Comparison of disk encryption software


Comparison of disk encryption software

This is a technical feature comparison of different disk encryption software.

Contents

Background information

Name Developer First released Licensing Maintained?
ArchiCrypt Live Softwaredevelopment Remus ArchiCrypt 1998 Proprietary Yes
BestCrypt Jetico 1993[1] Proprietary Yes
BitArmor DataControl BitArmor Systems Inc. 2008-05 Proprietary Yes
BitLocker Drive Encryption Microsoft 2006 Proprietary Yes
Bloombase Keyparc Bloombase 2007 Proprietary Yes
CGD Roland C. Dowdeswell 2002-10-04[2] BSD Yes
CenterTools DriveLock CenterTools 2008 Proprietary Yes
Check Point Full Disk Encryption Check Point Software Technologies Ltd 1999[3][4][5] Proprietary Yes
CrossCrypt Steven Scherrer 2004-02-10[6] GPL No
Cryptainer Cypherix (Secure-Soft India) ? Proprietary Yes
CryptArchiver WinEncrypt ? Proprietary Yes
cryptoloop ? 2003-07-02[7] GPL No
cryptoMill SEAhawk Proprietary Yes
Discryptor Cosect Ltd. 2008 Proprietary Yes
DiskCryptor ntldr 2007 GPL Yes
DISK Protect Becrypt Ltd 2001 Proprietary Yes
dm-crypt/cryptsetup Christophe Saout 2004-03-11[8] GPL Yes
dm-crypt/LUKS Clemens Fruhwirth (LUKS) 2005-02-05[9] GPL Yes
DriveCrypt SecurStar GmbH 2001 Proprietary Yes
DriveSentry GoAnywhere 2 DriveSentry 2008 Proprietary Yes
E4M Paul Le Roux 1998-12-18[10] Open source No
e-Capsule Private Safe EISST Ltd. 2005 Proprietary Yes
eCryptfs Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) 2005[11] GPL Yes
FileVault Apple Inc. 2003-10-24 Proprietary Yes
FinallySecure Enterprise (SECUDE) SECUDE 2006 Proprietary Yes
FREE CompuSec CE-Infosys 2002 Proprietary Yes
FreeOTFE Sarah Dean 2004-10-10[12] Open source Yes
GBDE Poul-Henning Kamp 2002-10-19[13] BSD Yes
GELI Pawel Jakub Dawidek 2005-04-11[14] BSD Yes
KryptOS The MorphOS Development Team 2010 Proprietary Yes
loop-AES Jari Ruusu 2001-04-11 GPL Yes
n-Crypt Pro n-Trance Security Ltd 2005 Proprietary Yes
PGPDisk PGP Corporation 1998-09-01[15] Proprietary Yes
Private Disk Dekart 1993[16] Proprietary Yes
R-Crypto R-Tools Technology Inc 2008 Proprietary Yes
McAfee Endpoint Encryption (SafeBoot) McAfee, Inc. 2007[17] Proprietary Yes
SafeGuard Easy Sophos (Utimaco) 1993[18] Proprietary Yes
SafeGuard Enterprise Sophos (Utimaco) 2007[19] Proprietary Yes
SafeGuard PrivateDisk
Sophos (Utimaco)[20] 2000 Proprietary Yes
SafeHouse Professional PC Dynamics, Inc. 1992 Proprietary Yes
Scramdisk Shaun Hollingworth 1997-07-01 Open source No
Scramdisk 4 Linux Hans-Ulrich Juettner 2005-08-06[21] GPL Yes
SecuBox Aiko Solutions 2007-02-19 Proprietary Yes
SECUDE Secure Notebook SECUDE 2003 Proprietary Yes
SecureDoc WinMagic Inc. 1997 Proprietary Yes
Sentry 2020 SoftWinter 1998[22] Proprietary Yes
softraid / RAID C OpenBSD 2007-11-01[23] BSD Yes
SpyProof! Information Security Corp. 2002 Proprietary Yes
svnd / vnconfig OpenBSD 2000-12-01[24] BSD Yes
Symantec Endpoint Encryption Symantec Corporation 2008 Proprietary Yes
TrueCrypt TrueCrypt Foundation 2004-02-02[25] TrueCrypt Collective License Yes
Aloaha Secure Stick Aloaha 2008 Proprietary Yes
Name Developer First released Licensing Maintained?

