In practice, McAfee delivers an API to forensic tool developers (starting with Guidance Software for EnCase). This implementation allows developers to integrate the DE API into their products and request disk encryption keys directly, without the need to work through ePO directly. McAfee is acquiring endpoint encryption vendor SafeBoot Corp. In a $350 million deal to bolster the antivirus vendor's mobile device security software. And a scripting tool. Nov 07, 2013 Home Forum Index Forensic Software Decrypting SAFEBOOT Encrypted image in Encase All Forums > Forensic Software Forum Forensic software discussion (commercial and open source/freeware).
Keeping your personal data safe doesn't have to be difficult—as long as you keep the sensitive stuff encrypted and under your control. That's why this week we're looking at the five best file encryption tools you can use to encrypt your data locally so only you have the key.
Safe Boot Encryption Tools
Earlier in the week we asked you for your favorite file encryption tools, and you gave us tons of great nominations, but as always, we only have room for the top five.
Advertisement
What's The Best File Encryption Tool?
Times have changed, and more than a few tools have come and gone that were designed to encrypt your …
Read more ReadFor the purposes of our roundup, we're focusing on desktop file encryption tools - the ones you use on your own computer to encrypt your own private data, not cloud services that promise to encrypt your data, or business services that say they offer encryption. The goal here is to find the best tools you can use to lock down your sensitive files—whether they're photos, financial documents, personal backups, or anything else—and keep them locked down so only you have the key. For those unfamiliar with the topic, we have a great guide on how encryption works, and how you can use it to keep your own data safe.
Advertisement
A Beginner's Guide to Encryption: What It Is and How to Set it Up
You’ve probably heard the word “encryption” a million times before, but if you still aren’t exactly …
Read more ReadWith that out of the way, here are your top five, in no particular order:
VeraCrypt (Windows/OS X/Linux)
Advertisement
VeraCrypt is a fork of and a successor to TrueCrypt, which ceased development last year (more on them later.) The development team claims they've addressed some of the issues that were raised during TrueCrypt's initial security audit, and like the original, it's free, with versions available for Windows, OS X, and Linux. If you're looking for a file encryption tool that works like and reminds you of TrueCrypt but isn't exactly TrueCrypt, this is it. VeraCrypt supports AES (the most commonly used), TwoFish, and Serpent encryption ciphers, supports the creation of hidden, encrypted volumes within other volumes. Its code is available to review, although it's not strictly open source (because so much of its codebase came from TrueCrypt.) The tool is also under constant development, with regular security updates and an independent audit in the planning stages (according to the developers.)
Those of you who nominated VeraCrypt praised it for being an on-the-fly encryption tool, as in your files are only decrypted when they're needed and they're encrypted at rest at all other times, and most notably for being the spiritual (if not almost literal) successor to TrueCrypt. Many of you praised them for being a strong tool that's simple to use and to the point, even if it's lacking a good-looking interface or tons of bells and whistles. You also noted that VeraCrypt may not support TrueCrypt files and containers, but can convert them to its own format, which makes moving to it easy. You can read more in its nomination thread here.
Advertisement
AxCrypt (Windows)
Advertisement
AxCrypt is a free, open source, GNU GPL-licensed encryption tool for Windows that prides itself on being simple, efficient, and easy to use. It integrates nicely with the Windows shell, so you can right-click a file to encrypt it, or even configure 'timed,' executable encryptions, so the file is locked down for a specific period of time and will self-decrypt later, or when its intended recipient gets it. Files with AxCrypt can be decrypted on demand or kept decrypted while they're in use, and then automatically re-encrypted when they're modified or closed. It's fast, too, and allows you to select an entire folder or just a large group of files and encrypt them all with a single click. It's entirely a file encryption tool however, meaning creating encrypted volumes or drives is out of its capabilities. It supports 128-bit AES encryption only, offers protection against brute force cracking attempts, and is exceptionally lightweight (less than 1MB.)
Those of you who nominated AxCrypt noted that it's really easy to use and easy to integrate into your workflow, thanks to its shell support. If you're eager for more options, it also has a ton of command line options, so you can fire up the command prompt in Windows and perform more complex actions—or multiple actions at once. It may not support the strongest or most varied encryption methods available, but if you're looking to keep your data safe from most threats, it's a simple tool that can lend a little security that your data—like files stored in the cloud on Dropbox or iCloud, for example—are secure and convenient to access at the same time. You can read more in this nomination thread here and here.
Advertisement
BitLocker (Windows)
Advertisement
BitLocker is a full-disk encryption tool built in to Windows Vista and Windows 7 (Ultimate and Enterprise), and into Windows 8 (Pro and Enterprise), as well as Windows Server (2008 and later). It supports AES (128 and 256-bit) encryption, and while it's primarily used for whole-disk encryption, it also supports encrypting other volumes or a virtual drive that can be opened and accessed like any other drive on your computer. It supports multiple authentication mechanisms, including traditional password and PINs, a USB 'key,' and the more controversial Trusted Platform Module (TPM) technology (that uses hardware to integrate keys into devices) that makes encryption and decryption transparent to the user but also comes with a host of its own issues. Either way, BitLocker's integration with Windows (specifically Windows 8 Pro) makes it accessible to many people, and a viable disk encryption tool for individuals looking to protect their data if their laptop or hard drives are lost or stolen, in case their computers are compromised, or a business looking to secure data in the field.
