BestCrypt

BestCrypt

Infobox Software
name = BestCrypt



caption =
author =
developer = Jetico, Inc.
released =
latest release version = 8.05.3
latest release date = 2008-07-22
latest preview version =
latest preview date =
operating system = Windows Vista, Windows XP, Windows 9x, Windows NT, Linux 2.4+, MS-DOS
platform =
language =
genre = Disk encryption software
license =
website = [http://www.jetico.com/bcrypt8.htm www.jetico.com]

BestCrypt is a commercial disk encryption software produced by Jetico for Windows and Linux. BestCrypt is among the most popular commercial disk encryption solutions available.Fact|date=February 2007 Dating back to 1993, it is also one of the oldest.cite web |publisher=Jetico |title=Jetico Company Info |url=http://www.jetico.com/company.htm |accessdate=2007-01-05 ]

The BestCrypt Linux version, including the free 30-day trial, comes with full source code, although not licensed under an open source license. The source code of security-related parts of the Windows version is also available with the BestCrypt software development kit, though this does not include "all" of the Windows source code, and was done in order to give third parties a chance to review the code for security.

BestCrypt versions prior to 7.10 (or version 1.3 for Linux) suffered from a watermarking attack vulnerability defeating the deniable encryption features of the product. Within two weeks of the initial disclosure of the flaw on 2003-10-23, Jetico released fixed versions of BestCrypt addressing this issue.cite paper
author = Chiriliuc, Adal
title = BestCrypt IV generation flaw
date = 2003-10-23
url = http://adal.chiriliuc.com/bc_iv_flaw.php
accessdate = 2006-11-03
]

The version for MS-DOS is freeware.

Features

Notable features of BestCrypt include:
* Whole-disk encryption (including the boot partition of Windows).
* A wide choice of encryption algorithms, including AES, Blowfish, Twofish, GOST, IDEA, CAST-128, Triple DES and DES. Support for new algorithms can be added by third parties by writing a plugin.
* Deniable encryption through the use of hidden containers within existing encrypted partitions, analogous to TrueCrypt. Hidden containers are virtually unlimited in size and work with all supported file systems.
* Swap space encryption.
* Interoperability between different operating systems. Runs under Linux 2.4 and 2.6, the Windows NT family, as well as older Windows 9x and MS-DOS.

ee also

* Full disk encryption
* Disk encryption software
* Comparison of disk encryption software
*OTFE

External links

* [http://www.jetico.com/ Jetico homepage]
* [http://www.jetico.com/bcrypt8.htm BestCrypt 8 for Windows home page]
* [http://www.jetico.com/linux.htm BestCrypt Linux home page]

References


* cite journal
last = Bauer
first = Mick
authorlink =
title = BestCrypt: Cross-Platform Filesystem Encryption
journal = Linux Journal
volume = 2002
issue = 98
pages = page 9
publisher = Specialized Systems Consultants
date = 2002-06-01
url = http://www.linuxjournal.com/article/5938
id = ISSN 1075-3583
accessdate = 2006-11-03

* cite web
title = Bestcrypt for Linux documentation
publisher = Jetico
date = 2005-05-17
url = http://www.jetico.com/linux/bcrypt-help/index.htm
accessdate = 2006-11-03


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • BestCrypt — Тип Шифрование дисков Разработчик Jetico, Inc. Операционная система Microsoft Windows 4.x, Windows NT, Linux 2.4+, MS DOS Последняя версия 8.23.8 (10 апреля 2012) …   Википедия

  • BestCrypt — Betriebssystem Microsoft Windows und Linux Kategorie Datenträgerverschlüsselung Lizenz kommerzielle Deutschsprachig Nein …   Deutsch Wikipedia

  • Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering …   Wikipedia

  • Deniable encryption — In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny that the data is encrypted, or that they are able to decrypt it[citation needed]. Such convincing denials may or may not be genuine.… …   Wikipedia

  • Отрицаемое шифрование — (англ. deniable encription, также двусмысленное шифрование )  способ компоновки зашифрованной информации, который обеспечивает возможность правдоподобного отрицания её наличия. Содержание 1 Принцип 2 Сфера применения …   Википедия

  • Disk encryption theory — Disk encryption is a special case of data at rest protection when the storage media is a sector addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For discussion of different software packages and… …   Wikipedia

  • Watermarking attack — In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data (e.g., a decoy file) can be detected by an attacker without knowing the encryption key.Problem descriptionDisk… …   Wikipedia

  • CBC (cryptographie) — Mode d opération (cryptographie) En cryptographie, un mode d opération est la manière de traiter les blocs de texte clairs et chiffrés au sein d un algorithme de chiffrement par bloc. Chacun des modes possède ses propres atouts. Plusieurs modes… …   Wikipédia en Français

  • Chiffrement à rétroaction de sortie — Mode d opération (cryptographie) En cryptographie, un mode d opération est la manière de traiter les blocs de texte clairs et chiffrés au sein d un algorithme de chiffrement par bloc. Chacun des modes possède ses propres atouts. Plusieurs modes… …   Wikipédia en Français

  • Cipher Block Chaining — Mode d opération (cryptographie) En cryptographie, un mode d opération est la manière de traiter les blocs de texte clairs et chiffrés au sein d un algorithme de chiffrement par bloc. Chacun des modes possède ses propres atouts. Plusieurs modes… …   Wikipédia en Français

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”