Releases: FrancescoValentini/HackerInside_EncryptionToolkit
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit.jar)= 22c69b84d28b57387cac61dc72ba0af26ce1bc352574be32ae32027571984fba
1.0.8 - Stable Release
Changelog
- IMPROVED: cryptographic provider selection during signatures
- ADDED: SKI and Public Key Algorithm in the certificate information window
- ADDED: Support for PQC digital signature algorithms (SLH-DSA-SHAKE-128s, SLH-DSA-SHAKE-128f, SLH-DSA-SHAKE-192s, SLH-DSA-SHAKE-192f, SLH-DSA-SHAKE-256s, SLH-DSA-SHAKE-256f, ML-DSA-44, ML-DSA-65, ML-DSA-87)
- ADDED: Support for PQC encryption algorithms: (ML-KEM-512, ML-KEM-768, ML-KEM-1024)
Warning
The software supports Post Quantum Cryptography (PQC) algorithms for both digital signatures and encryption. Since PQC support for CMS and X.509 formats is a relatively new technology, incompatibilities or, in the most critical cases, the risk of data loss may arise.
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit.jar)= 96a3a689d010cf42cb7bce4ae57d3076958cd9bcf42199ef0853cfa3988ec505
1.0.7 - Stable Release
Changelog
- ADDED: Ability to change the master password of the keystore
- ADDED: Ability to rename aliases in the keystore
- ADDED: Ability to change the password of individual aliases in the keystore
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit.jar)= e2d1471400301d052a7fb8c769f584d64e2b30448f065b0f0616225000b1b142
1.0.6 - Stable Release
Changelog:
- Bug Fix: Fixed the incorrect error message that appeared when a certificate was not created during setup.
- New Feature: RSA OAEP is now the default algorithm when using RSA encryption.
- New Utility: Added a tool to calculate and verify file checksums.
HackerInside EncryptionToolkit
SHA256(HackerInside_EncryptionToolkit.jar)= 8362bf579ef0ef1f8d077adb1091623ecc0c2267f9ffa8b5cfd26fdc7c921ea7
1.0.5 - Stable Release
Changelog
-
Improved password security in memory: Passwords are now stored as character arrays (
char[]) instead ofStringobjects. -
Implemented password caching: A cache has been introduced for passwords, which is active exclusively for entries stored in the keystore. Important note: the cache does not apply to the master key.
-
Cache management: Password caching is disabled by default. To enable it, manual configuration is required through the application's settings.
HackerInside EncryptionToolkit
SHA256(HackerInside_EncryptionToolkit.jar)= 8a740e7db1b84bfcb3104af38d54822713cf94144a94d5d6fac89488116683c6
1.0.4 - Stable Release
Changelog
- UI improvements.
- Added user input validation.
- Added a confirmation dialog for key deletion.
- Changed the main keystore path to the user's home directory.
- Added overwrite confirmation for existing files.
- Added support for encryption with multiple recipients.
- Added certificate validation (ensuring it is not expired before any action).
- Added option to export key pairs to the keystore in PKCS12 format.
HackerInside EncryptionToolkit
SHA256(HackerInside_EncryptionToolkit.jar)= 27deb8d1657114d7e8bda79cf80a580f0eeb2be6c1b76bf974575b850396cc8f
New Features:
- Adjustable buffer size
- Encrypting Notepad
HackerInside EncryptionToolkit
SHA256(HackerInside_EncryptionToolkit.jar)= 40ef9b83a483da1bff78c478981a5f840e74e730d91e29e5ff9ef8a479a5ac45
New Features:
- Import/export of certificates from/to text
- Operations elapsed time
- Generation of new key pairs
HackerInside EncryptionToolkit
SHA256(HackerInside_EncryptionToolkit.jar)= 89cb72236a2f10c324c3466793fa330c8d4aed669ec68831752080568a61536d
New Features:
- Theme chooser
Bugfix:
- The login message varies depending on whether it is a PKCS#11 device or a keystore
- Dialogs are displayed on top of all other windows
- The certificate creation option in setup is disabled for PKCS#11 devices
HackerInside EncryptionToolkit
SHA256(HackerInside_EncryptionToolkit.jar)= 941190e94f823f6a38c9f3b365cad60633721183cc3b803fa348525a0066f009