The Most Powerful Data Encryption Software

Reproduction of Encryption Key from your memory when needed
Integration of data encryption technologies and Mnemonic Guard
image1 Install the software onto your external memory devices, and it will allow you to carry confidential information outside the office securely.

* Computers do not require the software or encryption keys
image2 You can make your own information safety box on the Hard Disk of your laptop.
image3 You can hand over data securely within a group of people who share an encryption key.
Back to Home
Need in the IT society
Security Level
Dynamic Encryption
Various Usages
How to Operate
Mnemonic Guard
Mnemonic Guard
Other Cryptomnemo Products
The software uses an encryption key that is created dynamically from unforgettable secret images.
When you finish the programme, the encryption key will be destroyed to root out decoding with a stolen encryption key.
Unless Mnemonic Verification is cleared successfully, no one can view the data without permission.
Among similar encryption products, this software provides the world's highest security
Need in the IT society
Many companies ban their employees from taking company data out of the office, despite a strong demand and necessity to do so.This is due to the risk of losing the device or having it stolen, leading to a leakage of confidential data. However, this just causes many users to secretly store data outside the office at their own risk when necessary.

Cryptomnemo provides the solution. Cryptomnemo is an integration of verification and encryption software. It does not store the encryption key within the memory device, within the computer or on the Internet, so it is not possible for a third person to unlawfully obtain the encryption key and view the data.

Security Level
No matter how robust encryption software products are, they have a weakness that the operational strength can not be stronger than the strength of the verification process that comes before the encryption/decode. If the software uses a password of the level of several bits, the overall security is also at a several bits level. Another weak point is the management of the encryption key, as storing the encryption key on a device does not protect against the theft of the device, and hence the encryption key also.

Cryptomnemo has resolved these two problems at once. It will dynamically create an encryption key from pass symbols, when Mnemonic Guard verifies the user, and destroy it when the program finishes. This can easily provide users with a security level of many tens of bits. This means that an encryption key only exists while the programme is operating and it disappears once the programme is finished, so there is no possibility of it being stolen.

Dynamic Encryption Key Creation Method
Cryptomnemo creates an encryption key from memory information (a unique value created from pass symbol information) and recorded information (unique random numbers). However, there is a small possibility of the recorded information being revealed by reverse engineering no matter how strongly we try to keep it secret When your recoded information is stolen, only your memory information can protect the encrypted data.

An encryption key requires more than 80bits (one trillion times a trillion). If an encryption key is dynamically created using memory information of an 80bit level, there is still a security of 80bits even if the recorded information is stolen. If you want to have high security by using a password, it gets too long to remember and you end up writing it down. However, shorter passwords that do not require writing down do not provide a high security. In the case of biometric information, it is impossible to completely reproduce a sufficient amount of data, and an amount of data that is reproducible is not unique enough. High security of more than 80bits created from input data other than recorded information is only possible to realise with Cryptomnemo.

Users can specify the verification screen size, registered number and method to their own choice. It is recommended, however, for information that is highly confidential and therefore can cause serious damage in case of leakage, that you use the 8x8 screen and register more than 14 images that 'you can recognise and feel strongly about.' These should be mixed with other similar images that are not emotional and do not mean anything to you. The strength of permutation of selecting 14 out of 64 is more than 80bits. So, even in the worst case scenario where all confidential information stored within a stolen device is at someone else's hand, the important encrypted data is still protected with a security level of 80bits.

The memory of images that are special to you is the most appropriate material for the creation of an encryption key, as the strongest anti-tamper device is the brain of a human. Memory (=human brain's activity) and encryption technology (=one of the best outputs of human brain's activity) are integrated by Cryptomnemo.

Reproduction of High-bit Security image4
Selecting about 14 images connected with pleasant feelings from your long-term memory, out of a total of 64 images, provides a high level of security of around 80 bits. Even a friend or colleague who knows you very well cannot select all 14 images without a mistake. However you only need to look for memorable and pleasant images. It may take a little effort, but there is no stress and you can even enjoy selecting whilst realising a high-bit security rating.

Protecting data securely with easy operation. Cryptomnemo is data encryption software that creates and reproduces an encryption key by Mnemonic
Various Usage

1 Install the software to external memory device to carry confidential data outside the office securely
This is a typical use. This software can be used with any memory device if it is used with a Windows2000/XP computer and it has more than 16MB capacity. You can carry not only encryption data, but also verification software and encryption software (without an encryption key). Therefore a computer at the destination does not have to have any special software. As long as there is a Windows2000/XP computer with a memory device installed with Cryptomnemo, a legitimate user who can clear Mnemonic Verification, can decode the encryption data and work on it.

Note: If you don't store the operational manual in a device, requiredcapacity for the software is 8MB.
Note: If the software is installed in the write protected UD-ROM area of the USB memory 'UD-RW' made by Hagiwara Sys- com, the software will automatically start when UD-RW is inserted.

2 Making an information safety box on the Hard Disk of a laptop computer
By storing this software in an exclusive folder, you can use the folder as a secure information safety box just for yourself. It is a good idea to make a shortcut to the software on the desktop for this usage.

Note: If you want to make an information safety box on your internal memory, please make sure to delete the unencrypted files from the bin, rather than just placing them in the bin.

3 Handing over the data securely within a group of people who share an encryption key
Cryptomnemo will allow you to securely hand over important encrypted data within a group of people if you distribute copies of your Cryptomnemo software to them after inputting your licence number and then let them know your initial pass symbols. After distributing copied software, all members can change the initial pass symbols to their original verification screen/pass symbols.
The encrypted data can be sent attached to an e-mail.

Note: The software copied after imputing the licence number will use the same encryption key to encode/decode. Therefore, once you have used this software to share information within a group, you will not be able to protect your own confidential data using the software. You will need to buy another Cryptomnemo to protect your confidential information.

Note: Only the licensee will be covered by our support.


How to Operate

Click CryptoMnemo icon, you will see Encrypt/Decrypt Setting screen, where you can make your own settings.

2 When the CryptoMnemo icon is clicked, you will also see a shortcut icon produced on Desk Top. 
Drag and drop the file or folder to encrypt or decrypt onto the CryptoMnemo shortcut icon or select CryptoMnemo from the Send-To menu in the right click options and go through the verification.  The plain data will be encrypted or decrypted immediately thereafter. 


The encryption key generated from the verification data (= from your memory) and used for the encrypt/decrypt operations will be destroyed immediately when the encrypt/decrypt operations are over. 

3 The encrypted data will be stored in the folder specified in the Encryption/Decryption setting screen. (By default, the file is saved to the same folder as the original file.) The Encryption/Decryption setting screen can be opened by clicking on the CryptoMnemo icon.


If List View checkbox had been checked, a list of files to be encrypted/decrypted will open when you drag and drop a file or folder to the icon or select Send To − CryptoMnemo from the right-click menu. You can add more files and folders by dragging and dropping them into this screen. After confirming the files to be processed, click on Start button to perform encrypt/decrypt operations via verification.


When you try to process plain data and encrypted data at the same time, CryptoMnemo displays Process Selection window. Select the process you want, and the verification screen appears. After the verification has been completed, CryptoMnemo executes the selected process.


If you selected encrypted files for encryption or plain data for decryption, CryptoMnemo shows a list of unprocessed files after the process has been completed so that you will have a glance at what files have not been processed.


Mnemonic Security Limited
Risona Umeda Building 7F Kita-Ku Sonezaki 2-Chome 16-19
Osaka 530-0057 Japan
Tel : +81-(0)6-6361-5311 Fax: +81-(0)6-6315-5271