Using 7-Zip to Encrypt and Send Sensitive Files (2024)

Using 7-Zip to Encrypt Sensitive Files

File encryption is considered as the best means of protecting sensitive and/or confidential documents whether or not they are to be shared or simply stored. This document provides guidance on installing and using two encryption tools for use on Windows and MacOs computers: 7-zip for windowsand Keka for MacOS.

When sharing encrypted documents with others via email, do not give out the encryption password withinthe same email from which you are sending the encrypted file.

Send the password to the recipient either by calling them with the password or by sending an SMS text to their trusted mobile number.

Use a different medium for the password.


IMPORTANT: Once a .7z encrypted file is created and shared, the recipient must have the 7-Zip software to be able to decrypt the file.

Unless a self-extracting file is created during the encryption process, see‘ALTERNATE METHOD TO SHARING ENCRYPTED FILES’ below.

The IT HelpDesk can assist with installation and use of these encryption tools however it is important to note that theycannot restore access to files should you forget the password.

  1. Most CU owned PCs and laptops will already have 7-Zip installed on them.
    However, if you are installing onto your own private machine, 7-zip is completely free software, justfollow from step 2.
  2. Go to the url http://www.7-zip.org/download.html
  3. Select the appropriate version for the laptop or computer you are using, most modern Windows devices are 64-bit:

    Using 7-Zip to Encrypt and Send Sensitive Files (1)

  4. Open the downloaded .exe file and follow the instructions,it’s a simple install.
  1. To select a file to encrypt, use ‘My Computer’ or ‘Windows Explorer’ to bring up the folder / file and select by clicking the required file/folder:

    Using 7-Zip to Encrypt and Send Sensitive Files (2)

  2. Right-click on the selected files and choose “7-zip” -> “Add to archive”:

    Using 7-Zip to Encrypt and Send Sensitive Files (3)

Choose a name for the encrypted file and select the following recommended options:

  • Archive format = 7z (Do not choose ZIP, this uses a much less secure encryption method)
  • Enter a strong password that meets CU requirements (please do not use “concord” or “12345” or other weak password)
  • Encryption method = AES-256 (the strongest and most secure encryption method)
  • Encrypt the filenames = Enabled (check it) (this encrypts and hides the names of your files making it much more difficult to crack)

    Using 7-Zip to Encrypt and Send Sensitive Files (4)

Click “OK” and an encrypted 7-zip archive file should appear in the same folder as your original files.

You can now securely email the .7z file to anyone (assuming the file size does not exceed 150Mb internal or 25Mb external).

The recipient can extract the encrypted file by simply double-clicking the .7z file, which will start the 7-Zip software and begin the extraction, or by right-clicking the .7z file -> “7-ZIP” -> “EXTRACT HERE”. They enter the password you provided to them to extract it, it cannot be extracted without it.


Alternate method to sharing encrypted files

If the recipient does not have the 7-Zip software installed, you can point them to the url shown above (windows only)
or you can use the followingmethod, whichcreates a self-extracting (.exe) file that can simply be double-clicked and extracted using the supplied password,7-Zip does not need to be installed by the recipient:

Make sure ‘Create SFX archive’ is enabled (checked) to create the self-extracting file:

Using 7-Zip to Encrypt and Send Sensitive Files (5)

The encrypted self-extracting .exe archive file should appear in the same folder as your original files.

Here’s the Catch: most email providers, including Office 365, do not allow the emailing of .exe attachments.

To get around this, CU users can utilize OneDrive to upload the encrypted .exe file and then share it with the intended recipient.

The recipient can then download it using the shared link and double-click to extract.

(Sometimes renaming the .exe extension can also work, but Office 365 usually detects it, it’s easier to simply share it with OneDrive)

Again, as a reminder:

When sharing encrypted documents, do not give out the encrypted file password using the same email from which you are sending the encrypted file.

