Back to product page

WeOnlyDo! COM Crypt ActiveX Control Introduction


General Information

wodCrypt is a lightweight component that provides strong encryption for your applications. Whenever you need to secure your transactions, wodCrypt's cryptography can be used. It provides support for most common crypto algorithms, such as
  • AES
  • DES, TripleDES
  • Blowfish
  • Cast
  • RC2
  • RC4
  • RC5
  • UNIX crypt command
for symmetric encryption and decryption,
  • RSA
  • DSA
for making and verifying signatures, and
  • MD5
  • SHA1
  • SHA256
  • SHA384
  • SHA512
  • CRC16
  • CRC32
for creating hashes.

Working with Blobs

For performing data manipulation, wodCrypt works with Blobs (Binary Large OBjectS - although they don't have to be large!). The Blob is our object that can read and write data - which means you can read and write string variables and bytes array. What's more, they can present the information in BASE64 and HEX encoded format if your environment doesn't like to work with binary data. A Blob is, by definition, an abstract object. We have created three variants of it: MemBlob, FileBlob and StreamBlob - you can use whichever of these is more appropriate for your application.

Optimized code

Besides working in accordance with cryptography standards (i.e. without random padding and internal wrapping), wodCrypt can also work in Optimized mode. In this case it is unlikely that other encryption tools will be able to (directly) access your encrypted data, because wodCrypt will add specific information to it such as the size of the Blob. Optimised mode ensures that after decryption you will get exactly the same plaintext as you had before encryption. When working to standards, wodCrypt has to look after block sizes, key sizes etc.. for each protocol, so any empty spaces need to be filled with zeros. It's not a smart way to protect the data - but it's necessary so that text that has been encrypted by wodCrypt remains accessible to other decryption tools and continues to give the expected results.

MS Authenticode signatures

wodCrypt can create digital signatures based on Microsoft Authenticode technology. Assuming you have valid code signing certificate, you should just call SignEXE method to have your file digitally signed. No more Internet Explorer warnings will appear after you sign your files.

Compression on the fly

You can decide to compress data prior encryption (and decompress after decryption) using ZLIB or GZIP compression formats. That way you can save your bandwidth up to 80% when transferring data over internet. There is no need to use external engine for compression - wodCrypt has it internally! wodCrypt can even behave as standalone compression engine if you choose to set 'No encryption' in Type property!

Licensing - royalty free

wodCrypt is royalty free - once you create your application, you can distribute binary versions of wodCrypt free of charge. Licenses are purchased for design-time development only, one license for each developer on the project - and that's all! Besides the ActiveX version (which can be used even in FoxPro), wodCrypt has a COM object as well, which can be used from many environments, including VB, VC, Delphi, VBS, ASP etc..

Platforms

Windows