Encrypter-X
Encryption & Decryption
There are basically two types of applications for encryption for which the Encrypter-X tool is suitable. On the one hand, documents are to be stored securely and protected from unauthorized access by third parties, and on the other hand, messages that are sent to a recipient are to be encrypted.

In the first case, the keys must be stored securely so that the documents can be decrypted at any time for further use. They should only be protected from unauthorized access by third parties. Nevertheless, Encrypter-X manages a key bundle in such a way that once used, keys cannot be used again for encryption. If all keys of a key bundle are used up, a new key bundle must be created. Key bundles cannot be reproduced. For decryption, the used keys can or must be stored, of course. And it is extremely important to keep keys for which there is still encrypted data in secure locations and duplicated if possible, since the keys cannot be regenerated.

In the other case, the messages (or files) are sent to a partner who also has the necessary keys on the other side to decrypt the received messages. In that case, the keys used must be "disposed of" after use on both sides in any case. This is also because the risk of encrypted messages falling into unauthorized hands during transmission is much greater than that of encrypted data in the private sphere falling victim to an attack. Encrypter-X also registers all used keys as spent on the recipient side, so they can really only be used once for encryption.