Of course, it goes without saying that BitLocker was a contentious nomination. More than a few of you touted BitLocker's accessibility and ease of use, and many of you even praised its encryption for being strong and difficult to crack. Many of you noted that you switched to BitLocker after the developers of TrueCrypt suggested it. Others, however, brought up the assertion made from privacy advocates that BitLocker is compromised and has backdoors in place for government security agencies (from multiple countries) to decrypt your data. While Microsoft has officially said this isn't true and maintains there's no backdoor in BitLocker (while simultaneously maintaining the code as closed source—but available to review by its partners, which include those agencies), the assertion is enough to make more than a few of you shy away. You can read more about the criticism and controversy at the Wikipedia link above, or in the nomination thread here.
Advertisement
GNU Privacy Guard (Windows/OS X/Linux)
Advertisement
GNU Privacy Guard (GnuPG) is actually an open-source implementation of Pretty Good Privacy (PGP). While you can install the command line version on some operating systems, most people choose from the dozens of frontends and graphical interfaces for it, including the official releases that can encrypt everything from email to ordinary files to entire volumes. All GnuPG tools support multiple encryption types and ciphers, and generally are capable of encrypting individual files one at a time, disk images and volumes, or external drives and connected media. A few of you nominated specific GnuPG front-ends in various threads, like the Windows Gpg4Win, which uses Kleopatra as a certificate manager.
Those of you who nominated GnuPG praised it for being open-source and accessible through dozens of different clients and tools, all of which can offer file encryption as well as other forms of encryption, like robust email encryption for example. The key, however, is finding a front-end or a client that does what you need it to do and works well with your workflow. The screenshot above was taken using GPGTools, an all-in-one GnuPG solution that offers keychain management as well as file, email, and disk encryption for OS X. You can read more in its nomination thread here.
Advertisement
How to Encrypt Your Email and Keep Your Conversations Private
Between constant password breaches and the NSA looking in on everything you do, you've…
Read more Read7-Zip (Windows/OS X/Linux)
Advertisement
7-Zip is actually a lightweight file archiver—and our favorite archive utility for Windows. Even though it's amazing at compressing and organizing files for easy storage or sending over the internet, it's also a strong file encryption tool, and is capable of turning individual files or entire volumes into encrypted volumes that only your have the keys to. It's completely free, even for commercial use, supports 256-bit AES encryption, and while the official download is Windows only, there are unofficial builds for Linux and OS X systems as well. Most of 7-Zip's code is GNU LGPL licensed and open to review. Compressed and encrypted .7z (or .zip, if you prefer) archives are easily portable and secure, and can be encrypted with passwords and turned into executables that will self-decrypt when they get to their intended recipient. 7-Zip also integrates with the shell of the operating system you're using, making it usually a click away from use. It's also a powerful command line utility.
The Best File Archive Utility for Windows
Windows has a number of good file archiving and unarchiving utilities, and which one you use…
Read more ReadAdvertisement
Those of you who nominated it noted that it may not have the most robust user interface, but it gets the job done, and many of you have it installed anyway specifically for its robust file compression and decompression capabilities. You noted it's fast, flexible, free, and easy to use, and while it may not be the fastest file encryption tool (and it's not capable of whole volume or disk encryption), it gets the job done—especially for encrypting files you need to send to someone else and actually have them be able to access without jumping through too many hoops. Some of you noted that 7-Zip's encrypted volumes are flexible—perhaps too flexible, since new files added to an encrypted archive aren't encrypted (you'd have to extract them all and make a new archive for that), but it's otherwise a minor ding. You can read more in its nomination thread here.
Now that you've seen the top five, it's time to put them to an all-out vote to determine the community favorite.
Advertisement
Honorable Mentions
We have two honorable mentions this week. First and foremost is Disk Utility (OS X), which is bundled with OS X as a disk repair and management tool. Disk Utility can also encrypt drives and volumes, and since OS X can create a compressed volume just by right-clicking a file, series of files, or a folder and selecting 'Compress,' Disk Utility makes encrypting anything you want extremely easy. Plus, it's built in to OS X, so you don't need to install anything else. You can read more about it in its nomination thread here.
Mcafee Safeboot
Advertisement
Second, we should tip our hats to the venerable old TrueCrypt, our old champion, which actually earned a number of nominations in the call for contenders thread. We covered the meltdown of TrueCrypt when it happened, with the developers abruptly abandoning the project claiming that it's no longer secure, in the middle of their independent security audit. The developers suggested switching to BitLocker, and pushed out a new version that's widely considered compromised. However, the older version, 7.1a, is still widely regarded as safe, even though development on it has been abandoned, and the tool has been left without security updates since then. Even so, security analysts split on whether you should trust TrueCrypt or move on to another encryption utility. Many people stand by it even though it's a dead project, others have built their own projects on top of it (see VeraCrypt, mentioned earlier), and others keep using the last safe version. We can't recommend TrueCrypt anymore ourselves, but you can read more in its nomination thread here, and over at Steve Gibson's page dedicated to TrueCrypt here.