Send the password to the recipient either by calling them with the password or by sending an SMS to their trusted mobile number.

Use a different medium for the password.

Installing Keka (MacOS)

You will need local administrator privileges to proceed with the installation, if you need assistance with this part of the installation, please contact the HelpDesk at x5291

When ready go to http://www.kekaosx.com/en/

Click the download method you prefer and follow the instructions:

Using 7-Zip to Encrypt and Send Sensitive Files (6)

Using Keka to encrypt a file or files

Open Keka, select 7z and enter a strong password.

Using 7-Zip to Encrypt and Send Sensitive Files (7)


Drag and drop one or more files you want to compress onto the Keka window and they’ll be compressed into an encrypted 7z file with the password you provided:

Using 7-Zip to Encrypt and Send Sensitive Files (8)

Additional Recommended Viewing Using 7-Zip

      Using 7-Zip to Encrypt and Send Sensitive Files (2024)

      FAQs

      Is 7-Zip encryption good enough? ›

      If you have sensitive files to store on your computer or share in an email, it is highly recommended to use 7-zip encryption.

      How to use 7-Zip to encrypt files? ›

      Creating an Encrypted File

      When you've reached the right folder that contains the file you want to encrypt, right-click on the file. Select 7-Zip and click on Add to Archive... The only details you need to enter are the Encryption Password. Enter a password of your choice, then re-enter to confirm.

      What is the best encryption method in 7-Zip? ›

      Change the Encryption Method to “AES-256”. Note: There is a trade-off between using AES-256 and ZipCrypto. AES-256 is proven much more secure than ZipCrypto, but if you select AES-256 the recipient of the zip file may have to install 7-zip or another zip program to read the file contents.

      Is it better to encrypt and zip or zip and encrypt? ›

      The correct order is to compress the file first and then encrypt the compressed data. This provides both security and efficiency benefits for protecting your sensitive information during storage or transmission.

      What is the 7-Zip security flaw? ›

      The specific flaw exists within the parsing of 7Z files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process.

      Is there anything better than 7-Zip? ›

      WinZip can compress files in ZIP and, unlike WinRAR or 7-Zip, it can also compress in IHA/IHZ or UUencoded if you run WinZip 12 and higher. WinZip can decompress ZIP, TAR, GZIP, Compress, CAB, RAR, BZ2, IHA/IZH, 7Z, IMG, ISO, XZ, VHD, and VMDK.

      Is 7zip safe? ›

      7-zip is generally considered safe to use. It has been widely used for many years, and its source code has been reviewed by security experts due to its open-source nature.

      Is 7zip completely free? ›

      7-Zip is a free and open-source file archiver, a utility used to place groups of files within compressed containers known as "archives".

      How safe are encrypted files? ›

      Encryption Can't Prevent Accidental Data Loss

      No matter how highly-encrypted your data is, it is still susceptible to being transmitted to the wrong recipient via email, or otherwise shared via incorrect attachments or unsecured encryption keys.

      Is 7ZIP still the best? ›

      7-Zip is an excellent file archiving software that I would highly recommend. It is a free and open-source software that supports a wide range of file formats, including 7z, ZIP, RAR, and more.

      What is the strongest encryption method? ›

      AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today.

      What is the default encryption for 7ZIP? ›

      Strong AES-256 encryption.

      Should I zip before or after encryption? ›

      Compress and then encrypt is better. Data compression removes redundant character strings in a file. So the compressed file has a more uniform distribution of characters. This also provides shorter plaintext and ciphertext, which reduces the time spent encrypting, decrypting and transmiting the file.

      How do I know if my zip file is encrypted? ›

      In some cases, when you attempt to unzip files from (extract) or view files in a Zip file (. zip or . zipx) a Decrypt dialog will display requesting a password. This indicates that the files in your Zip file have been encrypted.

