A Windows desktop app for cryptographically protecting files using symmetric and asymmetric techniques.
Run from executable
-
Download FileLocker.exe (SHA256 below)
af609e3f97af864e44cdee241bad2fe951c7758d2393b2226c9b0f5724b4df53
-
Double-click FileLocker.exe, click "More info", and then click "Run anyway". This prompt will disappear the next time FileLocker is run.
Run from source code
-
Download the .NET SDK from Microsoft's website here or verify installation by running the following command:
dotnet --version
-
Navigate to FileLocker/WinFormsUI/ and launch with the following command:
dotnet run
Summary
The Dashboard Form displays files added to FileLocker's scope, allows addition of files, provides a key generation service, and log navigation feature.- Guide π: opens the GitHub repository in the default browser.
- Keys π: displays the key panel.
- Logs π: displays the log panel.
- Add βΌ: shows dropdown options to add files to the scope by manually selecting or importing an archive.
- File List: right click on a file to display options or drag and drop files onto the list to add them.
- Search Box: filters files based on the search query. Filter by file type by searching
.txt
or.png
, or filter by algorithm by searching.aes
or.3des
.
Locked File Panel
A locked file can be decrypted, shredded, shown in File Explorer, or exported.- π Path: copies the path to the clipboard.
- π SHA: copies the SHA to the clipboard.
- Decrypt π: opens the Decrypt Form.
- Shred ποΈ: shreds the file by overwriting its contents with random data and then deleting.
- Explorer π: launches File Explorer with the file selected.
- Export π€: exports the file to a .zip archive.
Unlocked File Panel
An unlocked file can be encrypted, shredded, or shown in File Explorer.- π Path: copies the path to the clipboard.
- π SHA: copies the SHA to the clipboard.
- Encrypt π: opens the Encrypt Form.
- Shred ποΈ: shreds the file by overwriting its contents with random data and then deleting.
- Explorer π: launches File Explorer with the file selected.
Moved/Deleted File Panel
An moved or deleted file can be relocated or removed from scope.- Relocate: find the moved file.
- Remove: remove file from scope.
Keys Panel
Keys pairs can be created and public keys can be imported.- Create: opens the Create Key Pair Form.
- Import: imports a selected public key archive.
- Key Lists: right click on a key to display options.
Logs Panel
Logs can be viewed and navigated using the various filters.- Level: filter by log level.
- All time: display all logs.
- Last Month: display logs within the last month.
- Last Week: display logs within the last week.
- Last Day: display logs within the last day.
- Search Box: filters logs based on the search query.
Encrypt Form
The Encrypt Form allows encryption by choosing an industry-standard encryption algorithm such as AES or 3DES and providing a strength-enforced password. Password fields are cleared after 30 seconds of inactivity.
- Generate Random: generates a random password that satisfies the strength policy.
- Clear: erases both password fields.
- β: encrypts the file with the provided password. If lost, the file cannot be decrypted. FileLocker maintains a zero-knowledge policy.
- π: shows or hides the password fields.
Decrypt Form
The Decrypt Form allows decryption by providing the encryption password. Password field is cleared after 30 seconds of inactivity.
- β: decrypts the file with the provided password, if correct.
- π: shows or hides the password fields.
Import Form
The Import Form allows an import of a .zip archive.
- Open: choose a .zip archive.
- Save To: the location where the file will be saved.
- Import: loads the archive and saves the file to the chosen location.
Create Key Pair Form
The Create Key Pair Form allows creation of a public/private key pair.
- Generate Random: generates a random password that satisfies the strength policy.
- Clear: erases both password fields.
- β: creates the key pair and encrypts the private key with the provided password. If lost, the key cannot be used to sign. FileLocker maintains a zero-knowledge policy.
- π: shows or hides the password fields.
- OS: Windows
- IDE: Visual Studio
- Programming Language: C#
- Framework: .NET
- UI: Windows Forms
- Version Control: Git / GitHub
- Algorithms: AES, 3DES, HMACSHA256, PBKDF2, RSA, ECDSA
- Logging: Serilog
- Unit Testing: xUnit
- Confidentiality: AES and 3DES encryption.
- Integrity: HMAC integrity checks of stored and transmitted data.
- Password Strength Policy: strong passwords mitigate brute-force attacks.
- Password Generation: passwords generated without the need to manually type, mitigating the effect of keystroke logging malware.
- Password Management: password inputs cleared after a set time if the device is left running.
- Password-Based Key Derivation: encryption keys derived from passwords.
- Logging: important events logged such as encryption and decryption.
- Constant-Time Comparison: libraries use constant-time comparison to mitigate timing attacks.
- File Shredding: files deleted without leaving traces by overwriting with random data.
- SOLID Principles: facilitate quick code updates in the case of a new exploit.