ENCRYPTION TOOL

CRYPTOMATOR

INTRODUCTION

The German encryption tool Cryptomator was introduced in 2016 by startup Skymatic GmbH. The two most widely used encryption options for cloud storage for private users right now are Boxcryptor (which has been around since 2011) and Cryptomator. We provide a summary of the solution's features as well as its similarities and distinctions from Boxcryptor.

You can build vaults that are housed on virtual drives if you use Cryptomator. After that, the data kept in the vault is encrypted. The user has the option to choose the vault's location, such as a cloud service provider. Since the release of version 1.5.0 in April 2020, only a subset of vaults can be locked or unlocked simultaneously.

Like Boxcryptor, every file is individually encrypted. Therefore, unlike many other encryption tools, only the altered file needs to be re-encrypted and synchronised when a file is changed.

Files are secured in Cryptomator using AES with a 256-bit key length. The website claims that the route structures are obfuscated, and the password is secured using crypt, a password-based key derivation technique. The docs. Cryptomator help pages contain a brief technical overview. Due to the high level of technical writing, this is probably not understandable for all users without IT understanding.


Installation and demo manual

1.2.1 Installation

1.    Download Cryptomator https://cryptomator.org/downloads/

Then, click the “I agree” checkbox and click "Install."



2.    Installation is currently underway.




3.    Installation has successfully been done. Click the “Close” button.     



1.2.3 Demo Manual

1.     After the software is opened, click "Add Vault.”



2.     Click “Create New Vault”. If the vault has been created before, click "Open an

Existing Vault."



3.     To create a vault, choose a name like the one below with special characters.

After the name is verified as valid, click "Next."


4.     Choose the location to store the encrypted files, whether OneDrive or a custom location. Then, click “Next”.


5.     After choosing the location, create the vault password and click “Yes please….”. After this, click create vault.




This will be stored with the name created. Click “Next”.



I have created a Word document named “mine” in the vault called

“Ravin_0304.”



          


To unlock the vault, click “Unlock..."

9.     After clicking "Unlock," you will be prompted to enter the vault password in order to view the vault's contents.




10.  After entering the correct password, this page will be shown as below. Click on “Reveal Drive."


11.  By clicking reveal Drive, your folder will be shown with the contents shown in figure below.



12.  To lock the vault again, click "Lock."



    So, The vault is locked.




Analysis on CIA

Cryptomator is an encryption tool that can be used to secure sensitive data stored on a device or in the cloud. It uses client-side encryption to protect files and folders by encrypting them with a user-provided passphrase before they are uploaded to the cloud storage service.

In terms of CIA (Confidentiality, Integrity, and Availability), Cryptomator provides:

 Confidentiality: Cryptomator encrypts data before it is uploaded to the cloud, making it accessible only to authorised users who have the correct passphrase. This ensures that only authorised users can access the encrypted data, providing confidentiality to the data.

    IntegrityThe encrypted data is protected with a user-provided passphrase, ensuring that the data cannot be modified by unauthorised users. Cryptomator also creates a random initialization vector (IV) and uses it along with the passphrase to encrypt the data, which prevents tampering with the data.

      AvailabilityCryptomator is designed to work with cloud storage services, which are typically highly available. As long as the cloud storage service is available, authorised users should be able to access their encrypted data. Additionally, the data is accessible by using the same passphrase and the same decryption tool ( Cryptomator) across multiple devices

     However, it is worth noting that, Cryptomator is only as secure as the passphrase chosen by the user, a weak passphrase can make the encryption easily breakable. Also, it is important to make a backup of the encryption keys, because if they are lost, the encrypted data will become inaccessible.





Comments

Popular posts from this blog

COVER PAGE