parallax background

How it works

One click. Complete protection. Cypherdog Encryption (CE) allows you to encrypt and decrypt any text or file, regardless of its format or size, and share it using any medium, including e-mails supported by our Chrome, Edge and Firefox plugins for Gmail, Outlook and Thunderbird add-ins. Cypherdog Encryption works as a desktop application on all modern operating systems, such as Windows, macOS and Linux.

You can send and receive encrypted files and messages using any web client or native e-mail client or Slack, WeTransfer, Google Drive, Dropbox, or any other communication method. Only the intended recipient will have access to the decrypted content.

Threats in cyberspace

E-mail is one of the most popular electronic communication channels. Like most digital services, it is vulnerable to cyberattacks, which may result in unwanted access to your mailbox and disclosure of confidential information. In the event of unauthorized use of the compromised mailbox, message recipients cannot confirm the sender's identity. 

Activities such as file transfer, file sharing, or messaging are susceptible to cyberattacks, often resulting in the leakage or theft of data for the purpose of economic espionage or compromising the organization. Invoice hacking and ransomware are the most rampant and dangerous cyber threats existing today. Cypherdog Encryption provides a solution to combat them.


Cypherdog Encryption is based on a combination of asymmetric (RSA3072) and symmetric (AES-256) encryption. There is no “trusted” third party in our solution, including us, no Certification Authority and no other communication channel provider (e.g. e-mail service provider). We do not have access to data encrypted by users because we do not have access or copies of the private keys needed for decryption. 

Cypherdog Encryption is a comprehensive solution: on the one hand, it provides encryption of messages and keeping their contents undisclosed to unlawful users; on the other hand, it allows the recipient to confirm the sender's identity.

Cypherdog Encryption supports GDPR, DORA, NIS2, and ISO 2700x implementations and other regulations.

Friendly user interface

Cypherdog Encryption software focuses on simplicity and ease of use. Its Installation process and user registration system are so simple that any individual who has experience with installing antivirus software should be able to handle it without difficulty.

You can encrypt a file by right-clicking and selecting the recipient. You can decrypt a file simply by double-clicking on the file icon. E-mail messages can be partially or fully encrypted by right-clicking on the selected text. Decryption is straightforward and requires only clicking on a button or link, without sharing any passwords or codes with other parties. Cypherdog Encryption, once installed, is all that is needed.

Cypherdog Encryption specificationsFree (after trial)Single User & TrialBusiness
Text/e-mail messages encryption-
Encryption of files/attachments in e-mail messages-
Decryption of e-mail messages/ texts and attachments/ files
Administration panel for users & private keys management--
Backup private key to file (on device)-
Backup of private key to company server in Vault--
One license key for a single user--
One license key for multiple users--
Basic support and online training-
Advanced support and training--
E-mail aliases-
CryptographyEncryption: asymmetric RSA3072 and  symmetric AES-256, SHA512 hash function
Microsoft OutlookAdd-ins to Outlook 2016+ for Microsoft 365/ Exchange Server, webclient & native
Gmail & Google SuitePlugins: Google Chrome, Microsoft Edge, Mozilla Firefox
Mozilla ThunderbirdAdd-ons for Thunderbird for all e-mail providers and servers
Other e-mail clientsManual encryption / decryption / right-click or “magic window”
Other communication channelsWeTransfer, Slack, Google Drive, Dropbox, WhatsApp, Messenger etc.
Operating systemsWindows, macOS, Linux




parallax background
parallax background


Everything in our ecosystem will be transacted in $CDOG

Learn more about Token

parallax background


Everything in our ecosystem will be transacted in $CDOG

Learn more about Token



Capterra Shortlist for Encryption Jan-2023

parallax background



29 September 2023

Simplifying Email Encryption with Cypherdog’s MS Outlook Plugin for Windows

Email communication plays a pivotal role in both our personal and professional lives in this modern era of technology. With the increasing requirement to protect sensitive […]
22 September 2023

The Future of Mass Communication: Enhancing Security with Cypherdog

  In today’s digital age, the exchange of sensitive information is a common practice across various industries. Whether it’s the financial sector, healthcare, or government agencies, […]
15 September 2023

The Critical Importance of Secure Mass Information and File Transfer

In the present era of technology, the sharing of vast amounts of information and files is a regular part of both personal and business communication. Whether […]

1. What is the best about your file encryption software?

Our encryption software, Cypherdog Encryption, is based on asymmetric encryption without any “trusted” third party being involved and designed in a zero knowledge security model. This means that no one else has access to the decrypted data - only the sender and the recipient can see it.

