Introduction

Kryptor is a simple, modern, and secure file encryption and signing tool for Windows, Linux, and macOS.

It aims to be a better version of agearrow-up-right and Minisignarrow-up-right to provide a leaner, user friendly alternative to GPGarrow-up-right.

Download Kryptor

Pre-built binaries

For instructions on verifying the signatures and digests, please see the Installation page.

circle-check

Package managers

choco install kryptor

scoop bucket add extras; scoop install kryptor

Help wanted!

AURarrow-up-right (Arch Linux)

yay -S kryptor (from source) or yay -S kryptor-bin (published binary)

nix-shell -p kryptor

circle-check

Source code

You can find the source code on GitHubarrow-up-right.

License

Kryptor is licensed under GPLv3arrow-up-right.

Contact

If you'd like to report a bug, provide feedback, ask a question, or need technical support, GitHubarrow-up-right is the place to go.

To report a vulnerability, please see the SECURITY.mdarrow-up-right file.

For other enquiries, please email me at samuel at samuellucas dot com.

If you've found the software useful or just approve of the design and goals, please consider donating. As a student, every little helps, and I will be eternally grateful.

  • Monero: 46hQy5JebdE5L3XsCAwh9tQ6zVA4631JQQb5f9mFJWQ99XaH1SUs7CDPq5QPnKq74rbzGZPxFQD9K45UYxq211V8C2F5iVD

Goals

Kryptor aims to be better than a combination of agearrow-up-right and Minisignarrow-up-right in terms of security and usability. The use case is to protect files for backups and sharing, with a focus on limiting metadata.

It's not attempting to be a complete replacement of GPG. That would lead to similar problems, such as considerable complexity and too much code to single-handedly audit.

Simple

  • A limited number of command-line options.

  • Allow some options to be skipped to shorten commands.

  • Encryption and signing support to avoid having to use different tools.

  • Support for passphrases, symmetric keys, and asymmetric keys.

  • Encryption of multiple files and directories to avoid having to use different tools.

  • Optional file name encryption and overwriting of input files.

  • Short public keys that can be copied and pasted or shared as files.

  • Generate key pairs without having to use a separate keygen program.

Secure

Documented

Out of scope

  • Backwards compatibility (for major versionsarrow-up-right): Kryptor uses an indistinguishable from random file format for encryption, meaning there's no way to tell if a file was encrypted by Kryptor or which version was used from looking at the contents. Furthermore, almost every protocol has flaws/limitations that cannot be corrected without breaking changes. A good example is adding support for post-quantum algorithms, which are still being researched/standardised.

  • Compatibility with other tools and protocols: you cannot be better by being the same, and compatibility on top of something new just increases complexity. There are limitations with other programs that need to be addressed, which requires breaking changes, such as the lack of authenticated key exchangearrow-up-right and key commitmentarrow-up-right in agearrow-up-right.

  • Key distribution: just share your public keys on a personal website or social media account. If you only use them to communicate with friends or family members, you can share them via a messaging app like Signalarrow-up-right.

  • Disk encryption: this is completely different to file encryption. It's best left to anotherarrow-up-right tool.

  • Anything related to email: although you can, of course, attach encrypted files and signature files to emails.

  • A GUI and mobile apps: a lot easier said than done. I simply don't have the time.

  • A password storearrow-up-right: there are numerous problemsarrow-up-right with this approach. Just use a GUI password manager like Bitwardenarrow-up-right or KeePassXCarrow-up-right.

  • Things few people currently use: for example, YubiKeysarrow-up-right. It might be a 'cool' feature to have, but it's useless for the majority of people.

Acknowledgements

Huge thanks to everyone in this section!

Contributors

Dependencies

Cryptographers

Organisations

Last updated