Home Order Products Contact Imprint Zur deutschen ArchiCrypt Seite

 selected Products
  Archicrypt Live

ArchiCrypt Live brief description

ArchiCrypt Rescue-Master

Data security, Real-time Encryption, Virtual Drives and Volumes

Download size: ~ 14 Megabyte

Windows 2000, 2003, Windows XP and Vista (32 and 64 BIT)
Min. 32 Megabyte RAM
Screen resolution 800x600, High-Color

Buy ArchiCrypt Rescue Master
Download version:
34,95 EURO
49,95 $ (US)

Download full/trial version
Give it a TRY!
Immediately download Your 10 days full featured Trial Version!!!
Most important German PC Magazins have given ArchiCrypt Live the following AWARDS:

Logo PC-Magazine
PC Magazin, one of the leading German pc magazines, says:"ArchiCrypt Live is an easy to use encryption software. It boasts many sophisticated features to protect, manage and transmit sensitive data."

Rating: Excellent

Logo ZDNet
ZDNet.de, the German Version of ZDNet.com, gives ArchiCrypt Live 4 out of 5-Stars.

Rating: Good

Logo Chip Online
Chiponline.de, a leading download portal, writes: „ArchiCrypt Live integrates seamlessly into Windows. Based on wizards it is very easy to use. Files can be encrypted in 4 simple steps.“

Rating: Excellent

Logo PC-Welt
PC Welt commends ArchiCrypt's clearly structured user interface. In his test the editor found encrypting to be extremely easy and safe.

Rating: Rating: 1,7 (On a scale from 1 to 6, with 1 being "Excellent")


Most important international download and review platforms have given ArchiCrypt Live the following Ratings:



3d2f.com editors have called ArchiCrypt Live  "The best among the like"


Brief description:

That's ArchiCrypt Live

ArchiCrypt Live offers real-time encryption and protection for sensitive private or business data. ArchiCrypt Live lets you encrypt all file types on your PC, laptop or network. That way ONLY YOU will be able to ACCESS your confidential information. Unauthorized access is effectively prevented.

Why should you use Encryption

There Are Many Good Reasons For Using Encryption Software

1. You are dealing with important company or government or personal private data
As private or corporate user you collect, create and store more and more confidential data on your PC, laptop or network every day. Think about personal private files (personal pictures or videos, texts, financial documents), confidential business or customer data, contacts and everything else you find on your hard disk (or an other storage media you use).

2. You travel with your data

That's the good thing about living in the digital world! Whereever you go you can take all your data with you. The bad news is: When you travel and have sensitive data stored on your PC or Laptop, USB sticks, memory cards or any other storage media your data is especially at risk.

Data theft often happens when laptops or other storage media are lost (on planes, in hotel rooms,...) or intentionally stolen.

Another security threat while travelling is working with your files on PCs other than your own (e.g. at a customer site, family PC, internet cafe). Chances are traces of your files (e.g. temp files) are left on the other PC ready to be accessed by whoever wants to.

3. You are sending important data from your PC (via email or to remote backup drives)

We exchange data over various channels on a daily basis. Unfortunately none of these channels are safe the way they are. Wether you use email attachments, upload backups to a remote storage place or share files over a network: It's easy to get access to the data traffic and thus to your files.

4. You think password protection of Office files or your Windows user account is safe enough?

Think again! There are loads of tools out there to break just those kinds of "protection". And those tools work! Wether you use a BIOS password, Windows user account with password or Windows Encrypted File System (EFS) - the truth is: It's not safe!

5. Attacks on data increase

The threat towards your sensitive data rises everyday. Hackers, hijackers, competitors, nosy friends or relatives: Many people may be interested in accessing your data. If you keep your data unprotected chances are they will be successful.

This means: Your data is precious and your data is in danger!

Why should I use ArchiCrypt Live

Ease of Use

Using ArchiCrypt Live is as simple as 1-2-3. Select the data you want to protect - chose a password - ArchiCrypt Live© will do the rest.

Professional Encryption Technology

Even at this simplicity ArchiCrypt Live gives you state-of-the-art protection. The technology used in ArchiCrypt Live is also used by government agencies for data protection. Encryption algorithms used in ArchiCrypt Live were developed by independent cryptology experts, tested by the best cryptologists worldwide and recommended by the National Institute of Standards and Technology (NIST) http://www.nist.gov.

Your files can be encrypted using either Blowfish or the Advanced Encryption Standard (256 bit AES) algorithm. This encryption technology will effectively protect your secret data (provided a strong password is used!).

ArchiCrypt Live uses the hash functions SHA-1 (Secure Hash Algorithm 1) with a length of 160 bit and SHA-512 which creates a 256 bit cryptographically secure hash sum. ArchiCrypt Live uses such hash functions for different purposes. First for processing the random data that were collected during the generation of passwords or keyfiles. Second for identifying passwords and for computing keys from passwords.

ArchiCrypt Live only stores decrypted files temporarily in your PC's RAM (memory). It never saves, not even temporarily, any decrypted data to a disk. Your data remains encrypted even while the volume is mounted as a drive. So not even in the event of a power failure will decrypted data remain on your hard disk.

Real-time Encryption

Encrypting sensitive data used to be difficult. ArchiCrypt Live makes data protection simple. ArchiCrypt stores your sensitive data in so called "volumes". Those volumes are single files (file extension is .acl) that contain all the files you placed in the volume. Since your secret data is encrypted and stored in one file it can be easily stored to any data carrier (e.g. hard disks, CDs, DVDs, USB sticks etc.).

