About Encryption (2024)

About encryption and encryption methods

WinZip's® encryption facility gives you a way to protect sensitive documents contained in your archives from unauthorized viewing. The contents of the files that you want to protect are encrypted by WinZip based on a password that you specify. In order for WinZip to later extract the original contents of the encrypted files, the correct password must again be supplied.

This section gives a general overview of WinZip's encryption facilities. Once you are familiar with this information, you can read about the specifics of using encryption.

WinZip provides two encryption methods for Zip files (.zip or .zipx):

  • AES encryption: AES is the Advanced Encryption Standard, which is the result of a three-year competition sponsored by the U.S. Government's National Institute of Standards (NIST). This encryption method, also known as Rijndael, has been adopted by NIST as a Federal Information Processing Standard.

    WinZip supports AES encryption in two different strengths: 128-bit AES and 256-bit AES. These numbers refer to the size of the encryption keys that are used to encrypt the data. 256-bit AES is stronger than 128-bit AES, but both of them can provide significantly greater security than the standard Zip 2.0 method described below. An advantage of 128-bit AES is that it is slightly faster than 256-bit AES, that is, it takes less time to encrypt or decrypt a file.

    The security of your data depends not only on the strength of the encryption method but also on the strength of your password, including factors such as length and composition of the password and the measures you take to ensure that your password is not disclosed to unauthorized third parties. Please read about encryption passwords and about password policy standards defined in the WinZip configuration.

    Note that the Zip file format extension used by WinZip to store AES-encrypted files is supported by WinZip 9.0 or later and is supported by some other Zip file utilities. Because the technical specification for WinZip's AES format extension is available on the WinZip web site, we anticipate that other Zip file utilities will add support for this format extension.

  • Standard Zip 2.0 encryption: this older encryption technique provides a measure of protection against casual users who do not have the password and are trying to determine the contents of the files. However, the Zip 2.0 encryption format is known to be relatively weak, and cannot be expected to provide protection from individuals with access to specialized password recovery tools.


    You should not rely on Zip 2.0 encryption to provide strong security for your data.
    If you have important security requirements for your data, you should instead consider using WinZip's AES encryption, described above.

    The only advantage of Zip 2.0 encryption over the more secure AES encryption is that it is supported by most Zip file utilities, including earlier versions of WinZip. Files that you encrypt using this technique can be extracted by anyone who knows the correct password and has access to almost any Zip file utility. Additionally, Zip 2.0 encryption is supported by WinZip Self-Extractor 2.2 or later and by WinZip Self-Extractor Personal Edition (included with WinZip); the AES encryption method described above is only supported by WinZip Self-Extractor 3.0 or later.

Limitations to be aware of

WinZip's AES encryption facility represents a significant advance on the previous Zip 2.0 encryption, and it can help meet the need that many WinZip users have for preventing their confidential information from being viewed by unauthorized individuals. There are, however, some limitations that you should be aware of:

  • Encryption applies only to the contents of files stored within a Zip file. Information about an encrypted file, such as its name, date, size, attributes, CRC, and compression ratio, is stored in unencrypted form in the Zip file's directory and can be viewed, without a password, by anyone who has access to the Zip file.
  • WinZip's encryption method is not the same thing as an authentication method for the Zip file. WinZip encryption is intended to prevent someone who doesn't know the correct password from finding out the contents of your encrypted data. The password is not needed for actions that do not involve decryption of the encrypted contents of data stored within a Zip file. In particular, encrypted files can be deleted from a Zip file, or can be renamed within a Zip file, and new, unencrypted, files can be added to a Zip file, without a password.
  • WinZip uses password-based encryption, and even a strong encryption algorithm like AES is of little or no benefit if the passwords you use are weak, or you do not keep track of them in a secure manner.
  • We recommend that if you are going to be using the same password to encrypt very large numbers of files with WinZip's AES encryption (that is, files totaling in the millions, for example 2000 Zip files, each containing 1000 encrypted files) you use 256-bit AES keys rather than 128-bit AES-keys. The technical reasons for this are discussed below.

Notes on encryption safety

Encryption provides a measure of safety for your sensitive documents, but even encrypted documents can be compromised (regardless of whether they were encrypted by WinZip or by other encryption software). Here are some of the ways this can occur. This is by no means an exhaustive list of potential risks; it is intended only to give you an idea of some of the safety issues involved with sensitive documents.

