instead of a well-developed interface. AxCrypt was also the most dominant candidate in functionality for less experienced users. AxCrypt comes with high portability, integration with Windows context menu , and the ability to compress files. We believe that AxCrypt is a perfect program for those users who want to encrypt individual files smoothly. True Crypt and Folder Lock offers the best functionality for more advanced users. Both programs offer similar functionality, the difference is that True Crypt can encrypt systemunits, while Folder Lock has higher portability - it is ultimately a matter of what you prefer. Finally, in the safety category, we found that AxCrypt is best suited for inexperienced users, as it uses AES-128, which is a strong enough algorithm. It also offers integrity control, file shredding and does not require any complex choices or configuration. True Crypt is the choice for more advanced users, when it comes to safety, as they offer many choices of algorithms, together with a strong key derivation function, which provides the user with more security than is required in ordinary cases.
HÄR KAN DU HÄMTA UPPSATSEN I FULLTEXT. (följ länken till nästa sida)