Using 7-Zip to Encrypt and Send Sensitive Files (2024)

Using 7-Zip to Encrypt Sensitive Files

File encryption is considered as the best means of protecting sensitive and/or confidential documents whether or not they are to be shared or simply stored. This document provides guidance on installing and using two encryption tools for use on Windows and MacOs computers: 7-zip for windowsand Keka for MacOS.

When sharing encrypted documents with others via email, do not give out the encryption password withinthe same email from which you are sending the encrypted file.

Send the password to the recipient either by calling them with the password or by sending an SMS text to their trusted mobile number.

Use a different medium for the password.


IMPORTANT: Once a .7z encrypted file is created and shared, the recipient must have the 7-Zip software to be able to decrypt the file.

Unless a self-extracting file is created during the encryption process, see‘ALTERNATE METHOD TO SHARING ENCRYPTED FILES’ below.

The IT HelpDesk can assist with installation and use of these encryption tools however it is important to note that theycannot restore access to files should you forget the password.

  1. Most CU owned PCs and laptops will already have 7-Zip installed on them.
    However, if you are installing onto your own private machine, 7-zip is completely free software, justfollow from step 2.
  2. Go to the url http://www.7-zip.org/download.html
  3. Select the appropriate version for the laptop or computer you are using, most modern Windows devices are 64-bit:

    Using 7-Zip to Encrypt and Send Sensitive Files (1)

  4. Open the downloaded .exe file and follow the instructions,it’s a simple install.
  1. To select a file to encrypt, use ‘My Computer’ or ‘Windows Explorer’ to bring up the folder / file and select by clicking the required file/folder:

    Using 7-Zip to Encrypt and Send Sensitive Files (2)

  2. Right-click on the selected files and choose “7-zip” -> “Add to archive”:

    Using 7-Zip to Encrypt and Send Sensitive Files (3)

Choose a name for the encrypted file and select the following recommended options:

  • Archive format = 7z (Do not choose ZIP, this uses a much less secure encryption method)
  • Enter a strong password that meets CU requirements (please do not use “concord” or “12345” or other weak password)
  • Encryption method = AES-256 (the strongest and most secure encryption method)
  • Encrypt the filenames = Enabled (check it) (this encrypts and hides the names of your files making it much more difficult to crack)

    Using 7-Zip to Encrypt and Send Sensitive Files (4)

Click “OK” and an encrypted 7-zip archive file should appear in the same folder as your original files.

You can now securely email the .7z file to anyone (assuming the file size does not exceed 150Mb internal or 25Mb external).

The recipient can extract the encrypted file by simply double-clicking the .7z file, which will start the 7-Zip software and begin the extraction, or by right-clicking the .7z file -> “7-ZIP” -> “EXTRACT HERE”. They enter the password you provided to them to extract it, it cannot be extracted without it.


Alternate method to sharing encrypted files

If the recipient does not have the 7-Zip software installed, you can point them to the url shown above (windows only)
or you can use the followingmethod, whichcreates a self-extracting (.exe) file that can simply be double-clicked and extracted using the supplied password,7-Zip does not need to be installed by the recipient:

Make sure ‘Create SFX archive’ is enabled (checked) to create the self-extracting file:

Using 7-Zip to Encrypt and Send Sensitive Files (5)

The encrypted self-extracting .exe archive file should appear in the same folder as your original files.

Here’s the Catch: most email providers, including Office 365, do not allow the emailing of .exe attachments.

To get around this, CU users can utilize OneDrive to upload the encrypted .exe file and then share it with the intended recipient.

The recipient can then download it using the shared link and double-click to extract.

(Sometimes renaming the .exe extension can also work, but Office 365 usually detects it, it’s easier to simply share it with OneDrive)

Again, as a reminder:

When sharing encrypted documents, do not give out the encrypted file password using the same email from which you are sending the encrypted file.

Send the password to the recipient either by calling them with the password or by sending an SMS to their trusted mobile number.

Use a different medium for the password.

Installing Keka (MacOS)

You will need local administrator privileges to proceed with the installation, if you need assistance with this part of the installation, please contact the HelpDesk at x5291

When ready go to http://www.kekaosx.com/en/

Click the download method you prefer and follow the instructions:

Using 7-Zip to Encrypt and Send Sensitive Files (6)

Using Keka to encrypt a file or files

Open Keka, select 7z and enter a strong password.

Using 7-Zip to Encrypt and Send Sensitive Files (7)


Drag and drop one or more files you want to compress onto the Keka window and they’ll be compressed into an encrypted 7z file with the password you provided:

Using 7-Zip to Encrypt and Send Sensitive Files (8)

Additional Recommended Viewing Using 7-Zip

      Using 7-Zip to Encrypt and Send Sensitive Files (2024)

      FAQs

      Is 7-Zip encryption good enough? ›

      If you have sensitive files to store on your computer or share in an email, it is highly recommended to use 7-zip encryption.

      How to use 7-Zip to encrypt files? ›

      Creating an Encrypted File

      When you've reached the right folder that contains the file you want to encrypt, right-click on the file. Select 7-Zip and click on Add to Archive... The only details you need to enter are the Encryption Password. Enter a password of your choice, then re-enter to confirm.

      What is the best encryption method in 7-Zip? ›

      Change the Encryption Method to “AES-256”. Note: There is a trade-off between using AES-256 and ZipCrypto. AES-256 is proven much more secure than ZipCrypto, but if you select AES-256 the recipient of the zip file may have to install 7-zip or another zip program to read the file contents.