Operating systems

Name Windows NT-based Pre-Windows NT Windows Mobile/Pocket PC FreeBSD Linux Mac OS X NetBSD OpenBSD DragonFly BSD
ArchiCrypt Live Yes No No No No No No No No
BestCrypt Yes Yes No No Yes Yes No No No
BitArmor DataControl Yes No No No No No No No No
BitLocker Drive Encryption Yes No No No No No No No No
Bloombase Keyparc Yes Yes No No Yes Yes No No No
CenterTools DriveLock Yes No No No No No No No No
CGD No No No No No No Yes No No
Check Point Full Disk Encryption Yes No Yes No Yes Yes No No No
CrossCrypt Yes No No No No No No No No
Cryptainer Yes No Yes[26] No No No No No No
CryptArchiver Yes No No No No No No No No
cryptoloop Yes[27] No No No Yes No No No No
Discryptor Yes No No No No No No No No
DiskCryptor Yes No No No No No No No No
DISK Protect Yes No No No No No No No No
dm-crypt/cryptsetup Yes[27] No No No Yes No No No Yes
dm-crypt/LUKS Yes[27] No Yes[28] No Yes No No No Yes
DriveCrypt Yes No No No No No No No No
DriveSentry GoAnywhere 2 Yes No No No No No No No No
E4M Yes Yes No No No No No No No
e-Capsule Private Safe Yes No No No No No No No No
eCryptfs No No No No Yes No No No No
FileVault No No No No No Yes No No No
FREE CompuSec Yes No No No Yes No No No No
FreeOTFE Yes No Yes No Partial[29] No No No No
GBDE No No No Yes No No No No No
GELI No No No Yes No No No No No
loop-AES No No No No Yes No No No No
n-Crypt Pro Yes No No No No No No No No
PGPDisk Yes No No No No Yes No No No
PGP Whole Disk Encryption Yes No No No Yes Yes No No No
Private Disk Yes Yes No No No No No No No
R-Crypto Yes No No No No No No No No
McAfee Endpoint Encryption (SafeBoot) Yes No Yes[30] No No Yes No No No
SafeGuard Easy Yes No No No No No No No No
SafeGuard Enterprise Yes No No No No Yes No No No
SafeGuard PrivateDisk Yes No No No No No No No No
SafeHouse Professional Yes Yes No No No No No No No
Scramdisk Yes Yes No No Yes No No No No
Scramdisk 4 Linux No No No No Yes No No No No
SecuBox No No Yes No No No No No No
FinallySecure Enterprise (SECUDE) Yes No No No No No No No No
SecureDoc Yes No No No Yes Yes No No No
Sentry 2020 Yes No No No No No No No No
softraid / RAID C No No No No No No No Yes No
SpyProof! Yes No No No No No No No No
svnd / vnconfig No No No No No No No Yes No
Symantec Endpoint Encryption Yes No No No No Yes No No No
TrueCrypt Yes No No No[31] Yes Yes No No No
Aloaha Secure Stick Yes No No No No No No No No
Name Windows NT-based Pre-Windows NT Windows Mobile/Pocket PC FreeBSD Linux Mac OS X NetBSD OpenBSD DragonFly BSD