2. Do you offer the best encryption algorithm in your encryption software?

In our encryption software, Cypherdog Encryption, we are using advanced encryption, such as asymmetric and symmetric algorithms, RSA3072 and AES-256.

3. How to encrypt email with your encryption app?

With our encryption app, Cypherdog Encryption, you can encrypt e-mail content in Outlook and Gmail with a single click, so you know how to encrypt Outlook and how to encrypt Gmail. For other e-mail clients, you should employ our “magic window” to encrypt data. To encrypt attachments, you can use our app from the sidebar or simply right click on the file.

4. Can I encrypt a file for free?

To encrypt sensitive files for free, you can use the Cypherdog Encryption Single User trial version, which will have all features, including file encryption, for 14 days. This way you can protect your personal files for free.

5. Do I need to worry about hackers decrypting my files?

With our top encryption software, you don’t need to worry about hackers decrypting your files and hackers decrypting your passwords. Hackers don’t have access to your private key. Your encryption key is securely stowed away on your device in encrypted form, protected by your password that you created. This encryption key is not transferred between users.

6. Are your security tools designed specifically for individuals and small businesses?

Cypherdog Encryption Single User is one of our popular security tools tailored for small companies or individuals, particularly those in the professional sector. This version comes with a single user license and installation is as straightforward as any antivirus software.

7. Why do I need to use encryption? Is data encryption necessary?

Encryption is a method of protecting sensitive data. Encryption software will automatically protect files and your sensitive data, and can enhance the security of communication between client apps and servers. In essence, when your data is encrypted, even if an unauthorized person or entity gains access to it, they will not be able to read it. So why do you need to use encryption? Is it necessary? It's necessary if you need to securely transmit your sensitive data. Cypherdog Encryption is more affordable than a cup of coffee and ensures comprehensive protection for all your data. Our software encryption grants you access to methods on how to encrypt Google Suite, how to encrypt Outlook, how to encrypt files on Google Drive, how to encrypt files on Dropbox, how to encrypt Wetransfer, and how to encrypt Slack.

8. What is RSA encryption?

Among many encryption solutions, RSA encryption (Rivest–Shamir–Adleman) stands out as an effective encryption program employed to guarantee secure data transmission. It provides a robust security level with a 2048-bit key length. The RSA encryption algorithm consists of three parts: key generation, encryption, and decryption. At the outset, two keys are generated - public and private. The public key is used to encrypt files, while the private key serves to decrypt them.

9. Do I use a private and public key in your security software?

Yes, our security software uses both a public and private key. Cypherdog Encryption is the best encryption software based on asymmetric encryption - a type of encryption that utilizes two distinct yet mathematically related keys to encrypt data and decrypt data. The public key encrypts data, while its corresponding private key decrypts it.

10. Do your encryption software solutions affect performance?

We are utilizing a dual algorithm approach with our encryption software solutions: symmetric and asymmetric. Asymmetric provides the highest level of security, while symmetric offers the speed. To put it another way, the timing of the encryption process is equivalent to that of WinZip.

11. Why are your encryption methods necessary to protect files saved on services?

Many of the services do not offer complete protection, since there is always a possibility of someone accessing our data by cracking the security. To avoid having your files stolen, it is recommended to utilize encryption techniques, such as Google Suite encryption, Google Drive encryption, Dropbox encryption, and Wetransfer encryption.

12. Do you offer the best encryption software for 2023 to protect my sensitive data?

Cypherdog Encryption is an exceptionally useful encryption tool because it is based on asymmetric encryption, the zero-knowledge security model, and eliminates the need for any third party interference, such as e-mail providers, us and any Certification Authority.

13. Do you support Outlook encryption?

Yes, our encryption software, Cypherdog Encryption, is compatible with Outlook used in conjunction with Microsoft Exchange or Microsoft 365. We have developed AddIns for both native and webclient platforms.

14. Do you support Gmail encryption?

Yes, our encryption software, Cypherdog Encryption, is compatible with Gmail through plugins for the most popular browsers: Microsoft Edge, Mozilla Firefox and Google Chrome.

15. Do you support Slack encryption?

Yes, our encryption software, Cypherdog Encryption, is compatible with ANY communication medium. To encrypt any text, you can use our “magic window” feature - which is included in tour encryption software.