Home

Maxim Falcon

Русский перевод

antigift is simple cross-platform, files & folders encryption tool (with ccrypt backend)

antigift could be used for encryption files & folders on USB-flash or HDD partition. Works out of box on Linux, Windows, Mac OS X, FreeBSD, DragonFly BSD and other on OSes. Do not required installation. Include wipe tool for wiping free space and tooll for recovery forgotten key.

What's new in version 2.0:

  • added binary support for FreeBSD, DragonFly BSD;
  • added new tool MISSKEY for recovery partitally forgotten or mistyped key during encryption;
  • bumped up to new version of ccrypt backend 1.10, updated binaries for Windows, Linux and MAcOS X.

Installation:

Download and extract achieve and put files and folders (SYS, INB and CPT) to all removable drives you have. Also you may extract and use antigift on any HDD partition or you home directory.

Requirements:

No special requirements on Windows, Linux, FreeBSD, DragonFly BSD and Mac OS X. On other platforms when you run scripts in first time you should have make(or bmake, gmake), gcc to build ccrypt. Building ccrypt invokes automatically. Also Unixes you need mount USB flash drive with exec option.

Ideology concept:

Situation when you are saving your private data and public data on one removable drive is quite possible. Messing up private data and public ones makes you be more careless.
If you lose your USB drive or forget it behind in public places, it simply means you gift your data to anyone who will find it. Antigift is a tool which prevents such situation. The best part of this application is you do not have to go through any tedious installation procedure; instead you can use it on the run and also it is cross platform!

I assume you know what data is your private one and what data is public one. I believe there are no reasons to encrypt public available data (e.g. video, music, etc) which you could easily download from Internet. So first make yourself to separate your real private data and public ones.

Description of folders and files inside antigift:

INB - inbound folder for private data(for encrypted and decrypted)

SYS - system folder with program ccrypt for different platforms

CPT - folder with encrypted files

CRYPT.sh - encryption script for Unix/Linux systems and Mac OS X

CRYPT.BAT - encryption script for Windows

DECRYPT.sh - decryption script for Unix/Linux systems and Mac OS X

DECRYPT.BAT - decryption script for Windows

MISSKEY.sh - for recovery partially forgotten or mistyped key for Unix/Linux and Mac OS X

MISSKEY.bat - for recovery partially forgotten or mistyped key for Windows

WIPE.sh - script for wiping free space to clear deleted files on Unix/Linux, Mac OS X

WIPE.BAT - script for wiping free space to clear deleted files on Windows

Just follow few simple steps to encrypt and decrypt the files or folders.

To encrypt your private data:

  1. Move(Cut and Paste) your private data to inbound INB/ folder
  2. Then click on CRYPT.bat if you have Windows. Run ./CRYPT.sh on Linux, MacOS X and on any other OS.
  3. Wait until encryption finish.
  4. Your private data will be encrypted and placed to CPT folder. Extension of each file will be *.cpt

Pic. 1 Encrypting on Windows
Pic. 1 Encrypting on Windows

Decryption is similar:

  1. Copy your private encrypted *.cpt files or folders from CPT/ directory to inbound folder INB/
  2. Then click on DECRYPT.bat if you have Windows. Run ./DECRYPT.sh on Linux, MacOS X and on any other OS.
  3. Wait until decryption finish.
  4. Your private data will be decrypted, work with it in inbound folder INB/.

After finishing your work do not forget to encrypt with CRYPT.bat or ./CRYPT.sh again.

Pic. 2 Decryption in Linux
Pic. 2 Decryption in Linux

Recovery of partilly forgotten or mistyped key:

If you entered the wrong part of the key or have forgotten some of the characters entered during password setting combination, then decrypt the data will be very difficult. You have to remember the full and right key combination or try to pick up random keyed characters which is quite time-consuming and boring deal. Antigift now include easy tool which allow automatical brute force part of you key, but only small part. If you make a mistake more then two characters or forget more then 2 letters or number of your key - this tool will be useless. I other cases recovery of forgetten one or two symbols can be done very quickly, the tool will show the correct password in a few second.
To do this:

  1. Copy the encrypted files *.cpt from the from CPT folder to input folder INB/.
  2. Then click on MISSKEY.bat, if you work in Windows. Or run ./MISSKEY.sh in Linux and any other OS.
  3. Enter the part of key which you remember and press ENTER.

Wait for the brute forcing of the key will be finished. If you entered key differ by 1-2 characters within a few seconds you will see the right key combination.

Pic. 3 Recovery of forgotten key in Linux
Pic. 3 Recovery of forgotten key in Linux

Then run or DECRYPT.bat or ./DECRYPT.sh, enter founded key and decrypt your data.

Wiping data of deleted files:

  1. Click on WIPE.bat if you have Windows. Run ./WIPE.sh on Linux, MacOS X and on any other OS.
  2. Wait for wiping data is finished.

Note for wiping out data:

Default behavior of ccrypt(used as backend) is to replace a space on disk which was used for original unencrypted file by encrypted file.
You do not need to wipe out free space with zero if you are using ccrypt.
Just do not forget to move or cut/paste your private data instead copy one.
If you make double copy of original files and then delete it you need to run wiping scripts WIPE.bat

Pic. 4 Wiping out free space on Windows
Pic. 4 Wiping out free space on Windows

Note compressing data:

You may compress your private data. But compress your private data before encryption(as after encryption compression will ineffective).
And you need to wipe out your data after you delete uncompressed original files.

Note for recovering damaged data:

If your encrypted file was modified or damaged you could recover it partially using -m switch( --mismatch) of ccrypt utility. Of course it will recover data only from beginning of file to position it was modified. For details please refer to ccrypt documentation.

ccrypt was developed by Peter Selinger:

http://ccrypt.sourceforge.net/