Features

  • Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)[32] can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others.
  • Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
  • Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.[clarification needed]
  • Multiple keys: Whether an encrypted volume can have more than one active key.
  • Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.
  • Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.
  • Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.
  • Filesystems: what filesystems are supported.
  • Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11)
Name Hidden containers Pre-boot authentication Custom authentication Multiple keys Passphrase strengthening Hardware acceleration TPM Filesystems Two-factor authentication
ArchiCrypt Live Yes[33] No No Yes[34][33] No No No ? Yes[35][33]
BestCrypt Yes Yes No Yes[36] Yes No No Any supported by OS Yes[37]
BitArmor DataControl No Yes No Yes Yes No No NTFS, FAT32 on non-system volumes No
BitLocker Drive Encryption No Yes[38] Yes[39] Yes[40] Yes[41] Yes Yes[40] Chiefly NTFS [Note 1] Yes [Note 2]
Bloombase Keyparc No No Yes Yes Yes Yes No ? ?
CGD No No Yes[42] Yes[43] Yes[42] No No Any supported by OS Yes[42]
CenterTools DriveLock No Yes No No Yes No No Any supported by OS Yes
Check Point Full Disk Encryption ? Yes Yes Yes Yes ? ? ? Yes
CrossCrypt No No No No No No No ? No
CryptArchiver No No No No ? No No ? ?
cryptoloop No Yes[44] Yes No No Yes[citation needed] No Any supported by OS ?
DiskCryptor No Yes Yes No Yes Yes[45] No Any supported by OS Yes[45]
DISK Protect ? Yes[46] ? Yes[46] ? ? No ? ?
dm-crypt/cryptsetup No Yes[44] Yes No No Yes No Any supported by OS No
dm-crypt/LUKS No Yes[44] Yes Yes Yes Yes No Any supported by OS Yes
DriveCrypt Yes[47] Yes No Yes Yes No No ? Yes
DriveSentry GoAnywhere 2 No No Yes No Yes No ? Any supported by OS Yes
E4M No No No No ? No No ? No
e-Capsule Private Safe Yes[48] No No Yes[48] No Yes No ? ?
eCryptfs No No Yes Yes Yes Yes Yes Yes[49] Yes
FileVault No No No Two passwords[50] Yes[50] No No ? ?
FREE CompuSec No Yes No No No No No Any supported by OS No
FreeOTFE Yes No Yes[51] Yes[52] Yes No No Any supported by OS Yes
GBDE No No[53] Yes Yes[54] No[54] No[53] No Any supported by OS Yes
GELI No Yes[53] Yes Yes[55] Yes[55] Yes[53] No Any supported by OS Yes
GuardianEdge Hard Disk Encryption No Yes Yes Yes Yes No No NTFS, FAT32 Yes
loop-AES No Yes[56] Yes[56] Yes[56] Yes[56] Yes[56] No Any supported by OS Yes[57]
n-Crypt Pro No No No No N/A[58] No No ? ?
PGPDisk No Yes[59] ? Yes Yes[60] ? Yes ? Yes
Private Disk No No No Yes Yes No No Any supported by OS Yes
R-Crypto ? No ? ? ? ? ? Any supported by OS ?
McAfee Endpoint Encryption (SafeBoot) Yes Yes Yes Yes Yes Yes[61] Yes Any supported by OS Yes
SafeGuard Easy No Yes No Yes Yes No Yes[62] Any supported by OS Yes
SafeGuard Enterprise No Yes No Yes Yes No Yes[62] Any supported by OS Yes
SafeGuard PrivateDisk No N/A No Yes Yes No Yes[63] Any supported by OS Yes
SafeHouse Professional No No Yes Yes Yes No No Any supported by OS Yes
Scramdisk Yes No No No No No No ? Last update to web site 2009-07-02
Scramdisk 4 Linux Yes[64] No No No Yes[64] No No ext2, ext3, reiserfs, minix, ntfs, vfat/msdos No
SecuBox No No No No Yes No No ? No
FinallySecure Enterprise (SECUDE) No Yes Yes No Yes No Yes ? Yes
SecureDoc No Yes[65] Yes Yes Yes Yes Yes ? Yes
Sentry 2020 No No No No No No No ? No
softraid / RAID C No No ? ? ? Yes ? Any supported by OS ?
svnd / vnconfig No No No No Yes[66] Yes ? Any supported by OS ?
Symantec Endpoint Encryption No Yes Yes Yes Yes No No NTFS, FAT32 Yes
TrueCrypt Yes
(limited to one per
"outer" container)
only on Windows[67] No No[68] Yes Yes No Any supported by OS Yes
Aloaha Secure Stick Yes No Yes Yes No No No NTFS, FAT32 Yes
Name Hidden containers Pre-boot authentication Custom authentication Multiple keys Passphrase strengthening Hardware acceleration TPM Filesystems Two-factor authentication
  1. ^ Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes
  2. ^ BitLocker can be used with a TPM PIN + external USB key for two-factor authentication