  • If a keystroke monitor or other malicious code (such as a virus) is running on your computer, your password may be recorded when you type it. Be sure to check frequently for viruses and follow other recommended computer safety procedures.
  • If you extract an encrypted file and then delete the extracted file, it may be possible for someone to later "undelete" the extracted file using file recovery software or the Recycle Bin.
  • When you open or view a file from an archive (e.g., by double clicking it), WinZip must extract the file to a temporary location so that the associated program can open it. Normally, beginning with WinZip 14.0, when an encrypted file is temporarily extracted for these actions, WinZip will automatically wipe the temporary file prior to deleting it. However, if you subsequently close WinZip without first closing the program that is using the file, WinZip may not be able to wipe and delete the temporary copy of the file, thereby leaving it on disk in unencrypted form. The associated program may also make one or more backup copies of the decrypted file, and WinZip will not be able to wipe or delete those copies. If a file is unable to be wiped, it may be possible for someone to later recover deleted the file using file recovery software or the Recycle Bin.
  • When you "move" files to a Zip file by choosing the Move action in the Add dialog, WinZip moves the files into the Zip file by compressing them and then deleting the original files from the disk. WinZip will not wipe the original, unencrypted file prior to deleting it. It may be possible to recover the original, unencrypted files from the disk.
  • After adding or extracting encrypted files, some or all of the unencrypted file contents or of your password data may remain in your computer's memory or the page swap files on disk. A malicious user may be able to retrieve this unencrypted information.
  • WinZip does not encrypt Zip file comments or, as described above, information about encrypted files such as their names, dates, etc. Any user with access to the Zip file can view this information without a password.

You may be able to eliminate some of these exposures using specialized software such as virus scanners, disk erasers, etc.

Technical information on AES key generation

When you use AES encryption with WinZip, the passwords that you enter are converted into keys of the appropriate length (128 bits or 256 bits, depending on the AES key length that you specify). This is done through the PBKDF2 algorithm defined in RFC 2898 (also available as Public Key Cryptography Standard #5) with an iteration count of 1000. WinZip uses 8-byte salt values with 128-bit AES encryption and 16-byte salt values with 256-bit encryption.

One purpose for the "salt" values used with WinZip's AES encryption is to yield different encryption keys for each file, even if multiple files are encrypted with the same password. With the 8-byte salt values used with WinZip's 128-bit encryption it is likely that, if approximately 4 billion files are encrypted with the same password, two of the files will be encrypted with the same key. Someone who obtained copies of two files encrypted with the same key could learn information about their contents, so it is advisable to stay well below this limit. This is why we recommend that if you are going to be using the same password to encrypt very large numbers of files with WinZip's AES encryption (that is, files totalling in the millions, for example 2000 Zip files, each containing 1000 encrypted files), you use 256-bit AES keys, which use 16-byte salt values, rather than 128-bit AES-keys, with their 8-byte salt values.

As part of the process outlined in RFC 2898 a pseudorandom function must be called; WinZip uses the HMAC-SHA-1 function for this purpose, since it is a well-respected algorithm that has been in wide use for this purpose for several years. The PBKDF2 function repeatedly calls HMAC-SHA-1, which produces a 160-bit hash value as a result, mixing the outputs in a fairly complicated way, eventually yielding a 128- or 256-bit encryption key as a result.

Note that, if you are using 256-bit AES encryption, the fact that HMAC-SHA-1 produces a 160-bit result means that regardless of the password that you specify, the search space for the encryption key is unlikely to reach the theoretical 256-bit maximum, and cannot be guaranteed to exceed 160 bits. This is discussed in section B.1.1 of the RFC 2898 document.

Information for software developers

Zip file utility developers who wish to provide WinZip-compatible AES encryption support in their own products can find complete technical information on the WinZip web site.

See also

Using Encryption

Encryption Passwords

Password Policy in your WinZip configuration

Wipe Feature

About Encryption (2024)

FAQs

About Encryption? ›

Final answer:

What is a encryption answer? ›

Encryption defined

At its most basic level, encryption is the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.

What do you think about encryption? ›

Encryption is a form of data security in which information is converted to ciphertext. Only authorized people who have the key can decipher the code and access the original plaintext information. In even simpler terms, encryption is a way to render data unreadable to an unauthorized party.

Why is encryption not enough? ›

Physical Access: While encryption can protect data from unauthorized access over networks or in case of device theft, it may prove insufficient once physical access to the storage device is obtained.

What is encryption explained simply? ›

Encryption is a way of scrambling data so that only authorized parties can understand the information. In technical terms, it is the process of converting human-readable plaintext to incomprehensible text, also known as ciphertext.

How do I encrypt my password? ›

Best practices for implementing password encryption
  1. Implement robust and secure hashing algorithms like SHA-2, bcrypt, and PBKDF2.
  2. Employ salting to strengthen password encryption by adding a random string of characters to the password before hashing.
  3. Use unique salts for each password.
Apr 24, 2023

Does encryption mean password? ›

Encryption goes one step further than password protection and is an easy and effective way to lessen the likelihood of a privacy breach. Encryption scrambles information so that it is unreadable without a passcode.

What is an example of encryption? ›

Most people will encounter encryption in their daily life when communicating. For example, messaging apps like Signal or Wire (both of them among the best WhatsApp alternatives) will encrypt your chats. Another good example is email, which, without strong encryption, can be intercepted by government agencies.