TrueCrypt's Web Site Updates with Ominous Warning, Details Unknown
TrueCrypt, one of our favorite file encryption tools, has abruptly changed its homepage to a…
Read more ReadAdvertisement
Have something to say about one of the contenders? Want to make the case for your personal favorite, even if it wasn't included in the list? Remember, the top five are based on your most popular nominations from the call for contenders thread from earlier in the week. Don't just complain about the top five, let us know what your preferred alternative is—and make your case for it—in the discussions below.
The Hive Five is based on reader nominations. As with most Hive Five posts, if your favorite was left out, it didn't get the nominations required in the call for contenders post to make the top five. We understand it's a bit of a popularity contest. Have a suggestion for the Hive Five? Send us an email at tips+hivefive@lifehacker.com!
Advertisement
Title photo by andrey_l (Shutterstock).
Mcafee Disk Encryption Vs Bitlocker
This is a technical feature comparison of different disk encryption software.
Background information[edit]
Encryption | Developer | First released | Licensing | Maintained? |
---|---|---|---|---|
Aloaha Crypt Disk | Aloaha | 2008 | Open source[citation needed] | Yes |
ArchiCrypt Live | Softwaredevelopment Remus ArchiCrypt | 1998 | Proprietary | Yes |
BestCrypt | Jetico | 1993[1] | Proprietary | Yes |
BitArmor DataControl | BitArmor Systems Inc. | 2008-05 | Proprietary | Yes |
BitLocker | Microsoft | 2006 | Proprietary | Yes |
Bloombase Keyparc | Bloombase | 2007 | Proprietary | No[2] |
Boxcryptor | Secomba GmbH | 2011 | Proprietary | Yes |
CGD | Roland C. Dowdeswell | 2002-10-04[3] | BSD | Yes |
CenterTools DriveLock | CenterTools | 2008 | Proprietary | Yes |
Check Point Full Disk Encryption | Check Point Software Technologies Ltd | 1999[4][5][6] | Proprietary | Yes |
CipherShed | CipherShed Project | 2014[7] | TrueCrypt License Version 3.0[8] | No |
CrossCrypt | Steven Scherrer | 2004-02-10[9] | GPL | No |
CryFS | Sebastian Messmer | 2015 | LGPLv3 | Yes |
Cryhod | Prim'X Technologies | 2010 | Proprietary | Yes |
Cryptainer | Cypherix Software | 1999 | Proprietary | Yes |
Cryptic Disk | Exlade | 2003 | Proprietary | Yes |
CryptArchiver | WinEncrypt | ? | Proprietary | Yes |
Cryptoloop | ? | 2003-07-02[10] | GPL | No |
Cryptomator | Skymatic UG (haftungsbeschränkt) | 2016-03-09 | GPLv3 | Yes |
CryptoPro Secure Disk Enterprise | cpsd it-services GmbH | 2010 | Proprietary | Yes |
CryptoPro Secure Disk for BitLocker | cpsd it-services GmbH | 2012 | Proprietary | Yes |
CryptSync | Stefan Küng | 2012 | Gpl v2 | Yes |
Discryptor | Cosect Ltd. | 2008 | Proprietary | No |
DiskCryptor | ntldr | 2007 | GPL | Yes |
DISK Protect | Becrypt Ltd | 2001 | Proprietary | Yes |
Cryptsetup / Dmsetup | Christophe Saout | 2004-03-11[11] | GPL | Yes |
Dm-crypt / LUKS | Clemens Fruhwirth (LUKS) | 2005-02-05[12] | GPL | Yes |
DriveCrypt | SecurStar GmbH | 2001 | Proprietary | Yes[13] |
DriveSentry GoAnywhere 2 | DriveSentry | 2008 | Proprietary | No |
E4M | Paul Le Roux | 1998-12-18[14] | Open source | No |
e-Capsule Private Safe | EISST Ltd. | 2005 | Proprietary | Yes |
eCryptfs | Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) | 2005[15] | GPL | Yes |
EgoSecure HDD Encryption | EgoSecure GmbH | 2006 | Proprietary | Yes |
EncFS | Valient Gough | 2003[16] | LGPLv3 | Yes |
EncryptStick | ENC Security Systems | 2009 | Proprietary | Yes |
FileVault | Apple Inc. | 2003-10-24 | Proprietary | Yes |
FileVault 2 | Apple Inc. | 2011-07-20 | Proprietary | Yes |
FREE CompuSec | CE-Infosys | 2002 | Proprietary | Yes |
FreeOTFE | Sarah Dean | 2004-10-10[17] | Open source | No |
GBDE | Poul-Henning Kamp | 2002-10-19[18] | BSD | No |
GELI | Pawel Jakub Dawidek | 2005-04-11[19] | BSD | Yes |
GnuPG | Werner Koch | 1999-09-07[20] | GPL | Yes |