Layering

  • Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to "pre-boot authentication" in the features comparison table.
  • Partition: Whether individual disk partitions can be encrypted.
  • File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
  • Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.
  • Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
Name Whole disk Partition File Swap space Hibernation file
ArchiCrypt Live Yes
(except for the boot volume)
Yes Yes No No
BestCrypt Yes Yes Yes Yes Yes[71]
BitArmor DataControl No Yes No Yes Yes
BitLocker Drive Encryption Yes
(except for the boot volume)
Yes No Yes
(parent volume is encrypted)
Yes
(parent volume is encrypted)
Bloombase Keyparc Yes Yes Yes Yes No
CenterTools DriveLock Yes Yes Yes Yes Yes
CGD Yes Yes Yes[42] Yes No
Check Point Full Disk Encryption Yes Yes ? Yes Yes
CrossCrypt No No Yes No No
CryptArchiver No No Yes No No
cryptoloop Yes Yes Yes Yes No
DiskCryptor Yes Yes No Yes Yes
dm-crypt Yes Yes Yes[72] Yes Yes[73]
DriveCrypt Yes Yes[47] Yes[47] No No
DriveSentry GoAnywhere 2 No Yes Yes No No
E4M No Yes Yes No No
e-Capsule Private Safe No No Yes[74] No No
eCryptfs No No Yes No No
FileVault No No Yes[50] Yes[50] Yes[75]
FREE CompuSec Yes No Yes Yes Yes
FreeOTFE Yes
(except for the boot volume)
Yes Yes No No
GBDE Yes Yes Yes[76] Yes No
GELI Yes Yes Yes[76] Yes No
GuardianEdge Hard Disk Encryption Yes Yes Yes Yes Yes
loop-AES Yes Yes[56] Yes[56] Yes[56] Yes[56]
n-Crypt Pro Yes Yes Yes No No
PGPDisk Yes Yes Yes Yes only on Windows
Private Disk No No Yes No No
R-Crypto No No Yes No No
McAfee Endpoint Encryption (SafeBoot) Yes Yes Yes Yes Yes[77]
SafeGuard Easy Yes Yes extra module Yes Each sector on disk is encrypted
SafeGuard Enterprise Yes Yes Yes Yes Each sector on disk is encrypted
SafeGuard PrivateDisk No No Yes No No
SafeHouse Professional No No Yes No No
Scramdisk No Yes Yes No No
Scramdisk 4 Linux Yes Yes Yes Yes No
SecuBox No No Yes N/A No
FinallySecure Enterprise (SECUDE) Yes Yes Yes Yes Yes
SecureDoc Yes[65] Yes Yes Yes Yes
Sentry 2020 No No Yes No No
softraid / RAID C Yes Yes No Yes (encrypted by default in OpenBSD)[78] No
svnd / vnconfig ? Yes Yes Yes (encrypted by default in OpenBSD) ?
SpyProof! No Yes Yes No No
Symantec Endpoint Encryption Yes Yes Yes Yes Yes
TrueCrypt Yes Yes Yes Yes only on Windows[67]
Aloaha Secure Stick No No Yes No No
Cryptomill Yes N/A Yes N/A N/A
Name Whole disk Partition File Swap space Hibernation file

Modes of operation

Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.

  • CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
  • CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
  • CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
  • LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[79]
  • XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
Name CBC w/ predictable IVs CBC w/ secret IVs CBC w/ random per-sector keys LRW XTS
ArchiCrypt Live No No No Legacy support [80] Yes
BestCrypt No No No Yes[81] Yes[82]
BitArmor DataControl No Yes Plumb-IV No No
BitLocker Drive Encryption No[83] Yes[83] No No No
Bloombase Keyparc ? Yes ? ? ?
CGD No Yes[84] No No No
CenterTools DriveLock ? ? ? ? ?
Check Point Full Disk Encryption ? ? ? ? ?
CrossCrypt Yes No No No No
CryptArchiver ? ? ? ? ?
cryptoloop Yes No No No No
DiskCryptor No No No No Yes
dm-crypt Yes Yes No Yes, using *-lrw-benbi[85] Yes, using *-xts-plain
DriveCrypt ? ? ? ? ?
DriveSentry GoAnywhere 2 ? ? ? ? ?
E4M ? ? ? No No
e-Capsule Private Safe ? ? ? ? ?
eCryptfs No Yes ? No No
FileVault Yes[50] No No No No
FREE CompuSec Yes No No No No
FreeOTFE Yes Yes No Yes Yes
GBDE No No Yes[54] No No
GELI No Yes[86] No No Yes
GuardianEdge Hard Disk Encryption No No Yes No No
loop-AES single-key, multi-key-v2 modes[56] multi-key-v3 mode[56] No No No
n-Crypt Pro ? ? No No No
PGPDisk ? ? ? ? ?
Private Disk Yes No Yes[citation needed] No No
R-Crypto ? ? ? ? ?
McAfee Endpoint Encryption (SafeBoot) No Yes No No No
SafeGuard Easy ? ? ? ? ?
SafeGuard Enterprise ? ? ? ? ?
SafeGuard PrivateDisk ? ? ? ? ?
SafeHouse Professional Yes No No No No
Scramdisk No Yes No No No
Scramdisk 4 Linux No Yes[87] No Yes[88] Yes[89]
SecuBox Yes No No No No
FinallySecure Enterprise (SECUDE) ? ? ? ? ?
SecureDoc ? ? ? ? ?
Sentry 2020 ? ? ? ? ?
softraid / RAID C ? ? ? ? Yes [90]
svnd / vnconfig ? ? ? ? ?
Symantec Endpoint Encryption No No Yes No No
TrueCrypt Legacy support [91] No No Legacy support [92] Yes [93]
Aloaha Secure Stick No No No Yes Yes
Name CBC w/ predictable IVs CBC w/ secret IVs CBC w/ random per-sector keys LRW XTS

