BitCrypt is designed to perform two main functions:
To allow for safe storage of sensitive textual
information on a local computer (or network)
And to allow for passage of any textual
information to another party without detection.
The objective is achieved in such a manner that the
information is not only securely encrypted, but also does not 'look'
like an encrypted text. In this way it is possible to store/pass the
text without bringing any attention to the fact.
This form of information storage is commonly called
'stego'. If you search for that word on the Net you may find that a lot
of developers have undertaken an effort to perfect this technique. I
would seem that the main user of programs like this would be someone
employed by the Intelligence community, that is a spy working in some
foreign country. Anyone else would not need to hide the encryption in
some pictures, but rather would be satisfied with the fact that the text
has been encrypted. (Like for example an encrypted folder in Windows,
which would be visibly encrypted - meaning anyone would see that it is
there and that it is encrypted).
In the case of a spy, he or she needs to send the information to someone
else without raising any form of suspicion. That is, if someone only
suspects that the information has been sent (even in an encrypted
manner) the person would be exposed. The information would not have to
be actually read or deciphered. Just the existence of the encryption
would expose the person.
If you are an ordinary person wishing to use some strong encryption, you
may find this tool to be unnecessarily strong. Most likely, you would be
satisfied with any other encryption tool that is available to the
The encryption process consists of two stages.
The text specified by the user is encrypted
with the usage of strong encrypting ciphers. (A list of available
ciphers is provided so that the user may specify the cipher to be
used by the program)
The encrypted text is 'written' into a user
specified picture image. (That is the actual stego is performed by
the program) This step is done in such a manner that it is
impossible to detect any encrypted text in the image.
The original not encrypted picture
The above image contains encrypted text listed above
key is 123456789 Right click and save it so that you may
read the encryption
A set of examples is included in the download so
that one may see the effectiveness of the program.
Concise Usage Description
To encrypt follow the steps below:
Load a bitmap into the program (at least 24x24
pixels in size)
Open the text editor provided and type or paste
the text to be encrypted
Enter the key you would like to use for the
sake of encryption (at least 9 characters)
Choose the Hash Algorithm, Cipher Algorithm,
and Cipher Mode from the lists provided. You will need to use the
same setting here when decrypting the image, therefore note your
Press the Encrypt button. Note that the text
you have entered is replaced with the encrypted text. This is to
show the actual text string that is being written to the image
Save the image. (Do not press the Encrypt
button twice as it would encrypt the text currently shown in the
To decrypt follow the steps below:
1. Load the encrypted image into the program
Type the encryption key
Choose the encryption scheme used when
originally encrypting the text. All Hash Algorithm, Cipher Algorithm
and Cipher Mode are to be set to the ones used when the image was
Press the Decrypt key.