The process of encrypting (e.g. when you save a secret file in your ArchiCrypt Live drive) or decrypting a file (e.g. when you open a secret file) happens in real-time ("on-the-fly").

ArchiCrypt Live volumes can hold all kinds of data, pictures, mp3 files, office documents or any other files you use. You can even install applications in an ArchiCrypt volume and run it from there!

Seamless Integration in Windows

To access the secret data in your ArchiCrypt Live volume you need to "mount" ("open" and "load" are used synonymously) the volume. This means ArchiCrypt Live will open the volume, once you have entered the correct password, and make it available on your PC as an extra drive. The opened volume is now an "ArchiCrypt Live drive".

The ArchiCrypt Live drive can be easily accessed from your Microsoft Windows Explorer (or any other file explorer). It will be assigned a drive letter and you can navigate through the files stored in the volume as you would on any other drive or folder.

Huge Volumes

ArchiCrypt offers up to 8 virtual drives (ArchiCrypt Live "drives"). Each can be 256 gigabyte in size. These virtual drives integrate seamlessly in your existing Windows environment. Everything saved to those volumes is stored absolutely safely even after a power failure. Volumes on USB sticks, CDs or DVDs can be used easily without copying the files first. Don't worry if you lose a CD or DVD. Without the password the encrypted data on the disk will be completely useless for the finder.

Encrypting Partitions

ArchiCrypt Live can encrypt entire partitions (or devices such as memory cards, USB sticks, external hard disks) if desired. Encryption will then be again faster when compared to encryption in volumes. Also deleting the volume by accident is effectively prevented, when the whole partition is encrypted.


A secret-container is an area within your ArchiCrypt volume, that can only be accessed with a special password/key. You can think of a secret-container as an invisible safe inside of another safe.

You will have two keys for that safe. One will open only the first safe and leave the second safe unvisible. The second key will open both safes and reveal even the secret information in the second, normally invisible, safe.

For this feature ArchiCrypt Live uses the principle of "plausible deniability". The owner of the encrypted data may reveal one key to decrypt certain information from a volume, and then deny that more keys exist. This statement cannot be disproven without knowledge of all encryption keys involved. The existence of another volume with data within the first volume is then deniable in the sense that it cannot be proven to exist.


ArchiCrypt offers unique "camouflage-files". These volumes are called "camouflage" files, because they hide a volume holding secret data inside of any inconspicuous, normal file (i.e. "carrier file"). You can also say your ArchiCrypt volume is "embedded" in the carrierfile. However a regular user will only see the normal file (and it's content), but not the secret volume. Those files can be fully functional video or picture files or even application files.

For example you can take a regular avi video file and embed an ArchiCrypt Live volume holding confidential data in it. The video will be opened and played back just like normal. Your secret data will be hidden completely invisible inside the video file. This way you can not only encrypt your data. You can hide it as well!

Mobile Data Safes

As the name indicates mobile data safes can be used to transport your secret data and access the data on any other PC. Mobile data safes contain your secret data and an application that can load the secret data. You, or the recipient of the mobile data safe, will not need to have a special ArchiCrypt Live license on the PC on which you access the contents of the mobile data safe. How does it work? Similar to the technology used in camouflage-files, ArchiCrypt Live will embed a container holding your secret data in an application. This application can run on Windows Systems (2000, XP, 2003, Vista (64 bit)) and offer full read/write access to the volume.

Public Key and Certificates

ArchiCrypt integrates public key infrastructure (PKI) procedures. PKI in ArchiCrypt lets you sign your volumes. This way you can exchange volumes with other users without prior contact by using authentication through public and private key. To do this ArchiCrypt Live creates a X.509 certificate with key lengths of up to 2048 bit (RSA) Of course you can also use 3rd party certificates.

Password Generation and Evaluation

ArchiCrypt Live will generate passwords for you! You simply chose how strong you want the password to be and the password generator will create the password for you. Alternatively you can enter passwords manually. Then, based on strictly scientific criteria, ArchiCrypt Live will determine the strength of the password as you type.


Using the ArchiCrypt Card, a specially designed SmartCard, you gain maximum comfort and maximum protection. The ArchiCrypt Card is compatible with all PC/SC readers.

Volumes can be opened automatically once the ArchiCrypt Card is inserted, and closed once the card is removed. Secret keys can be generated right on the ArchiCrypt Card using a real hardware random number generator. The exchange of data between ArchiCrypt Live and the SmartCard reader is encrypted.

Further highlights:

  • Masked password entry stops key loggers that may be running on a system from spying on passwords
  • "Quick Access" lets you access volumes instantly
  • Guest passwords (with limited rights if desired) can be set up
  • Access authentication possible via password, keyfile or ArchiCrypt Card (available separately)
  • "Emergency Shut-Off" feature will close volumes despite drive activity
  • "Magic Word" opens/closes volumes once a user defined "magic" code is entered
  • "Timeout" feature will close open volumes safely after user defined idle time
  • and many more

Dissemination: The test version of ArchiCrypt Live may be distributed free of charge in any type of media.

Keywords: file recovery

ArchiCrypt ®
Copyright © 1997-2008 Dipl.-Ing. Patric Remus. All rights reserved.