See also

Notes and references

  1. ^ "Jetico Company Info". Jetico. http://www.jetico.com/company.htm. Retrieved 2007-01-05. 
  2. ^ Roland Dowdeswell (2002-10-04). "CryptoGraphic Disk". mailing list announcement. http://mail-index.netbsd.org/current-users/2002/10/04/0008.html. Retrieved 2007-01-14. 
  3. ^ Original release as Protect Data Security Inc.'s "Protect!style="background: #ececec; color: black; font-weight: bold; vertical-align: middle; text-align: left; " class="table-rh"|""Protect guards laptop and desktop data". http://www.infoworld.com/cgi-bin/displayArchive.pl?/99/25/c05-25.48.htm. Retrieved 2008-09-03. [dead link]
  4. ^ Company and product name change to Pointsec "Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc.". Archived from the original on 2004-08-20. http://web.archive.org/web/20040820174918/www.pointsec.com/news/news.asp?newsid=85. Retrieved 2008-09-03. 
  5. ^ "Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent". http://www.checkpoint.com/press/2007/protectdataacquisition011107.html. Retrieved 2008-09-03. 
  6. ^ Sarah Dean (2004-02-10). "OTFEDB entry". http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46. Retrieved 2008-08-10. 
  7. ^ Initial cryptoloop patches for the Linux 2.5 development kernel: http://uwsg.iu.edu/hypermail/linux/kernel/0307.0/0348.html
  8. ^ dm-crypt was first included in Linux kernel version 2.6.4: http://lwn.net/Articles/75404/
  9. ^ Clemens Fruhwirth. "LUKS version history". http://luks.endorphin.org/dm-crypt. Retrieved 2006-12-24. 
  10. ^ "archived E4M documentation". Archived from the original on 2000-05-24. http://web.archive.org/web/20000524061402/www.e4m.net/news.html. ).
  11. ^ "eCryptfs". http://ecryptfs.sourceforge.net. Retrieved 2008-04-29. 
  12. ^ "FreeOTFE version history". Archived from the original on 2006-12-07. http://web.archive.org/web/20061207224351/http://www.freeotfe.org/docs/version_history.htm#version_history. Retrieved 2006-12-24. 
  13. ^ "gbde(4) man page in FreeBSD 4.11". GBDE manual page as it appeared in FreeBSD 4.11. http://www.freebsd.org/cgi/man.cgi?query=gbde&apropos=0&sektion=4&manpath=FreeBSD+5.0-RELEASE&format=html. Retrieved 2006-12-24. 
  14. ^ "geli(8) man page in FreeBSD 6.0". GELI manual page as it first appeared in FreeBSD 6.0. http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+6.0-RELEASE&format=html. Retrieved 2006-12-24. 
  15. ^ "PGP 6.0 Freeware released- any int'l links?". comp.security.pgp. (Web link). Retrieved 2007-01-04. 
  16. ^ "Dekart Encryption software timeline". Dekart. http://www.lazybit.com/index.php/a/2007/04/19/dekart_private_disk_timeline. 
  17. ^ "McAfee Endpoint Encryption". product description. McAfee. http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html. Retrieved 2009-03-04. 
  18. ^ "SafeGuard Easy 4.5 Technical Whitepaper". Utimaco. http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-easy-dsus.pdf. Retrieved 2009-08-10. 
  19. ^ "SafeGuard Enterprise Technical Whitepaper". Utimaco. http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-enterprise-dsus.pdf. Retrieved 2009-08-10. 
  20. ^ Rebranded as ThinkVantage Client Security "ThinkVantage Technologies Deployment Guide". Lenovo. ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf. Retrieved 2008-03-05. 
  21. ^ "ScramDisk 4 Linux Releases". http://sourceforge.net/project/showfiles.php?group_id=101952&package_id=109447. 
  22. ^ "Sentry 2020 news". http://www.softwinter.com/. Retrieved 2007-01-02. 
  23. ^ OpenBSD 4.2 change notes
  24. ^ OpenBSD 2.8 change notes
  25. ^ TrueCrypt version history
  26. ^ [1] PocketPC freeware release- SmartPhone beta available
  27. ^ a b c [2] FreeOTFE supports cryptoloop, dm-crypt/cryptsetup, and dm-crypt/LUKS volumes
  28. ^ [3] FreeOTFE4PDA supports dm-crypt/LUKS volumes
  29. ^ [4] Supports Linux volumes
  30. ^ "Endpoint Encryption Datasheet". McAfee. http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html. Retrieved 2010-06-14. 
  31. ^ [5] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used
  32. ^ [6] Hidden containers description from Jetico (BestCrypt)
  33. ^ a b c Secret-containers and Camouflage files ArchiCrypt Live Description
  34. ^ Supports "Guest" keys
  35. ^ Using "Archicrypt Card"
  36. ^ Supported by the BestCrypt container format; see BestCrypt SDK
  37. ^ Supported by the BestCrypt Volume Encryption software
  38. ^ With PIN or USB key)
  39. ^ BitLocker Drive Encryption: Value Add Extensibility Options
  40. ^ a b "BitLocker Drive Encryption Technical Overview". Microsoft. http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true. Retrieved 2008-03-13. 
  41. ^ Recovery keys only.
  42. ^ a b c d Roland C. Dowdeswell, John Ioannidis. "The CryptoGraphic Disk Driver" (PDF). CGD design paper. http://www.imrryr.org/~elric/cgd/cgd.pdf. Retrieved 2006-12-24. 
  43. ^ Federico Biancuzzi (2005-12-21). "Inside NetBSD's CGD". interview with Roland Dowdeswell. ONLamp.com. http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1. Retrieved 2006-12-24. 