      Is it better to encrypt and zip or zip and encrypt? ›

      The correct order is to compress the file first and then encrypt the compressed data. This provides both security and efficiency benefits for protecting your sensitive information during storage or transmission.

      What is the 7-Zip security flaw? ›

      The specific flaw exists within the parsing of 7Z files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process.

      Is there anything better than 7-Zip? ›

      WinZip can compress files in ZIP and, unlike WinRAR or 7-Zip, it can also compress in IHA/IHZ or UUencoded if you run WinZip 12 and higher. WinZip can decompress ZIP, TAR, GZIP, Compress, CAB, RAR, BZ2, IHA/IZH, 7Z, IMG, ISO, XZ, VHD, and VMDK.

      Is 7zip safe? ›

      7-zip is generally considered safe to use. It has been widely used for many years, and its source code has been reviewed by security experts due to its open-source nature.

      Is 7zip completely free? ›

      7-Zip is a free and open-source file archiver, a utility used to place groups of files within compressed containers known as "archives".

      How safe are encrypted files? ›

      Encryption Can't Prevent Accidental Data Loss

      No matter how highly-encrypted your data is, it is still susceptible to being transmitted to the wrong recipient via email, or otherwise shared via incorrect attachments or unsecured encryption keys.

      Is 7ZIP still the best? ›

      7-Zip is an excellent file archiving software that I would highly recommend. It is a free and open-source software that supports a wide range of file formats, including 7z, ZIP, RAR, and more.

      What is the strongest encryption method? ›

      AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today.

      What is the default encryption for 7ZIP? ›

      Strong AES-256 encryption.

      Should I zip before or after encryption? ›

      Compress and then encrypt is better. Data compression removes redundant character strings in a file. So the compressed file has a more uniform distribution of characters. This also provides shorter plaintext and ciphertext, which reduces the time spent encrypting, decrypting and transmiting the file.

      How do I know if my zip file is encrypted? ›

      In some cases, when you attempt to unzip files from (extract) or view files in a Zip file (. zip or . zipx) a Decrypt dialog will display requesting a password. This indicates that the files in your Zip file have been encrypted.

      What is the best encryption method for securing files? ›

      The Advanced Encryption Standard (AES) is the trusted standard algorithm used by the United States government, as well as other organizations. Although extremely efficient in the 128-bit form, AES also uses 192- and 256-bit keys for very demanding encryption purposes.

      How secure is a password protected 7-Zip file? ›

      7zip is secure since it uses AES-256 in CBC mode that can provide CPA security and there is no problem there. Keep in mind that CBC has no integrity and authentication.

      What level of encryption is 7z? ›

      The main features of 7z format: Open architecture. High compression ratio. Strong AES-256 encryption.

      What is the best encryption for zip files? ›

      256-bit AES is stronger than 128-bit AES, but both of them can provide significantly greater security than the standard Zip 2.0 method described below. An advantage of 128-bit AES is that it is slightly faster than 256-bit AES, that is, it takes less time to encrypt or decrypt a file.

      How safe is ZIP encryption? ›

      Vulnerability to known-plaintext attacks

      Zip encryption is susceptible to known-plaintext attacks, which can reveal the encryption key when an attacker has access to both the encrypted and unencrypted versions of the same file. This vulnerability further undermines the security of Zip-encrypted files.

      Top Articles
      Cathie Wood Ark Tech Portfolio: ETF allocation and returns
      Beef Stock vs Beef Broth: Benefits, Nutrition, Uses & Crucial Differences
      English Bulldog Puppies For Sale Under 1000 In Florida
      Katie Pavlich Bikini Photos
      Gamevault Agent
      Pieology Nutrition Calculator Mobile
      Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
      Hendersonville (Tennessee) – Travel guide at Wikivoyage
      Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
      Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
      Craigslist Dog Kennels For Sale
      Things To Do In Atlanta Tomorrow Night
      Non Sequitur
      Crossword Nexus Solver
      How To Cut Eelgrass Grounded
      Pac Man Deviantart
      Alexander Funeral Home Gallatin Obituaries
      Energy Healing Conference Utah
      Geometry Review Quiz 5 Answer Key
      Hobby Stores Near Me Now
      Icivics The Electoral Process Answer Key
      Allybearloves
      Bible Gateway passage: Revelation 3 - New Living Translation
      Yisd Home Access Center
      Pearson Correlation Coefficient
      Home
      Shadbase Get Out Of Jail
      Gina Wilson Angle Addition Postulate
      Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
      Walmart Pharmacy Near Me Open
      Marquette Gas Prices
      A Christmas Horse - Alison Senxation
      Ou Football Brainiacs
      Access a Shared Resource | Computing for Arts + Sciences
      Vera Bradley Factory Outlet Sunbury Products
      Pixel Combat Unblocked
      Movies - EPIC Theatres
      Cvs Sport Physicals
      Mercedes W204 Belt Diagram
      Mia Malkova Bio, Net Worth, Age & More - Magzica
      'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
      Teenbeautyfitness
      Where Can I Cash A Huntington National Bank Check
      Topos De Bolos Engraçados
      Sand Castle Parents Guide
      Gregory (Five Nights at Freddy's)
      Grand Valley State University Library Hours
      Hello – Cornerstone Chapel
      Stoughton Commuter Rail Schedule
      Nfsd Web Portal
      Selly Medaline
      Latest Posts
      Article information

      Author: Rubie Ullrich

      Last Updated:

      Views: 5635

      Rating: 4.1 / 5 (72 voted)

      Reviews: 87% of readers found this page helpful

      Author information

      Name: Rubie Ullrich

      Birthday: 1998-02-02

      Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

      Phone: +2202978377583

      Job: Administration Engineer

      Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

      Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.