      What is the best encryption method for securing files? ›

      The Advanced Encryption Standard (AES) is the trusted standard algorithm used by the United States government, as well as other organizations. Although extremely efficient in the 128-bit form, AES also uses 192- and 256-bit keys for very demanding encryption purposes.

      How secure is a password protected 7-Zip file? ›

      7zip is secure since it uses AES-256 in CBC mode that can provide CPA security and there is no problem there. Keep in mind that CBC has no integrity and authentication.

      What level of encryption is 7z? ›

      The main features of 7z format: Open architecture. High compression ratio. Strong AES-256 encryption.

      What is the best encryption for zip files? ›

      256-bit AES is stronger than 128-bit AES, but both of them can provide significantly greater security than the standard Zip 2.0 method described below. An advantage of 128-bit AES is that it is slightly faster than 256-bit AES, that is, it takes less time to encrypt or decrypt a file.

      How safe is ZIP encryption? ›

      Vulnerability to known-plaintext attacks

      Zip encryption is susceptible to known-plaintext attacks, which can reveal the encryption key when an attacker has access to both the encrypted and unencrypted versions of the same file. This vulnerability further undermines the security of Zip-encrypted files.

      Top Articles
      How to Clear the npm Cache on Linux, macOS, and Windows
      Top Paying FAANG Jobs
      Forozdz
      PontiacMadeDDG family: mother, father and siblings
      The Ivy Los Angeles Dress Code
      Byrn Funeral Home Mayfield Kentucky Obituaries
      Tx Rrc Drilling Permit Query
      Aiken County government, school officials promote penny tax in North Augusta
      Daniela Antury Telegram
      Select Truck Greensboro
      Binghamton Ny Cars Craigslist
      Bjork & Zhulkie Funeral Home Obituaries
      Craigslist Pets Athens Ohio
      Lima Funeral Home Bristol Ri Obituaries
      Overton Funeral Home Waterloo Iowa
      Sonic Fan Games Hq
      Me Cojo A Mama Borracha
      Weather Rotterdam - Detailed bulletin - Free 15-day Marine forecasts - METEO CONSULT MARINE
      Fraction Button On Ti-84 Plus Ce
      Azpeople View Paycheck/W2
      Clare Briggs Guzman
      Why do rebates take so long to process?
      Pearson Correlation Coefficient
      Redfin Skagit County
      Globle Answer March 1 2023
      Understanding Gestalt Principles: Definition and Examples
      Bocca Richboro
      The Banshees Of Inisherin Showtimes Near Broadway Metro
      Marlene2995 Pagina Azul
      Our 10 Best Selfcleaningcatlitterbox in the US - September 2024
      Cvs Sport Physicals
      La Qua Brothers Funeral Home
      Donald Trump Assassination Gold Coin JD Vance USA Flag President FIGHT CIA FBI • $11.73
      Homewatch Caregivers Salary
      Dreamcargiveaways
      Σινεμά - Τι Ταινίες Παίζουν οι Κινηματογράφοι Σήμερα - Πρόγραμμα 2024 | iathens.gr
      Justin Mckenzie Phillip Bryant
      Great Clips On Alameda
      Seymour Johnson AFB | MilitaryINSTALLATIONS
      Google Jobs Denver
      October 31St Weather
      Case Funeral Home Obituaries
      Scottsboro Daily Sentinel Obituaries
      Traumasoft Butler
      Locate phone number
      Ssc South Carolina
      Keci News
      Samsung 9C8
      Online College Scholarships | Strayer University
      Dietary Extras Given Crossword Clue
      Rocket Bot Royale Unblocked Games 66
      2487872771
      Latest Posts
      Article information

      Author: Rubie Ullrich

      Last Updated:

      Views: 5635

      Rating: 4.1 / 5 (72 voted)

      Reviews: 87% of readers found this page helpful

      Author information

      Name: Rubie Ullrich

      Birthday: 1998-02-02

      Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

      Phone: +2202978377583

      Job: Administration Engineer

      Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

      Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.