PRIVATE KEY ENCRYPTION
Private key is nothing else than an alphanumeric code, it can be kept as a text file. By the way, we can assume that this encryption phase is designed to make the information contained in the text file indecipherable to anyone through encryption. At this stage we recommend to use a third part encryption software as advise on our guide avaiable on personal area. In this phase, the client will be advised to download a third-party encryption software (that is not made by Crypto360) available together with the guide in the personal area.
Once installed, in a simple way, the customer can encrypt the file thus giving it an access password. In this way, encrypted file cointent is knowed by customer only. Once installed, in a simple way, the customer can encrypt the file such giving it an access password. At this point the file is encrypted and only the client is aware of its contents.
Hash is an unique identification of a file, so it is a way to verify its integrity. It is an alphanumeric code that is automatically generated by an algorithm though the encrypted file given as input. The output is a code that is is linked to the binary file and its creation date and time.
What the customer needs to do are just two simple steps.
As for the encryption software, we will recommend an hash generation software. The first step will therefore consist in downloading and installing the software. Once done, the only thing the user will have to do is run the program and then drag the file inside the app window. From the encrypted file will be generated the hash. just transcript it.
The customer now has hash and encrypted file available. What to do now is log in into Crypto360's website and upload encrypted file and write the hash to the dedicated section of your personal area.
Crypto360 have to verify the hash of received file again to prevent files corruption, as the customer do. The generated hash have to match hash that the customer provided, otherwise it meant that the file was modified from external entyties over the upload process. Comparison between hashes serves to the transitional phase, on both sides, customer and Crypto360, can verify the integrity of the file.
DOUBLE ENCRYPTION OF PRIVATE KEY
Once the integrity of the encrypted file has been verified, Crypto360 will proceed by assigning a second encryption layer to enance security level. In this way, to be opened the file requires a double password: first layer owned by Crypto360, second one owned by customer. At this stage, the doubly encrypted file will be ready to be archived by us on our warehouse.
ENCRYPTED FILE STORAGE
Archiving is also an extremely secure system, as it allow 2 different ways of preservation. The first option is to carry to our office the physical file, inside a hard drive, protected in turn by a password and get to allow to inserted it inside our vault. The second option is to put the file on your personal area on our site, then we take care to propagate it to the cloud and geo de-localize the files. We take care to get optimal security measures.