Releases: FrancescoValentini/HackerInside_EncryptionToolkit
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit-1.0.12.jar)= a2c8dfb78ce8d6345edc18b9b92d45183cb56c67d9d3e74651b1d5458b17c811
1.0.12 - Stable Release
Changelog
- BUGFIX: Fixed a bug that prevented forms from closing
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit-1.0.11.jar)= d7dcc0fe0733eac73448b9664791a9a38af8d107eacdf4fe44664433dbf319e6
1.0.11 - Stable Release
Changelog
- General UI and UX improvements
- Updated the FlatLaf library from version 3.6.1 to 3.7
- Updated BouncyCastle libraries:
- bcprov from 1.80 to 1.83
- bcpkix from 1.81 to 1.83
- Introduced the ability to interrupt ongoing operations (Sign, Verify, Encrypt, Decrypt)
- Improved debug information for the PKCS#11 provider
- Improved error handling during the decryption phase
- Added partial support for encryption/decryption operations with PKCS#11:
- By default, Encrypt and Decrypt operations are disabled when a PKCS#11 token is in use; this behavior can be changed in the settings
- Since SunPKCS11 does not support RSA-OAEP, a setting was introduced to force the use of PKCS#1 v1.5
- ECC keys stored on the token are hidden to prevent potential data loss, as ECC decryption is not yet supported
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit-1.0.10.jar)= e7b89bca3f1bf668de1c8f0fb8961a7beb214d98691cbd76c3803d3113a2cf92
1.0.10 - Stable Release
Changelog
- Added display of the digest algorithm used during signature verification.
- Added support for importing certificates directly from a URL.
- Added an option to hide expired certificates.
- Note: this option is not applied during decryption to allow the use of older keys.
- Added support for an additional CA trust list for signature verification.
- Added support for Brainpool elliptic curves.
- Added support for Edwards-curve Digital Signature Algorithm
- Fixed an issue preventing cancellation of signing and decryption operations.
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit-1.0.9.jar)= 1c293c122e4807991eee8cc30c50fb4f4be8421eecb20a68fe55665c66119fb8
1.0.9 - Stable Release
Changelog
- Fixed: Passwords are now cached only after successful validation
- Fixed: Improved text readability in the verification UI when using the light theme
- Added: Option to include only the Subject Key Identifier (SKI) in encrypted files
- Added: Confirmation alert to verify the certificate fingerprint before import
- Added: Support for specifying a custom Distinguished Name (DN) and key usage when creating certificates
- Improved: Certificate selection experience by hiding certificates that are sign-only (e.g. DSA) from encryption and decryption operations, and hiding encryption-only certificates (e.g. ML-KEM) from signing operations
- Improved: Certificate subject decoding
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit.jar)= 22c69b84d28b57387cac61dc72ba0af26ce1bc352574be32ae32027571984fba
1.0.8 - Stable Release
Changelog
- IMPROVED: cryptographic provider selection during signatures
- ADDED: SKI and Public Key Algorithm in the certificate information window
- ADDED: Support for PQC digital signature algorithms (SLH-DSA-SHAKE-128s, SLH-DSA-SHAKE-128f, SLH-DSA-SHAKE-192s, SLH-DSA-SHAKE-192f, SLH-DSA-SHAKE-256s, SLH-DSA-SHAKE-256f, ML-DSA-44, ML-DSA-65, ML-DSA-87)
- ADDED: Support for PQC encryption algorithms: (ML-KEM-512, ML-KEM-768, ML-KEM-1024)
Warning
The software supports Post Quantum Cryptography (PQC) algorithms for both digital signatures and encryption. Since PQC support for CMS and X.509 formats is a relatively new technology, incompatibilities or, in the most critical cases, the risk of data loss may arise.
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit.jar)= 96a3a689d010cf42cb7bce4ae57d3076958cd9bcf42199ef0853cfa3988ec505
1.0.7 - Stable Release
Changelog
- ADDED: Ability to change the master password of the keystore
- ADDED: Ability to rename aliases in the keystore
- ADDED: Ability to change the password of individual aliases in the keystore
HackerInside EncryptionToolkit
SHA2-256(HackerInside_EncryptionToolkit.jar)= e2d1471400301d052a7fb8c769f584d64e2b30448f065b0f0616225000b1b142
1.0.6 - Stable Release
Changelog:
- Bug Fix: Fixed the incorrect error message that appeared when a certificate was not created during setup.
- New Feature: RSA OAEP is now the default algorithm when using RSA encryption.
- New Utility: Added a tool to calculate and verify file checksums.
HackerInside EncryptionToolkit
SHA256(HackerInside_EncryptionToolkit.jar)= 8362bf579ef0ef1f8d077adb1091623ecc0c2267f9ffa8b5cfd26fdc7c921ea7
1.0.5 - Stable Release
Changelog
-
Improved password security in memory: Passwords are now stored as character arrays (
char[]) instead ofStringobjects. -
Implemented password caching: A cache has been introduced for passwords, which is active exclusively for entries stored in the keystore. Important note: the cache does not apply to the master key.
-
Cache management: Password caching is disabled by default. To enable it, manual configuration is required through the application's settings.
HackerInside EncryptionToolkit
SHA256(HackerInside_EncryptionToolkit.jar)= 8a740e7db1b84bfcb3104af38d54822713cf94144a94d5d6fac89488116683c6
1.0.4 - Stable Release
Changelog
- UI improvements.
- Added user input validation.
- Added a confirmation dialog for key deletion.
- Changed the main keystore path to the user's home directory.
- Added overwrite confirmation for existing files.
- Added support for encryption with multiple recipients.
- Added certificate validation (ensuring it is not expired before any action).
- Added option to export key pairs to the keystore in PKCS12 format.
HackerInside EncryptionToolkit
SHA256(HackerInside_EncryptionToolkit.jar)= 27deb8d1657114d7e8bda79cf80a580f0eeb2be6c1b76bf974575b850396cc8f
New Features:
- Adjustable buffer size
- Encrypting Notepad