What is the main goal of encryption? ›

The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet or other computer networks.

Is it safe to use encryption? ›

Encryption helps protect your online privacy by turning personal information into “for your eyes only” messages intended only for the parties that need them—and no one else. You should make sure your emails are being sent over an encrypted connection, or that you are encrypting each message.

What is bad about encryption? ›

Encryption is only as strong as the algorithms and keys that are used, and encryption algorithms and software are frequently a target for malicious actors, hackers, and cybercriminals. There is no way to securely give governments — or anyone else — exceptional access.

How important is encryption? ›

Encryption conceals data by scrambling it, so that anyone who tries to view it sees only random information. Encrypted data can only be unscrambled through the process of decryption. Encryption is essential for protecting users' online activities.

What is the simplest encryption? ›

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques.

What happens to your data when it is encrypted? ›

Data encryption is a security method where information is encoded and can only be accessed or decrypted by a user with the correct encryption key. Encrypted data, also known as ciphertext, appears scrambled or unreadable to a person or entity accessing without permission.

How encryption will work? ›

Decryption is a process that transforms encrypted information into its original format. The process of encryption transforms information from its original format — called plaintext — into an unreadable format — called ciphertext — while it is being shared or transmitted.

How do I encrypt a file? ›

How to encrypt a file
  1. Right-click (or press and hold) a file or folder and select Properties.
  2. Select the Advanced button and select the Encrypt contents to secure data check box.
  3. Select OK to close the Advanced Attributes window, select Apply, and then select OK.

What does it mean if it says end-to-end encryption on Messenger? ›

End-to-end encryption helps protect your conversations by ensuring no one sees your messages except you and who you're chatting with. You can turn on secure storage to save your end-to-end encrypted chat history and access your personal messages from other devices.

How do you reply to encrypted? ›

To reply to an encrypted message

Choose Reply or Reply All. 2. On the page that appears, type a reply and choose Send. An encrypted copy of your reply message is sent to you.

What is an encryption message? ›

Encryption converts data into scrambled text. The unreadable text can only be decoded with a secret key. The secret key is a number that's: Created on your device and the device you message. It exists only on these two devices.

Top Articles
College Finances: What Happens to the Leftover Financial Aid Money?
8 Tips to Prepare for Freshman Orientation
Edina Omni Portal
Camera instructions (NEW)
Cintas Pay Bill
Walgreens Pharmqcy
Research Tome Neltharus
1970 Chevrolet Chevelle SS - Skyway Classics
Craigslist Benton Harbor Michigan
Cad Calls Meriden Ct
Ds Cuts Saugus
Roblox Developers’ Journal
O'reilly's In Monroe Georgia
Clafi Arab
Braums Pay Per Hour
Ucf Event Calendar
Hmr Properties
Watch TV shows online - JustWatch
A Guide to Common New England Home Styles
Busted Newspaper S Randolph County Dirt The Press As Pawns
Chic Lash Boutique Highland Village
Viha Email Login
Amc Flight Schedule
The best TV and film to watch this week - A Very Royal Scandal to Tulsa King
Pinellas Fire Active Calls
Www.publicsurplus.com Motor Pool
Jackie Knust Wendel
Bra Size Calculator & Conversion Chart: Measure Bust & Convert Sizes
CVS Health’s MinuteClinic Introduces New Virtual Care Offering
Uky Linkblue Login
Smayperu
Wake County Court Records | NorthCarolinaCourtRecords.us
Bee And Willow Bar Cart
Mp4Mania.net1
Frank 26 Forum
D-Day: Learn about the D-Day Invasion
T&Cs | Hollywood Bowl
Keir Starmer looks to Italy on how to stop migrant boats
Gopher Hockey Forum
Lucyave Boutique Reviews
Streameast Io Soccer
How the Color Pink Influences Mood and Emotions: A Psychological Perspective
Smoke From Street Outlaws Net Worth
Blog Pch
The Plug Las Vegas Dispensary
Greg Steube Height
Game Like Tales Of Androgyny
Sml Wikia
Glowforge Forum
Taterz Salad
Arre St Wv Srj
Fetllife Com
Latest Posts
Article information

Author: Stevie Stamm

Last Updated:

Views: 5654

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Stevie Stamm

Birthday: 1996-06-22

Address: Apt. 419 4200 Sipes Estate, East Delmerview, WY 05617

Phone: +342332224300

Job: Future Advertising Analyst

Hobby: Leather crafting, Puzzles, Leather crafting, scrapbook, Urban exploration, Cabaret, Skateboarding

Introduction: My name is Stevie Stamm, I am a colorful, sparkling, splendid, vast, open, hilarious, tender person who loves writing and wants to share my knowledge and understanding with you.