  44. ^ a b c dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted
  45. ^ a b "DiskCryptor Features". http://diskcryptor.net/wiki/Main_Page/en. Retrieved 2010-05-25. 
  46. ^ a b "DISK Protect 4.2 Data Sheet" (PDF). http://www.becrypt.com/us/downloads/DISK%20Protect%204.2_US.pdf. Retrieved 2008-02-27. 
  47. ^ a b c "DriveCrypt features". SecurStar GmbH. http://www.securstar.com/products_drivecrypt.php. Retrieved 2007-01-03. 
  48. ^ a b "Multi level access with separate access credentials, each enabling a different set of functional or logical operations". EISST Ltd.. http://www.eisst.com/products/private_safe/compare/. Retrieved 2007-07-25. 
  49. ^ uses the lower filesystem (stacking)
  50. ^ a b c d e Jacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29) (PDF). Unlocking FileVault: An Analysis of Apple's disk encryption. http://crypto.nsa.org/vilefault/23C3-VileFault.pdf. Retrieved 2007-03-31. 
  51. ^ FreeOTFE has a modular architecture and set of components to allow 3rd party integration
  52. ^ FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
  53. ^ a b c d "FreeBSD Handbook: Encrypting Disk Partitions". http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.html. Retrieved 2006-12-24. 
  54. ^ a b c Poul-Henning Kamp. "GBDE - GEOM Based Disk Encryption" (PDF). GBDE design document. http://phk.freebsd.dk/pubs/bsdcon-03.gbde.paper.pdf. Retrieved 2006-12-24. 
  55. ^ a b "geli(8) man page in FreeBSD-current". GELI manual page in current FreeBSD. http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+7-current&format=html. Retrieved 2006-12-24. 
  56. ^ a b c d e f g h i j k Jari Ruusu. "loop-AES README file". http://loop-aes.sourceforge.net/loop-AES.README. Retrieved 2007-04-23. 
  57. ^ Using customization
  58. ^ n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
  59. ^ "PGP Whole Disk Encryption FAQ". PGP Corporation. http://www.pgp.com/products/wholediskencryption/faq.html. Retrieved 2006-12-24. 
  60. ^ PGP private keys are always protected by strengthened passphrases
  61. ^ Endpoint Encryption (SafeBoot)ntel.com/cd/00/00/44/77/447708_447708.pdf "Intel Advanced Encryption Standard: New Instructions". Intel. http://cache-www.iMcAfee Endpoint Encryption (SafeBoot)ntel.com/cd/00/00/44/77/447708_447708.pdf. Retrieved 2010-06-15. 
  62. ^ a b "Embedded Security: Trusted Platform Module Technology Comes of Age". Utimaco. http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.html. Retrieved 2008-03-04. 
  63. ^ "ThinkVantage Technologies Deployment Guide". Lenovo. http://download.lenovo.com/ibmdl/pub/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf. Retrieved 2008-03-05. 
  64. ^ a b For Truecrypt containers
  65. ^ a b "SecureDoc Product Information". WinMagic Inc.. http://www.winmagic.com/solutions/securedoc.html. Retrieved 2008-03-05. 
  66. ^ optional by using -KOpenBSD Manual Pages: vnconfig(8)
  67. ^ a b http://www.truecrypt.org/docs/sys-encryption-supported-os.php
  68. ^ Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a password when a user forgets it?)
  69. ^ http://www.jetico.com/data-protection-encryption-bestcrypt-volume-encryption-enterprise/
  70. ^ dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
  71. ^ yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
  72. ^ Uses proprietary e-Capsule file system not exposed to the OS.
  73. ^ http://www.docstoc.com/docs/19695727/Mac-Marshal™-A-Tool-for-Mac-OS-X-Operating
  74. ^ a b File-based volume encryption is possible when used with mdconfig(8) utility.
  75. ^ "Control Break Internation Debuts SafeBoot Version 4.27". http://www.entrepreneur.com/tradejournals/article/120829729.html. Retrieved 2008-08-12. 
  76. ^ http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
  77. ^ LRW_issue
  78. ^ Containers created with ArchiCrypt Live version 5 use LRW
  79. ^ "New features in BestCrypt version 8". Jetico. http://www.jetico.com/bc8_web_help/html/03_new_features/01_new_features.htm. Retrieved 2007-03-02. 
  80. ^ "New features in version 2". Jetico. http://www.jetico.com/bcve_web_help/html/01_introduction/04_new_in_version.htm. Retrieved 2009-03-01. 
  81. ^ a b Niels Fergusson (August 2006). AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista. Microsoft. http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf. Retrieved 2008-02-22. 
  82. ^ "man 4 cgd in NetBSD-current". NetBSD current manual page on CGD. 2006-03-11. http://netbsd.gw.com/cgi-bin/man-cgi?cgd+4+NetBSD-current. Retrieved 2006-12-24. 
  83. ^ Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: http://lwn.net/Articles/213650/
  84. ^ "Linux/BSD disk encryption comparison". http://mareichelt.de/pub/notmine/linuxbsd-comparison.html. Retrieved 2006-12-24. 
  85. ^ For Scramdisk containers
  86. ^ For Truecrypt 4 containers
  87. ^ For Truecrypt 5 and 6 containers
  88. ^ Commit enabling AES XTS
  89. ^ Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
  90. ^ Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
  91. ^ Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.