gocryptfs | Jakob Unterwurzacher | 2015-10-07[21] | MIT / X Consortium License | Yes |
Knox | AgileBits | 2010 | Proprietary | Yes |
KryptOS | The MorphOS Development Team | 2010 | Proprietary | Yes |
LibreCrypt | tdk | 2014-06-19[22] | Open source | No |
Loop-AES | Jari Ruusu | 2001-04-11 | GPL | Yes |
McAfee Drive Encryption (SafeBoot) | McAfee, LLC | 2007[23] | Proprietary | Yes |
n-Crypt Pro | n-Trance Security Ltd | 2005 | Proprietary | Yes |
NetLib Encryptionizer (directory encryption) | NetLib Security | 1987 | Proprietary | Yes |
PGPDisk | PGP Corporation (acquired by Symantec in 2010) | 1998-09-01[24] | Proprietary | Yes |
Private Disk | Dekart | 1993[25] | Proprietary | Yes |
ProxyCrypt | v77 | 2013 | Open source | Yes |
R-Crypto | R-Tools Technology Inc | 2008 | Proprietary | Yes |
SafeGuard Easy | Sophos (Utimaco) | 1993[26] | Proprietary | Yes |
SafeGuard Enterprise | Sophos (Utimaco) | 2007[27] | Proprietary | Yes |
SafeGuard PrivateDisk | Sophos (Utimaco)[28] | 2000 | Proprietary | Yes |
SafeHouse Professional | PC Dynamics, Inc. | 1992 | Proprietary | Yes |
Scramdisk | Shaun Hollingworth | 1997-07-01 | Open source | No |
Scramdisk 4 Linux | Hans-Ulrich Juettner | 2005-08-06[29] | GPL | No |
SecuBox | Aiko Solutions | 2007-02-19 | Proprietary | Yes |
SECUDE Secure Notebook | SECUDE | 2003 | Proprietary | Yes |
SecureDoc | WinMagic Inc. | 1997 | Proprietary | Yes |
Seqrite Encryption Manager | Quick Heal Technologies Ltd. | 2017 | Proprietary | Yes |
Sentry 2020 | SoftWinter | 1998[30] | Proprietary | No |
Softraid / RAID C | OpenBSD | 2007-11-01[31] | BSD | Yes |
SpyProof! | Information Security Corp. | 2002 | Proprietary | Yes |
Svnd / Vnconfig | OpenBSD | 2000-12-01[32] | BSD | Yes |
Symantec Endpoint Encryption | Symantec Corporation | 2008 | Proprietary | Yes |
Tcplay | Alex Hornung | 2012-01-28[33] | BSD | Yes |
Trend Micro Endpoint Encryption (Mobile Armor) | Trend Micro[34] | 2004 or earlier[35] | Proprietary | Yes |
TrueCrypt | TrueCrypt Foundation | 2004-02-02[36] | TrueCrypt License 3.1[37] | No |
USBCrypt | WinAbility Software Corp. | 2010 | Proprietary | Yes |
VeraCrypt | IDRIX | 2013-06-22[38] | Apache License 2.0[39] TrueCrypt License Version 3.0 (legacy code only) | Yes |
CyberSafe Top Secret | CyberSoft | 2013 | Proprietary | Yes |
Name | Developer | First released | Licensing | Maintained? |
Operating systems[edit]
Name | Windows NT | Windows Mobile (incl.Pocket PC) | FreeBSD | Linux | Mac OS X | NetBSD | OpenBSD | DragonFly BSD | Android | iOS |
---|---|---|---|---|---|---|---|---|---|---|
Aloaha Crypt Disk | Yes | No | No | No | No | No | No | No | ? | ? |
BestCrypt Volume Encryption | Yes | No | No | No[40] | Yes | No | No | No | ? | ? |
BitArmor DataControl | Yes | No | No | No | No | No | No | No | ? | ? |
BitLocker | Yes | No | No | Partial[41] | Partial[41] | No | No | No | No | ? |
Bloombase Keyparc | Yes | No | No | Yes | Yes | No | No | No | ? | ? |
Boxcryptor | Yes | No | No | Yes | Yes | No | No | No | Yes | Yes |
CenterTools DriveLock | Yes | No | No | No | No | No | No | No | ? | ? |
CGD | No | No | No | No | No | Yes | No | No | ? | ? |
Check Point Full Disk Encryption | Yes | Yes | No | Yes[42] | Yes | No | No | No | ? | ? |
CipherShed | Yes | No | No[43] | Yes | Yes | No | No | No | Yes[44] | ? |
CrossCrypt | Yes[45] | No | No | No | No | No | No | No | No | ? |
CryFS | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | No | ? |
Cryhod | Yes | No | No | Yes | No | No | No | No | ? | ? |
Cryptainer | Yes | Yes[46] | No | No | No | No | No | No | ? | ? |
CryptArchiver | Yes | No | No | No | No | No | No | No | ? | ? |
Cryptic Disk | Yes | No | No | No | No | No | No | No | No | No |
Cryptoloop | Yes[47] | No | No | Yes | No | No | No | No | ? | ? |
Cryptomator | Yes[48] | No | No | Yes | Yes | No | No | No | Yes | Yes |
CryptoPro Secure Disk Enterprise | Yes | No | No | No | No | No | No | No | No | ? |
