Cryptobase® ›› Security ››
Parent Previous Next


This organizer is designed to fullfill the highest standards of data security. It stores safely even highly sensitive personal data, in a way that should satisfy the needs of even the most demanding users.

In conventional organizers, data are stored in clear, like in the following examples:




In Cryptobase® every record is encrypted, field by field, with a unique key for every field:

Note: the different colors symbolize the different keys used to encrypt every single field (tens of thousands unique keys are used to minimize the probability of 2 fields being encrypted with the same key). All keys are composed of random characters.

In addition, these keys are unique for each database created by the Cryptobase app: this means that two different databases have a totally different setup of thousands of random keys, even if the same master password/passphrase is used for both databases.

Permanent Encryption

Some software products in the PIM category may allow encrypting the database at the end of the day when exiting the program. This requires opening the database before accessing it and leaving it open and vulnerable as long as it is used.

In Cryptobase, all information is permanently stored in encrypted form on the physical memory support (hard disk, server, cloud storage etc.). Cryptobase does not need to decrypt the whole database file. If the user looks up a record, the program copies the encrypted record from the database to RAM (volatile memory). Here it will be decrypted before being displayed on the screen. Of course, if edited the record will be encrypted before being written back to the database file.
This principle (see below: Single Record Encryption) provides fool-proof data security because encryption is executed continuously and reliably in the background, without the user ever having to care about it or having to remember encrypting the file after closure: the file remains encrypted.

Single Record Encryption/Decryption

Every single piece of information (record) is encrypted with one out of tenthousands of passwords>(see next paragraph). When reading a specific record (e.g. an address), it is copied to the volatile memory (RAM) where it is decrypted before being displayed on the screen. On the harddisk it remains stored in encrypted form. The plain (decrypted) information is NEVER EVER stored on the harddisk or any other storage support, not even partially. If the record is modified, it passes the encryption filter before being written back to the harddisk. Nobody will ever be able to hack or to decipher any info by analyzing the harddisk, not even with the most sophisticated methods available.

Thousands of Encryption Keys (Passwords)

While the database is opened with one main Password (the Master Password), internally, tens of thousands encryption keys (composed of random characters) are created with a special algorithm and used to encrypt every piece of information individually. The likelihood of the same key being used more than once in 50000 records is almost nil. In other words, in an average sized database, all records are encrypted with different, individual keys.
Each database has a unique collection of keys, so the data of your database can only be decrypted by the keys of your database.

Highly secure Encryption Algorithms

The 128 and 256 bit encryption algorithms used in this software satisfy the highest security requirements and also used by military and political authorities at the highest level. It has been calculated that state-of-the-art 128 bit encryption algorithms are so strong, that it would take a network of supercomputers thousands of years to decrypt ciphered text, not to speak of 256 bit encryption, used extensively in the program, too. Since every record is encrypted with an individual password, in the utopical event of someone succeeding to break the code, only the information contained in 1 single field in a record would be uncovered.

satisfy the highest safety requirements and are Of military and political authorities at the highest level .ulist ul li { padding-bottom: 5px; }