Volume Encryption.

Volume Encryption
Encrypted volumes allow you to keep many files securely encrypted within one encrypted file volume. Individual files can easily be accessed (assuming the volume is mounted as a drive using the password). Dismount the volume when finished and no one else will be able to access the files in the volume without 'mounting' back to a drive (and to do this the correct Pass Phrase is required).

Volume Decryption
Encrypted volumes allow you to keep files securely encrypted but the files can be easily accessed and used 'on the fly' once the volumes are opened and 'mounted' as a drive. This means you will be able to move files into and out of the encrypted volume as if it was a separate new drive (files are automatically encrypted when placed in this drive and decrypted when you use them 'on the fly')

How Does It Work?
The encryption algorithms used by QuickCrypto are advanced, current and security industry proven (with QuickCrypto encrypted volumes you have a choice from Blowfish, Advanced Encryption Standard (AES), Serpent or Twofish).

Are Volumes Securely Encrypted?
These encryption techniques have been open to all security experts to examine for many years (peer review). You achieve extremely secure volume encryption (assuming you use complex, long passwords).

Test Vectors
QuickCrypto is one of the very few encryption packages that allows direct access to its encryption algorithms to enable provenance of encryption methods through the confirmation of security/cryptographic 'Test Vectors'.

Professional Encryption
Of course there is more to providing a sound encryption system than just making sure the 'formulas' are coded correctly. Please see the Cryptographic Standards section below for much more on how QuickCrypto adheres to other professional cryptography standards.

Cryptographic 'Snake Oil'
Not all cryptography software is developed using robust and peer reviewed standards, even though the same common algorithm terms will often be included within the sales pitch (DES, AES etc.).
It is how these algorithms (and all the required supporting cryptographic functions) have been implemented that counts as much as the concept used.
Don't be fooled into using or buying encryption 'snake oil.' Use professional grade encryption implemented in software by experts!

Cryptographic Standards
Quick Crypto has been developed to adhere to the following Cryptography Standards:
PBKDF2 is part of RSA Laboratories' Public Key Cryptography Standards (PKCS), specifically PKCS #5 v2.0 (published as the IETF's RFC2898). PBKDF2 (key strengthening) makes password cracking extremely difficult.
XTS Mode
In 2010, XTS mode was approved by NIST for protecting the confidentiality of data on storage devices [24]. In 2007, it was also approved by the IEEE for cryptographic protection of data on block-oriented storage devices (IEEE 1619).

Why Use Encryption?
A company is obliged to keep its Customer data secure - both from an ethical and a regulatory point of view. Huge fines have been levied by regulatory bodies on companies who have failed to keep their data secure. Encrypting data keeps data secure.
Within the home environment, it is prudent to encrypt confidential data to keep it out of the hands of the bad guys. This improves your chances of keeping your private life, private and keeping financial information safe.

Is QuickCrypto Easy To Use?
Yes!
One of the fundamental reasons why Encryption is not used as much as it could be, is that people find it difficult to use software that easily achieves secure data.
QuickCrypto has been designed first and foremost (notwithstanding a pure 'heart' of sound cryptographiocal ability) to be supremely easy to use.
Download it and try it out for yourself!
How Do I Create/Use Encrypted Volumes?

To Create a volume:
(1) Press 'Create Vol' button,
(2) Enter a 'Pass Phrase' for the volume (or click default password button),
(3) Choose the volume size, file name and location
The encrypted volume is then created and opened ready for use!

To Mount (open) a volume:
(1) Click the 'Mount Vol' button,
(2) Enter the 'Pass Phrase' used to create the volume,
(3) Select the volume name/location
The volume is then mounted to a normal drive letter, files within can then be accessed as normal!

To Dismount (lock) a volume:
(1) Click the 'Dismount' button
And that's all! The volume is then inaccessible to anyone without the password and all files within it are encrypted!

On The Fly Encryption:
Once an encrypted volume is mounted (using the correct Pass Phrase) files can be moved to/from the volume or just accesses in place.
The files are decrypted just before they are used and encrypted just before they are stored into the volume.