CryptoPro Secure Disk for BitLocker | Yes | No | No | No | No | No | No | No | No | ? |
Cryptsetup / Dmsetup | Yes[47] | No | No | Yes | No | No | No | Yes | ? | ? |
CryptSync | Yes | No | No | Yes | Yes | No | No | No | No | ? |
Discryptor | No | No | No | No | No | No | No | No | ? | ? |
DiskCryptor | Yes | No | No | No | No | No | No | No | ? | ? |
DISK Protect | Yes | No | No | No | No | No | No | No | ? | ? |
Dm-crypt / LUKS | Yes[47] | Yes[49] | No | Yes | No | No | No | Yes | ? | ? |
DriveCrypt | Yes | No | No | No | No | No | No | No | ? | ? |
DriveSentry GoAnywhere 2 | Yes | No | No | No | No | No | No | No | ? | ? |
E4M | Yes | No | No | No | No | No | No | No | ? | ? |
e-Capsule Private Safe | Yes | No | No | No | No | No | No | No | ? | ? |
eCryptfs | No | No | No | Yes | No | No | No | No | ? | ? |
EgoSecure HDD Encryption | Yes | No | No | No | No | No | No | No | ? | ? |
EncFS | Yes[50] | Yes[51] | Yes (FUSE) | Yes (FUSE) | Yes[50] | Yes (FUSE) | Yes (FUSE) | Yes (FUSE) | Yes[51] | ? |
EncryptStick | Yes | No | No | Yes | Yes | No | No | No | ? | ? |
FileVault | No | No | No | No | Yes | No | No | No | ? | ? |
FileVault 2 | No | No | No | Partial[52] | Yes | No | No | No | ? | ? |
FREE CompuSec | Yes | No | No | No | No | No | No | No | ? | ? |
FreeOTFE | Yes | Yes | No | Partial[53] | No | No | No | No | No | ? |
GBDE | No | No | Yes | No | No | No | No | No | ? | ? |
GELI | No | No | Yes | No | No | No | No | No | ? | ? |
Knox | No | No | No | No | Yes | No | No | No | ? | ? |
LibreCrypt | Yes | No | No | Partial[54] | No | No | No | No | Yes[55] | ? |
Loop-AES | No | No | No | Yes | No | No | No | No | ? | ? |
McAfee Drive Encryption (SafeBoot) | Yes | Yes[56] | No | No | Yes | No | No | No | ? | ? |
n-Crypt Pro | Yes | No | No | No | No | No | No | No | ? | ? |
NetLib Encryptionizer (directory encryption) | Yes | No | No | No | No | No | No | No | No | No |
PGPDisk | Yes | No | No | No | Yes | No | No | No | ? | ? |
PGP Whole Disk Encryption | Yes | Yes | No | Yes | Yes | No | No | No | ? | ? |
Private Disk | Yes | No | No | No | No | No | No | No | ? | ? |
ProxyCrypt | Yes | No | No | No | No | No | No | No | No | ? |
R-Crypto | Yes | No | No | No | No | No | No | No | ? | ? |
SafeGuard Easy | Yes | No | No | No | No | No | No | No | ? | ? |
SafeGuard Enterprise | Yes | No | No | No | Yes | No | No | No | ? | ? |
SafeGuard PrivateDisk | Yes | No | No | No | No | No | No | No | ? | ? |
SafeHouse Professional | Yes | No | No | No | No | No | No | No | ? | ? |
Scramdisk | Yes | No | No | Yes | No | No | No | No | ? | ? |
Scramdisk 4 Linux | No | No | No | Yes | No | No | No | No | ? | ? |
SecuBox | No | Yes | No | No | No | No | No | No | ? | ? |
SecureDoc | Yes | No | No | Yes | Yes | No | No | No | ? | ? |
Sentry 2020 | Yes | No | No | No | No | No | No | No | ? | ? |
Seqrite Volume Encryption | Yes | No | No | No | No | No | No | No | No | No |
Softraid / RAID C | No | No | No | No | No | No | Yes | No | ? | ? |
SpyProof! | Yes | No | No | No | No | No | No | No | ? | ? |
Svnd / Vnconfig | No | No | No | No | No | No | Yes | No | ? | ? |
Symantec Endpoint Encryption | Yes | No | No | No[57] | Yes | No | No | No | ? | ? |
Tcplay | No | No | No | Yes | No | No | No | Yes | No | ? |
Trend Micro Endpoint Encryption | Yes | No | No | No | Yes | No | No | No | No | ? |
TrueCrypt | Yes | No | No[58] | Yes | Yes | No | No | No | Yes[44] | ? |
USBCrypt | Yes | No | No | No | No | No | No | No | No | ? |
VeraCrypt | Yes | No | Yes | Yes | Yes | No | No | No | Yes[59] | ? |
CyberSafe Top Secret | Yes | No | No | No | No | No | No | No | Yes | ? |
Name | Windows NT | Windows Mobile (incl. Pocket PC) | FreeBSD | Linux | Mac OS X | NetBSD | OpenBSD | DragonFly BSD | Android | iOS |
Features[edit]
- Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)[60] can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others.
- Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
- Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.
- Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.[clarification needed]
- Multiple keys: Whether an encrypted volume can have more than one active key.
- Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.
- Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.
- Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.
- Filesystems: What filesystems are supported.
- Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11)
Name | Hidden containers | Pre-boot authentication | Single sign-on | Custom authentication | Multiple keys | Passphrase strengthening | Hardware acceleration | TPM | Filesystems | Two-factor authentication |
---|---|---|---|---|---|---|---|---|---|---|
Aloaha Secure Stick | Yes | No | N/A | Yes | Yes | No | No | No | NTFS, FAT32 | Yes |
ArchiCrypt Live | Yes[61] | No | N/A | No | Yes[61][62] | No | No | No | ? | Yes[61][63] |
BestCrypt | Yes | Yes | ? | No | Yes[64] | Yes | Yes | Yes | Any supported by OS | Yes[65] |
BitArmor DataControl | No | Yes | ? | No | Yes | Yes | No | No | NTFS, FAT32 on non-system volumes | No |
BitLocker | No | Yes[66] | No | Yes[67] | Yes[68] | Yes[69] | Yes | Yes[68] | Chiefly NTFS [Note 1] | Yes [Note 2] |
Bloombase Keyparc | No | No | N/A | Yes | Yes | Yes | Yes | No | ? | ? |
CGD | No | No | N/A | Yes[70] | Yes[71] | Yes[70] | No | No | Any supported by OS | Yes[70] |
CenterTools DriveLock | No | Yes | Yes | No | No | Yes | No | No | Any supported by OS | Yes |
Check Point Full Disk Encryption | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | NTFS, FAT32 | Yes |
CipherShed | Yes (limited to one per 'outer' container) | only on Windows[72] | ? | No | yes with multiple keyfiles[73][74] | Yes | Yes | No[75] | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[76] | Yes |
CryFS | No | No | N/A | No | No | Yes[77] | No | No | Any supported by OS | No |
CrossCrypt | No | No | N/A | No | No | No | No | No | ? | No |
CryptArchiver | No | No | N/A | No | No | ? | No | No | ? | ? |
Cryptic Disk | Yes | No | No | No | Yes | Yes | Yes | No | Any supported by OS | Yes |
Cryhod | No | Yes | Yes | No | Yes | Yes | Yes | No | Any supported by OS | Yes |
Cryptoloop | No | Yes[78] | ? | Yes | No | No | Yes[citation needed] | No | Any supported by OS | ? |
Cryptomator | No | No | N/A | No | No | Yes | Yes | No | Any supported by OS | No |
CryptoPro Secure Disk Enterprise | Yes with add-on Secure Device | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Any supported by OS | Yes |
CryptoPro Secure Disk for BitLocker | Yes with add-on Secure Device | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Any supported by OS | Yes |
Cryptsetup / Dmsetup | No | Yes[78] | ? | Yes | No | No | Yes | No | Any supported by OS | Yes |
DiskCryptor | No | Yes | ? | No | No | No | Yes[79] | No | Only Windows MBR volumes; no UEFI GPT drives | Yes[79] |
DISK Protect | No | Yes[80] | Yes | No | Yes[80] | No | Yes | Yes | NTFS,FAT32 | Yes |
Dm-crypt / LUKS | No | Yes[78] | ? | Yes | Yes | Yes | Yes | Partial[81][Note 3] | Any supported by OS | Yes |
DriveCrypt | Yes[82] | Yes | Yes | Yes | Yes | Yes | Yes | No | Any supported by OS | Yes |
DriveSentry GoAnywhere 2 | No | No | N/A | Yes | No | Yes | No | ? | Any supported by OS | Yes |
E4M | No | No | N/A | No | No | ? | No | No | ? | No |
e-Capsule Private Safe | Yes[83] | No | N/A | No | Yes[83] | No | Yes | No | ? | ? |
eCryptfs | No | No | N/A | Yes | Yes | Yes | Yes | Yes | Yes[84] | Yes |
EgoSecure HDD Encryption | No | Yes | Yes | Yes | Yes | Yes | Yes[85] | Yes | NTFS, FAT32 | Yes |
FileVault | No | No | N/A | No | Two passwords[86] | Yes[86] | ? | No | HFS+, possibly others | No |
FileVault 2 | No | Yes | Yes | No | Yes | Yes | Yes[87] | No | HFS+, possibly others | No |
