What is Yull?

Yull is a new encryption program which runs on Windows, with features not found elsewhere.

Here is a quick intro to YULL. You can go to the Try It Out page and download the self-extracting zip file for Yull.Exe and YullG.exe.
Check out the Guide and White Papers for details on how YULL operates.

Drag and Drop

All of Yull's file entry boxes support drag and drop.


Use Any File as a Key

Restricted only to file size being between 100 and 10,000 bytes. Even use text files; files of all one value, system files like DLLs. With Yull it doesn't matter.


The Key Is Not The Key

The name of your key does not have to be stored anywhere. Yull can ask you for it at runtime. But even if the key is stolen, it is useless without your options. Those options can be stored in an encrypted options file but critical ones do not have to be stored anywhere. Yull will ask you for them at runtime. Yull encrypts your key before using it, using a SHA512 hash.


Shred Original Files

Set the Shred Option and as soon as your files are encrypted they are shredded. The files are overwritten many times by much larger, random data. Then they are truncated; then they are deleted.

Note:While this method will delete files, it is not 100% secure since it relies on the file system and does not directly interact with the hardware. There are various file shredding applications available. See DigitalCitizen File Shredder Reviews and PCSupport Reviews for more information about this. There are many detailed discussions concerning issues of securely deleting files, including data held in the shadow copy.

For ordinary uses, the Shred option is great, but it is not secure. It is not clear if any shred procedure apart from physical destructions of the disk is totally secure.


Many Options - But Easy to Use

Once the options are set up (which is easy to do), encryption and decryption is just two clicks away

Your options file can be encrypted and that key is never stored.


Encrypt Entire Folders With Two Clicks

Encrypt files using wildcards or simply folder names.


Many Levels of Encryption

Yull has six encryption levels. At the Max level some files can go through billions of encryptions. At the Plank (lowest) level, files go through 100,000s to over a million encryptions.

No one but you knows how deeply encrypted your files are. A plank-encrypted file looks like a max-encrypted file.

Plank is very fast; Max slow. But if your data is extremely critical, Max is the way to go.


Yull Runs From Anywhere

It runs from your hard drive; from a USB drive or an external drive or flash drive.


Speaking of Speed

Yull does a LOT of work. It works at about 1.3 million encrypts per second. That's plenty fast for most people but for some where time is critical, you might want to lower some of the options, the rounds, say to between 1 and 10, and the read buffer size as low as possible. Both of these are critical regarding the number of encrypts because some of Yull's encryption routines call others, which can call others, etc. On the other end, MAX can be VERY SLOW. But then again, it's much faster than taking a few years' remedial action when your data is stolen. And, there is nothing in the output file to indicate how many enrypts it has gone through.


Yull's Options Control Everything

Yull's option file is a text file. You can name it whatever you want. You can encrypt it. You can have comment lines or other text in it. Yull ignores it all except valid options.


Yull Can be Run as a Job or from a Batch File

You get two versions of Yull: Yull.exe and YullG.exe. Files encrypted with one can be decrypted with the other, and visa versa.

Yull.exe is a Console app. It runs in PowerShell or a DOS Console command shell.


No Installation

Yull does not require installation. You can copy the Yull executables anywhere you want. Yull makes NO CONNECTION TO THE INTERNET unless you click on the Help | Guide to Yull (online).

Yull does not modify your computer in any way.


Yull's Routines Are Not Government Approved

This can be a good or bad thing, depending on your view of the Government. Yull's encryption routines were written by me from the ground up using principles (I believe) no one else uses.

I welcome the scrutiny of academic cryptographers or anyone who knows this field.

See the The White Paper for a detailed discussion of how Yull works.