Home
Name Modified Size InfoDownloads / Week
v2-Build140 2018-06-28
v2-Build130 2016-10-13
v2-Build123 2016-02-14
v2-Build122 2016-02-04
v2-Beta-Build118 2015-05-30
v2-Alpha-Build37 2014-11-08
v1,0-Build-2 2012-03-16
README-skcc-v2.0-build-140.txt 2018-06-28 3.1 kB
Totals: 8 Items   3.1 kB 1
StrongKey CryptoCabinet - from StrongAuth, Inc.
-----------------------------------------------

This is the 2.0 release of the StrongKey CryptoCabinet (SKCC),
a web-application that allows you to encrypt files and store
them in public or private clouds.  This build (140) makes minor
changes to adapt to the modified FIDO U2F JavaScript 1.1 RD:
https://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-u2f-javascript-api.html

What makes the SKCC special from other cloud-encryption software?

- It stores files on AWS S3, Microsoft Azure or Eucalyptus Walrus 
  based cloud-storage - you can choose which cloud at encrypt-time;
- It uses the StrongKey CryptoEngine (sourceforge.net/projects/skce)
  to escrow keys in an on-premises, centralized key-management 
  system (StrongAuth KeyAppliance);
- It allows specifying who can decrypt the file(s) from LDAP groups -
  either Micorsoft AD or other LDAP Directories;
- Since the encrypted-file's metadata contains authorization information
  for decryption, it digitally signs encrypted-file metadata to ensure 
  the file hasn't been tampered with after encryption - the signing key
  can be on a FIPS 140-2 certified hardware security module, if desired,
  or a software-based JCEKS keystore; 
- It is FIDO U2F-enabled.  You can register your FIDO U2F token with
  the application and use it strongly-authenticate to the web-app. It
  uses our open-source FIDO Certified U2F server (see URL above);
- It can use FIDO U2F "authorization" from a user's hardware Token
  before decrypting files, for stronger security; and
- ....more.   

The SHA256 digests of the files are:

70238b222435ee842e4d0358af57ddcdf813e596231d38ce2bcd5349bc0558e2  skcc-v2.0-build-140.zip
a35bc0ea5447b135406b02e95e54aa2ed0cd1ddf646dec0ba610754315e19a67  skcc-src-v2.0-build-140.zip

The software is configured to work with our DEMO KeyAppliance on
the internet.  The generated symmetric keys are sent there for
storage and retrieval.  Please DO NOT attempt to use the DEMO
machine for PRODUCTION use - there are no guarantees around the
availability of the DEMO appliance - it exists purely to showcase
the capabilities of our products and to allow you to play with 
the SKCE to try it out.  If and when you decide to use the SKCE and
or SKCC in your production applications, you must either have your 
own KeyAppliances, or build your own key-management solution to
use with the SKCE (we, obviously, hope that you'll buy our appliance
and support us so we can bring more cool features to you in the 
appliance and the SKCE/SKCC).

Download the binaries, source and give it a spin.  Check out the
wiki on this site for details on how to install the SKCE/SKCC. You
can also test this application at https://fidodemo.strongauth.com/skcc
to see how it works; if you have a FIDO U2F Token, check out the
Settings tab.

If you have questions, post them on the forum at this site and we'll 
get back to you as soon as possible.  We're interested in your feedback.

Thank you for your interest and support.

StrongAuth, Inc.
Source: README-skcc-v2.0-build-140.txt, updated 2018-06-28