English | Espanol | Francais
VSAT Interception, Monitoring and Logging Infrastructure |Passive GSM Interception systems with A5.1/ A5.2 Online Decoding.|BTS/BSC GSM Link Passive Surveillance, Monitoring and Logging System.|Shoghi Multi Channel Signal Classifier, Demodulator and Decoder System.
Communication Security
Communication Jamming
Communication Intelligence
Signal Intelligence
System Engineering
Research & Development
Software Development
Technical Support
Offset Services
Trainings
Partners' Login


Enter your email address to
get regular updates of our products.
 
 
Become Our Representative
Communication Security
Encryption and Information security has been the core area of Research for Shoghi Communications. Since Inception Shoghi has been involved in Designing and Developing Mil-Grade and Crypto Validated Communication Security Appliances for Government and Defense Information Protection. Today Shoghi offers multiple Crypto solutions to its customers with total freedom from Published algorithms and Key management schemes.
 

Communication Security > File & E-mail Encryption

 
File and E-mail Encryption Utility is a software module, which encrypts e-mails and file stored in your PC. Shoghi proprietary algorithm has been incorporated with private key management scheme for total security.
Customer specific algorithm with 128/256/512 bit key length can be incorporated upon users request. Software supports CFB-8 and CFB-128 modes of encryption. After encryption software does not include any proprietary extension to the encrypted file showing that it is encrypted, due to this adversary will not know which software has been used to encrypt the file or directory.
Features
User-friendly graphical user interface.
Encrypts E-mails and Files.
Indigenous Development, hence the source code can be shared with the end user upon signing of NDA.
Indigenous proprietary algorithm incorporated with Private Key
management scheme for total security.
Customer specific algorithm can be incorporated upon users
request.
128/256/512 bit key length as per the customer’s requirement.
Two Modes of Encryption: CFB-8 and CFB-128.
Unlimited members in the network can be added.
Bilateral Key management. Separate keys for Encryption and
Decryption.
The software does not include any proprietary extension to the
encrypted file showing that it is encrypted. Due to this the
adversary will not know which software has been used to
encrypt the file or directory.

 

Email File Encryption

 




  
The Products on the site are strictly for Government and Defense use only.
  © Copyright 2006-2007. All Rights Reserved.