External links


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Disk encryption software — To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses software that is used to implement the technique (for cryptographic aspects of the problem see… …   Wikipedia

  • Disk encryption — uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term full disk encryption (or whole disk encryption) is often used to… …   Wikipedia

  • Full disk encryption — (or whole disk encryption) is a kind of disk encryption software or hardware which encrypts every bit of data that goes on a disk or disk volume. The term full disk encryption is often used to signify that everything on a disk, including the… …   Wikipedia

  • Comparison of encrypted external drives — This is a technical feature comparison of commercial encrypted external drives. Contents 1 Background information 2 Operating systems 3 Features 4 See also …   Wikipedia

  • Disk Utility — Developer(s) Apple Inc …   Wikipedia

  • Comparison of online backup services — This is a comparison of online backup services. Contents 1 Comparison 1.1 Legend 1.2 Comments 1.3 Versioning 2 …   Wikipedia

  • Comparison of file archivers — This is an incomplete list, which may never be able to satisfy particular standards for completeness. You can help by expanding it with reliably sourced entries. The following tables compare general and technical information for a number of file… …   Wikipedia

  • Comparison of BitTorrent clients — BitTorrent client redirects here. For the client created by Bram Cohen, see BitTorrent (software). A BitTorrent client is a computer program that manages downloads and uploads using the BitTorrent protocol. The first client, known as BitTorrent,… …   Wikipedia

  • Comparison of file systems — The following tables compare general and technical information for a number of file systems. Contents 1 General information 2 Limits 3 Metadata 4 Features …   Wikipedia

  • Comparison of archive formats — There are many popular computer data archive formats for creating and maintaining archive files. The tables below compare many popular archive formats. Contents 1 Features 1.1 Purpose 1.2 Filename extension 1 …   Wikipedia