#### Go to Website

**LetEncrypt **is the encryption and decryption software developed by **atSofts**. It uses **AES-256 **encryption method to encrypt/decrypt the files. LetEncrypt has been developed to support **.atSofts** file format for encryption and decryption. atSofts has been concerned about **cyber security** **concerns ** and the security of files on Internet.

#### So what is AES-256 encryption method?

The **Advanced Encryption Standard** (**AES**), also known by its original name **Rijndael** (Dutch), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.AES has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES),which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.

##### Description of Ciphers of AES

AES is based on a design principle known as a substitution–permutation network, and is efficient in both software and hardware.

Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, Rijndael *per se* is specified with block and key sizes that may be any multiple of 32 bits, with a minimum of 128 and a maximum of 256 bits.

AES operates on a 4 × 4 column-major order array of bytes, termed the *state*.^{[note 3]} Most AES calculations are done in a particular finite field.

For instance, if there are 16 bytes, , these bytes are represented as this two-dimensional array:

The key size used for an AES cipher specifies the number of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The number of rounds are as follows:

- 10 rounds for 128-bit keys.
- 12 rounds for 192-bit keys.
- 14 rounds for 256-bit keys.

Each round consists of several processing steps, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key.

[Source: Wikipedia]

#### Security of LetEncrypt

LetEncrypt uses AES-256 i.e. 256-bit AES encryption. The cipher **AES**-**256** is used among other places in SSL/TLS across the Internet. It's considered among the top ciphers. In theory it's not crackable since the combinations of keys are massive. Although NSA has categorized this in Suite B, they have also recommended using higher than 128-bit keys for **encryption. ****AES**-**256** - the block cipher - as far as we know hasn't been **broken**. ... That means that an algorithm that is able to **crack AES** may be found. Most ciphers cannot be proven to be secure. Only a handful algorithms such as the one-time-pad are secure in the information-theoretical sense.

So, yes your file is highly secured with LetEncrypt because we use **AES-256 .**

#### Pricing

LetEncrypt is free to use for both developers and users. It is lifetime free but in the app we show ads because the software is free and ads are the only revenue method for us in LetEncrypt.