Technical information

What is Polar Encrypt, how powerful is it and what do you get with it? Keep reading to learn about the powerful data protection you can do with this application.

Upon which encryption and data compression technology is Polar Ecrypt based on?
Polar Encrypt is based on Polar ZIP component v. and Polar Crypto component v.
Polar ZIP supports industry standard ZIP compression and Polar Crypto supports unbreakable AES encryption.

What is AES?
The Advanced Encryption Standard (AES) will be a new Federal Information Processing Standard (FIPS) Publication that will specify a cryptographic algorithm for use by U.S. Government organizations to protect sensitive (unclassified) information.
Rijndael encryption algorithm is selected as the proposed AES algorithm. Rijndael is an iterated block cipher with a variable block length and a variable key length. The block length and the key length can be independently specified to 128, 192 or 256 bits.
Polar Encrypt uses 256 bit encryption, padding = PKCS5, Cipher mode = CBC0.

Polar Encrypt creates archives with a .zip extension. When an archive is created, all files are compressed using the standard zip algorithm, then they are encrypted using the Advanced Encryption Standard (AES) algorithm and lastly they are archived into a .zip file, so that it takes up less space on the disc.
The compression is the standard PKZIP compression, which means that the archive can be viewed in programs like WinZip.
However, the type of encryption is not the same as is used in WinZip, which means that proper extraction and decryption is not possible within such applications. Extraction, however, is possible in any application that supports the AES encryption/decryption.

Minimum system requirements

  • Microsoft Windows 95 + Internet Explorer 4.* / 98 / NT 4.0 / 2000 / ME
  • Intel 486DX with 16 MB RAM
  • 10 MB free disk space


© 1995 - 2018 Polar d.o.o.