=== Remake of LCRYPT on C++ | Gained +99.68% performance | All I/O operations runs on RAM now ===
In the digital age, securing data at its core is crucial. C-LCRYPT offers a revolutionary encryption solution that protects data at the binary level, ensuring integrity and confidentiality. Unauthorized access is impossible without the decryption keys.
C-LCRYPT is a C++ encryption program that encrypts files at the binary level with RAM-based I/O. It features byte shuffling, binary reversal, bit insertion, byte substitution using a randomized table, and XOR key encryption. This method provides top-tier security, making data indecipherable without the correct keys and resisting reverse engineering. Even with the C-LCRYPT tool, brute force decryption is impractical due to the vast number of possible combinations and required computational resources, posing a significant barrier even against advancements in quantum computing.
Disclaimer: This tool does not leave any identifiable signature or trace that could be linked back to the tool or its author. The resulting encryption cannot be analyzed or reverse-engineered to understand the algorithm's nature without access to the program's source code.
git clone https://github.com/Locotir/C-LCRYPT
cd C-LCRYPT
sudo pacman -Syu gcc openssl boost zlib zstd libsodium
g++ -O3 -march=native -mtune=native -pipe -flto -funroll-loops -fomit-frame-pointer -fno-plt -ffast-math -o C-LCRYPT C-LCRYPT.cpp -lssl -lcrypto -lz -lboost_iostreams -lzstd -lsodium
./C-LCRYPT
yay -S c-lcrypt
Usage: ./C-LCRYPT [options]
Options:
-e <target> Encrypt the specified file/folder
-d <target> Decrypt the specified file/folder
-p <padding> Specify the padding (0-∞)
-P <password> Specify the password
--version Show the current installed version
-h Display this help message
Examples:
./C-LCRYPT -e target -p 10 -P my_password
./C-LCRYPT -d target -p 10 -P my_password
If executed without arguments, interactive mode will start.
This program is provided for educational and research purposes only. The user assumes all responsibility for the use of the program. The developer is not responsible for any misuse, damage or problems caused by the program. It is strongly recommended to use this software in an ethical and legal manner.
Note
[@] Shuffle each Byte
[@] Reverse Binary Chain
[@] Fill with n bits between each original bit
[@] Substitute each byte with decimal Table (0-255):Psswd randomized
[@] XOR Key unique string applied as long as entire file bit string
All type of files and folders (The larger, more RAM will consume):
· Text Files -> .txt .docx .pdf...
· Data Files -> .xls .xlsx .csv...
. Small Databases -> .sql .db .mdb...
· Image Files -> .png .jpg .gif...
· Audio Files -> .mp3 .wav...
· Video Files -> .mp4 .mkv .avi...
· Presentation Files -> .ppt .pptx...
· Programming Files -> .py .c .cpp...
· Config Files -> .cfg .ini...
· Key Files -> .key .cer
· Compressed Files -> .zip .rar...