Skip to content

Encryption and
decryption functions

Encrypt files with AES-256 and key file. SAV7 generates a 256 BIT key that must be used to decrypt the file. The encrypted file is useless without the key file, so keep the key file and the encrypted file separate from each other for maximum protection of your data.

Functions

Drag and drop files or directories into the drag & drop field for encryption. SAV7 allows the encryption of multiple files as well as directories; the selected files are zipped before the encryption process.

Unlike other applications, SAV7 generates a secure key (.key file). The key file represents the only way to successfully decrypt encrypted files. The key file is further protected against tampering and brute force attacks with hashing. Warning: Interference with the key file will damage the key and make access to the encrypted data impossible, as the hash validation detects these manipulations.

When “Secure deletion of original file(s)” is activated in the settings, the original files are irreversibly deleted after the encryption process. This procedure removes any references to the file in the file system and makes recovery by forensic tools more difficult. Caution: the process of secure deletion cannot be 100% guaranteed on SSDs (Solid-State Drives).

SAV7 introduced the additional feature of an expiration date in version 1.4. This feature allows setting an expiration date, which enables decryption with the key file only until the chosen date. After this date, access to the file is no longer possible. The key file thus loses its effectiveness as a key and is secured against attempts to manipulate the expiration date through hashing.

Decryption is only possible through the key file (.key). During the decryption process, several checks and validations of the key file are conducted. Only if the validation of the key phrase, the hash, and the expiration date match, can decryption be performed.

When using SAV7, please be aware that highly secure cryptographic methods are employed and incorrect or negligent use can lead to irreversible data loss. Always ensure to store the key file in a safe location, as it is the only way to decrypt files. Avoid tampering with the key file, as any attempt to modify it can lead to malfunction.

SAV7 does not use logs or recordings, which means that careless or negligent use can result in 100% data loss.

The encryption and decryption processes require CPU power, and if it is insufficient for the amount of data processed, files can be damaged by the abrupt termination of these processes. Therefore, carefully check the amount of data (GB) your hardware can reliably handle, or split large files into several smaller volumes.

SAV7 creates a key file during the encryption process, providing password-less protection for secure data encryption. Only the combination of the encrypted file and its corresponding key allows for the successful restoration and use of the original files. With a strong 256-bit key, files encrypted with SAV7 are secure against brute force attacks, tampering, and unauthorized access.

SAV7 aims to provide the highest possible data protection through cryptographic encryption. The application programs of SAV7 are designed to be freely available, easy to use, and provide privacy protection in every aspect for users.

Settings vor AES-256 encryption and Key-Files

SAV7 AES-256 Encryption is freeware

The SAV7 AES-256 Encryption Software is available for Windows operating systems version 10 or higher (32 or 64 bit). Get the latest version of SAV7 as an .exe or portable version (without installation).

current version SAV7 1.5

portable version SAV7 1.5