logo
  • Home
  • Software
    • アタッシェケースアイコン
      AttachéCase

      File encryption tool (Windows)

    • アタッシェケースアイコン
      RhymingTool

      Creating lyrics & rhyming in Japanese (Windows)

    • MarkDown#Editorアイコン
      MarkDown#Editor

      Markdown dual editor (Windows)

    • OutlineTextアイコン
      BossComing

      Replace by a fake desktop in an instant(Windows)

    • たまさぼアイコン
      "Tamasabo" Growth Simulation Game

      Smart phone app(iOS)

  • Web App
    • AttacheCase.NETアイコン
      AttacheCase.NET

      Secure key exchange and encryption support services

    • i18n.pageアイコン
      i18n.page

      Easy website translation tool(Web service)

  • Development tools
    • Png2WinIco

      PNG to Windows ICO file generation(Windows)

    • SHCode-JP-Zen-Haku

      Monospaced font for programming(Windows, macOS, Linux)

    • Hidemaru Editor Date Insert Macro

      A macro for the "Hidemaru Editor" that allows flexible date insertion.

    • Hidemaru Editor Markdown highlighting definition file

      Highlighting definition file for the "Hidemaru Editor"

  • About

Index   ( ja / en )

  • Getting Started
    • Setup
    • Limitation
    • If you forgot your password
  • How to use
    • Encrypt a file/folder
    • Decrypt a file
    • Self-executable format output
    • Public key cryptography
  • Settings
    • General
    • Window
    • Password
    • Save
    • Encryption
    • Decryption
    • Delete
    • Compress
    • System Option
    • How to use INI files
    • Password File
    • Camouflage extension
    • Password input limitation
    • Data salvage
  • Command line
    option
    • Basic Option
    • Save Option
    • Delete Option
    • Compress Option
    • Advanced Option
    • Other Option
  • Technical Information
    • Safety through open source
    • To begin with, encryption algorithm is open
    • More transparency
    • Concerns that a backdoor may have been installed
    • Conclusion
    • Cryptographic algorithms
    • Cryptographic mode
    • Key derivation according to RFC2898
    • SHA-1 to SHA-256
    • Compression algorithms
  • Support
    • Commercial Use
    • Copyright
    • License
    • FAQ

How to Use

Encrypt a file/folder

It is simple to use. All you have to do is drag and drop the file you want to encrypt onto the "AttachéCase" shortcut icon or the window that starts up.

Drag and drop

Alternatively, if you already have a predetermined output file type, you can choose the output format first.

Select an output format in advance

After dragging and dropping the file, enter the password. We recommend that you enter a long password that is difficult to guess.

Notice
In the old version (~ver.2), there was a limit to the number of characters that could be entered in the password, which was case-sensitive and limited to 32 single-byte characters (16 double-byte characters). But, in ver.3 and later, there is no such limitation.
Password input screen

Also in this screen, you can choose the output format by clicking on the AttachéCase icon.

Click AttachéCase icon Select the output format later.

Once you have entered your password and clicked the OK button, you will be prompted to enter the same password again for confirmation. This is to prevent you from encrypting with a wrong password and not being able to get it back.

Re-enter password screen

Next, press the "Encrypt" button to start the process, and when you see the "Done" message, the encrypted file has been created.

Cryptographic process complete screen ATC file icon

Decrypt a file

As with encryption, this is done by dragging and dropping the encrypted file onto the attaché case icon, or onto an open window.

Drag and drop encrypted files.

Attache case files, even if they have different extensions, are automatically identified as encrypted files by directly looking at the file data. So you can drag and drop a self-executing file to decrypt it without any problem.

If you can confirm that the file is encrypted, you will be asked for the password to decrypt it, as shown below.

Password input screen for decryption.

When you see the word "Completed" the encrypted file should now be in the same original files location.

Decryption completed screen Word file icon

Self executable file

In the "Before Encryption" and "After Dragging and Dropping Files/Folders" screens shown below, select the following icons

Self-executable format selection window

Self executable file icon

The output will be an executable file (*.exe).

Notes on self-executable output
  • .NET Framework 4 is required in your environment. The above frameworks are required even if the AttachéCase is not installed in your environment.
  • The file size will increase.
    The file size will be larger than a normal encrypted file (*.atc) because the decryption function is included in the executable output.
  • When you output as an executable, the settings you made in the AttachéCase will not be saved.
    Note that this means that basic settings, save settings, delete settings, system settings, etc. are not included in the file. It will be a simple decrypt and decompress function. For example, you will always be asked for a password, the decrypted file will be saved in the location of the EXE file, and the original file (*.exe) will not be deleted.
  • There are no specific distribution requirements for the output executable file.
    You are free to distribute executable files. You are free to distribute the executable files, including the regular *.atc files. ( -> See "FAQ" and "License" for details.)

Public key cryptography

Public key cryptography is an encryption method that uses two key files to encrypt and decrypt.

Usually, the same password is used to encrypt and decrypt, as in symmetric key cryptography.

Symmetric key cryptography

Public key cryptography refers to a set of "key bundles" in which the roles are divided into two parts: a password to perform encryption (file) and a decryption password (file).

Public and private key

In other words, even if you send a public key that can only be used for encryption, it is still safe, even if it is eavesdropped on, because it "can only be used for encryption. As long as the private key (for decryption) is at hand, the encrypted file cannot be undone.

First, generate a pair of public and private keys at hand.

Generate public and private key

Then, you send your "public key" to the person you want to exchange data with.

Send the public key

In this case, the private key is safe because it has not left its own local area.

Your private key stays with you
Generate public and private keys

Now, let's actually encrypt and decrypt with public key cryptography in the AttachéCase. First, we need to generate a pair of public and private keys.

Select the public key encryption

Select "Public Key" from the main window.

Select the Generate Key

Click the "Generate Key" button, and then determine the file name and generate the public key and private key.

Public and private key file

This will generate two files, one for the public key (.atcpub) and one for the private key (.atcpvt).

Encrypt files with a public key

Load the "public key (.atcpub)" file that you created earlier into the AttachéCase. At this point, the GUID, hash, and other information will be displayed, but if these values are communicated in advance to the person to whom you have given the public key by another means, the possibility of tampering will be reduced and the exchange will be more secure.

Load the public key

With this screen displayed, drag and drop the file you want to encrypt to complete the encryption.

Decrypt an encrypted file with a private key

A file encrypted with a public key can be decrypted by reading the "private key (.atcpvt)".

Load the private key

While in this screen, drag and drop the encrypted file to decrypt it.

© 2011-2025 M.Hibara

Facebook icon
Twitter icon
GitHub icon
Qiita icon