BitCrypt antivirus report at



An Ultra-Strong Encryption that is easy to use


So far, no one was able to break into this encryption
but some have tried to discredit it

                                                                       Moshe Szweizer

A version of BitCrypt called The Privacy Tool, which has a more conventional user interface, may be downloaded from this site The Privacy Tool

BitCrypt is an elegant encryption utility that allows for storage and transmission of information in an undetectable manner. The software may be used to store plain text and hide it from any third party, or to send information through the means provided by the Internet.

The encryption method consists of two steps in which a user supplied text is concealed within a bitmap image:

  • firstly encrypting the text with the ciphers,

  • subsequently storing the encrypted text within a user selected bitmap image.

This later step is called steganography, which means "to hide in an invisible manner".


The software hides from the user the complexity of its inner workings. In fact BitCrypt is designed to be easy to use, and requires only a few steps to perform the task of storing and retrieving the text.

The strength of both the initial encryption together with the subsequent steganographic implementation makes the encryption not possible to be broken into. This is to the extend of contemporary supercomputer techniques not being capable of breaking the encryption. The only weak point being the key supplied by the user.

BitCrypt is a boutique style programme designed for those who require the strongest encryption possible. It is provided with a request of being used for legal purposes only.



System Requirements

Operating System: Any current version of Windows
Processor: Pentium Processor or better
Memory: 64 Mb RAM or more



Ciphers Used in the Program


Diamond II
Sapphire II


Key Length
96 bit
448 bit
2048 bit
256 bit
128 bit
256 bit
128 bit
128 bit
384 bit
8192 bit
128 bit
128 bit
128 bit
128 bit
256 bit


Secure Communication Software objectives


Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no communication is guaranteed secure in this sense, although practical limitations such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication are limiting factors to surveillance.

The purpose of this software is to allow for the level of security which is sought by the most demanding applications. Most importantly when a person may expect to be under some form of surveillance and still needs to be able to communicate in an unobservable manner. In such a situation an encryption software that make the transmission visibly encrypted is not good enough. The objective of the software is to make the very fact of transmission being invisible.

The problem of hiding information is sometimes referred to as steganography or stego for short. The simplest and most commonly thought of would be a use of some form of invisible ink on plain paper. The writing would show itself up when the ink was heated.

With the software implementation one would suspect that the most sought after solution would be to perform two step hiding of the data. Firstly, encrypt the text itself, and secondly hide the resultant encryption is some medium that would make the transmission invisible.


Thus, one could use one of the strong software text encrypting algorithms, and then hide the encryption in pictures, music downloads, video clips and the like.

The recipient would download the image and then process it through some decrypting software. As long as the hiding itself is not detectable this would be the perfect method of hiding data.

One of the problems associated with the most commonly available software that does this is the fact that the software tries to hide data in jpeg images. This has been proven to be a fatal choice, as the act of hiding is detectable through software methods. The problem with jpeg images is associated with the fact that the jpegs are already processed through the compressing software (to create the jpeg itself). This together with the additional disturbance provided by the encrypting software makes the communication detectable.

The way out of this problem is to use plain bitmap images as the medium of communication. When the encrypting software makes changes to the bitmap the effect may be made undetectable. The software provided on this page is a strong example of such approach.  That is, even if a computer aided analyzes of the encrypted bitmap image is performed, the fact that it contains the encrypted text would not be detectable.

Keywords: encryption, text encryption, steganography, encryption techniques, secure encryption, powerful encryption, unbreakable encryption, very strong encryption, secret communication, covert transmission, secure transmission, watertight security, secure communication, opaque information transmission