Eureka Public Key Publisher's description
from Steven Zoch
Eureka Public Key was created due to numerous requests for a public key application using our strong encryption techniques.
Eureka Public Key was created due to numerous requests for a public key application using our strong encryption techniques. The basic principle for its use is one creates their own public key and distributes the key to whomever they will be transferring encrypted files with.
When one receives a key, they import it into their key database. You can create and import as many keys as you wish. Both public keys are used in the cryption process. You select your particular public key to use and the public key of the person who will receive it.
When a file has been received you put in your public key that matches the one they used and select their public key that was used in the encryption. See the Encryption, Decryption and Import/Export sections for more information on these topics. To create a public key, click on Keys then Create Public Key or click on the gold key icon under the menu items.
All you have to do is define a name for the public key and click on Create. All encrypted files will be written to the Encryptions folder. Likewise, all decrypted files will go to the Decryptions folder. If a file already exists with the same name, it will be overwritten.
To Encrypt a file, click on File then Encrypt.
All you have to do is select Your public key, their public key and click on Encrypt or press enter then select the file you want to process.
The file selected will be encrypted and then placed in your Encryptions folder. Now you can send this file in the manner you prefer.
Note that this application encrypts in a binary format. In other words, it uses the full 256 character set and is not a text file. You will need to send it as an attachment if you are using email to transmit it.
To Decrypt a file, click on File then Decrypt.
All you have to do is select Your public key, their public key then click on Decrypt and select the file you want to process.
The file selected will be decrypted and then placed in your Decryptions folder.
System Requirements:No special requirements.
Program Release Status: major update
Program Install Support: Install and Uninstall