FAQ

This section contains answers to frequently asked questions. If you cannot find the answer to your question, please contact us.



A.: The different encryption algorithms are used so that the attacker does not know which algorithm to break (as the encrypted file does not use a header). This forces the attacker to go through all possible combinations of algorithms. All algorithms used (AES, Serpent, Twofish, Camellia) are unbreakable. The key length for each algorithm is 256 bits.

A.: Encryption keys are never transmitted over the network and are not stored locally.

A.: The Botan open source library is used to implement the cryptography.

A.: No, the installation file simply unzips a portable version of the application that can even be used from a USB flash drive.

A.: No, the correctness of the decryption is determined by the GCM encryption mode, and the decryption itself is done by trial and error.

A.: This limit is imposed by the GCM encryption mode used. This is a modern secure AEAD mode of authenticated encryption, but has its own features to remain secure.

A.: The encryption and decryption source code is available on request.

A.: An attack realised on a quantum computer will weaken the strength of symmetric encryption algorithms by a factor of 2 (using Grover’s algorithm). However, as 256-bit key length algorithms are used, the encryption will remain unbreakable.

A.: In such a targeted attack scenario, no existing data encryption programme can provide security.

A.: To generate an encryption key from a password, special mathematical functions are used that deliberately require large computing resources. This is one of the main obstacles for an attacker trying to crack an encrypted file using brute force or a large dictionary attack. The advanced KDF algorithms used in CryptoFrost make such attacks impossible, even on a supercomputer.

A.: Without a license key, Cryptofrost works in a limited mode: you can only encrypt 4 files with it. Without a key, the program will decrypt everything previously encrypted, but to encrypt more than 4 files, you will need to purchase a license.

The differences between the trial version and the licensed version are shown in the following table

TrialLicense
Encryption algorithmsSerpentSerpent, AES, Twofish, Camellia
KDF algorithmsScryptScrypt, Argon2id
Number of encrypted files4Unlimited
Additional features
Pluggable header+
Data compression+
Key files+
Additional entropy+
Additional features
Secure password generator+
File and text hash sum calculation+

A.: To activate the application, read this short manual.

A.: Тhe Cryptofrost software license is a digital file that we will create for you personally and send to the email address you specify within 24 hours after payment. To activate the license, save this file to disk, then open the About tab in the Cryptofrost window, click the Activate button and specify the location of this file. The License is valid for one year.

A.: Currently we only accept cryptocurrencies: Bitcoin (BTC), Ethereum (ETH), Ethereum Classic (ETC), Bitcoin Cash (BCH), Monero (XMR), Litecoin (LTC), Zcash (ZEC), Dash, via the Plisio payment service. This is the most convenient way to make transactions.

A.: To buy cryptocurrency, you can use these instructions.

A.: New user registration is done automatically when you purchase a Cryptofrost licence key. Account access information will be sent to the email address you provide.