FREE CompuSec | No | Yes | ? | No | No | No | No | No | Any supported by OS | No |
FreeOTFE | Yes | No | N/A | Yes[88] | Yes[89] | Yes | Yes | No | Any supported by OS | Yes |
GBDE | No | No[90] | N/A | Yes | Yes[91] | No[91] | No[90] | No | Any supported by OS | Yes |
GELI | No | Yes[90] | ? | Yes | Yes[92] | Yes[92] | Yes[90] | No | Any supported by OS | Yes |
Loop-AES | No | Yes[93] | ? | Yes[93] | Yes[93] | Yes[93] | Yes[93] | No | Any supported by OS | Yes[94] |
McAfee Drive Encryption (SafeBoot) | Yes | Yes | Yes | Yes | Yes | Yes | Yes[85][95] | Yes | Any supported by OS | Yes |
n-Crypt Pro | No | No | N/A | No | No | N/A[96] | No | No | ? | ? |
PGPDisk | No | Yes[97] | Yes | ? | Yes | Yes[98] | ? | Yes | ? | Yes |
Private Disk | No | No | N/A | No | Yes | Yes | No | No | Any supported by OS | Yes |
ProxyCrypt | Yes | No | No | No | No | Yes | Yes | No | Any supported by OS | Yes |
R-Crypto | ? | No | N/A | ? | ? | ? | ? | ? | Any supported by OS | ? |
SafeGuard Easy | No | Yes | ? | No | Yes | Yes | No | Yes[99] | Any supported by OS | Yes |
SafeGuard Enterprise | No | Yes | Yes | No | Yes | Yes | No | Yes[99] | Any supported by OS | Yes |
SafeGuard PrivateDisk | No | No | N/A | No | Yes | Yes | No | Yes[100] | Any supported by OS | Yes |
SafeHouse Professional | No | No | N/A | Yes | Yes | Yes | No | No | Any supported by OS | Yes |
Scramdisk | Yes | No | N/A | No | No | No | No | No | ? | Last update to web site 2009-07-02 |
Scramdisk 4 Linux | Yes[101] | No | N/A | No | No | Yes[101] | No | No | ext2, ext3, reiserfs, minix, ntfs, vfat/msdos | No |
SecuBox | No | No | N/A | No | No | Yes | No | No | ? | No |
SecureDoc | No | Yes[102] | ? | Yes | Yes | Yes | Yes | Yes | ? | Yes |
Seqrite Encryption Manager | No | Yes | Yes | No | Yes | Yes | Yes | No | Any supported by OS | No |
Sentry 2020 | No | No | ? | No | No | No | No | No | ? | No |
Softraid / RAID C | No | No | ? | ? | ? | ? | Yes | ? | Any supported by OS | ? |
Svnd / Vnconfig | No | No | N/A | No | No | Yes[103] | Yes | ? | Any supported by OS | ? |
Symantec Endpoint Encryption | No | Yes | Yes | Yes | Yes | Yes | No | No | NTFS, FAT32 | Yes |
Trend Micro Endpoint Encryption | No | Yes | Yes | Yes | Yes | Yes[104] | Yes[105] | No | Any supported by OS | Yes[106] |
TrueCrypt[Note 4] | Yes (limited to one per 'outer' container) | only on Windows[107] | ? | No | yes with multiple keyfiles[74][108] | Yes | Yes | No[75] | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[76] | Yes |
VeraCrypt | Yes (limited to one per 'outer' container) | only on Windows[109] | No | No | yes with multiple keyfiles | Yes | Yes | No | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged | Yes |
CyberSafe Top Secret | Yes | No | No | No | Yes | Yes | Yes | No | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged | Yes |
Name | Hidden containers | Pre-boot authentication | Single sign-on | Custom authentication | Multiple keys | Passphrase strengthening | Hardware acceleration | TPM | Filesystems | Two-factor authentication |
- ^Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes
- ^BitLocker can be used with a TPM PIN + external USB key for two-factor authentication
- ^An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the standard input
- ^The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some 'unfixed security issues' and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. http://www.zdnet.com/truecrypt-quits-inexplicable-7000029994/
Layering[edit]
- Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table.
- Partition: Whether individual disk partitions can be encrypted.
- File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
- Swap space: Whether the swap space (called a 'pagefile' on Windows) can be encrypted individually/explicitly.
- Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
Safe Boot Encryption
Name | Whole disk | Partition | File | Swap space | Hibernation file | RAID |
---|---|---|---|---|---|---|
Aloaha Secure Stick | No | No | Yes | No | No | ? |
ArchiCrypt Live | Yes (except for the boot volume) | Yes | Yes | No | No | ? |
BestCrypt | Yes | Yes | Yes | Yes | Yes[114] | ? |
BitArmor DataControl | No | Yes | No | Yes | Yes | ? |
BitLocker | Yes (except for the boot volume) | Yes | Yes[115] | Yes (parent volume is encrypted) | Yes (parent volume is encrypted) | ? |
Bloombase Keyparc | Yes | Yes | Yes | Yes | No | ? |
CenterTools DriveLock | Yes | Yes | Yes | Yes | Yes | ? |
CGD | Yes | Yes | Yes[70] | Yes | No | ? |
Check Point Full Disk Encryption | Yes | Yes | Yes | Yes | Yes | ? |
CipherShed | Yes | Yes | Yes | Yes | only on Windows | ? |
CrossCrypt | No | No | Yes | No | No | ? |
CryFS | No | No | No | No | No | ? |
CryptArchiver | No | No | Yes | No | No | ? |
Cryptic Disk | No | Yes | Yes | No | No | ? |
Cryhod | No | Yes | No | Yes | Yes (parent volume is encrypted) | ? |
Cryptoloop | Yes | Yes | Yes | Yes | No | ? |
Cryptomill | Yes | N/A | Yes | N/A | N/A | ? |
CryptoPro Secure Disk Enterprise | Yes | Yes | Yes (add-on Secure Device) | Yes | Yes | ? |
CryptoPro Secure Disk for BitLocker | Yes | Yes | Yes | Yes | Yes | ? |
DiskCryptor | Yes | Yes | No | Yes | Yes | ? |
Disk Protect | Yes | No | No | Yes | Yes | ? |
Dm-crypt / LUKS | Yes | Yes | Yes[116] | Yes | Yes[117] | ? |
DriveCrypt | Yes | Yes[82] | Yes[82] | Yes | Yes | ? |
DriveSentry GoAnywhere 2 | No | Yes | Yes | No | No | ? |
E4M | No | Yes | Yes | No | No | ? |
e-Capsule Private Safe | No | No | Yes[118] | No | No | ? |
eCryptfs | No | No | Yes | No | No | ? |
EgoSecure HDD Encryption | Yes | Yes | Yes | Yes | Yes | ? |
FileVault | No | No | Yes[86] | Yes[119][86] | Yes[119][120] | |
FileVault 2 | Yes[121] | Yes[87] | No | Yes | Yes | ? |
FREE CompuSec | Yes | No | Yes | Yes | Yes | ? |
FreeOTFE | Yes (except for the boot volume) | Yes | Yes | No | No | ? |
GBDE | Yes | Yes | Yes[122] | Yes | No | ? |
GELI | Yes | Yes | Yes[122] | Yes | No | ? |
Loop-AES | Yes | Yes[93] | Yes[93] | Yes[93] | Yes[93] | ? |
McAfee Drive Encryption (SafeBoot) | Yes | Yes | Yes | Yes | Yes[123] | ? |
n-Crypt Pro | Yes | Yes | Yes | No | No | ? |
PGPDisk | Yes | Yes | Yes | Yes | only on Windows | ? |
Private Disk | No | No | Yes | No | No | ? |
ProxyCrypt | Yes | Yes | Yes | No | No | ? |
R-Crypto | No | No | Yes | No | No | ? |
SafeGuard Easy | Yes | Yes | extra module | Yes | Each sector on disk is encrypted | ? |
SafeGuard Enterprise | Yes | Yes | Yes | Yes | Each sector on disk is encrypted | ? |
SafeGuard PrivateDisk | No | No | Yes | No | No | ? |
SafeHouse Professional | No | No | Yes | No | No | ? |
Scramdisk | No | Yes | Yes | No | No | ? |
Scramdisk 4 Linux | Yes | Yes | Yes | Yes | No | ? |
SecuBox | No | No | Yes | N/A | No | ? |
SecureDoc | Yes[102] | Yes | Yes | Yes | Yes | ? |
Sentry 2020 | No | No | Yes | No | No | ? |
Seqrite Encryption Manager | Yes | Yes | Yes | Yes | Yes | RAID-5 |
Softraid / RAID C | Yes | Yes | No | Yes (encrypted by default in OpenBSD)[124] | No | ? |
Svnd / Vnconfig | ? | Yes | Yes | Yes (encrypted by default in OpenBSD) | ? | ? |
SpyProof! | No | Yes | Yes | No | No | ? |
Symantec Endpoint Encryption | Yes | Yes | Yes | Yes | Yes | ? |
Trend Micro Endpoint Encryption | Yes | Yes | Yes | Yes | Yes | ? |
TrueCrypt | Yes[125] | Yes | Yes | Yes | only on Windows[107] | ? |
VeraCrypt | Yes | Yes | Yes | Yes | only on Windows[107] | ? |
CyberSafe Top Secret | No | Yes | Yes | No | No | ? |
Name | Whole disk | Partition | File | Swap space | Hibernation file | RAID |
Modes of operation[edit]
Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
- CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
- CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
- CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
- LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[126]
- XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
- Authenticated encryption: Protection against ciphertext modification by an attacker
Name | CBC w/ predictable IVs | CBC w/ secret IVs | CBC w/ random per-sector keys | LRW | XTS | Authenticated encryption |
---|---|---|---|---|---|---|
Aloaha Crypt Disk | No | No | No | Yes | Yes | ? |
ArchiCrypt Live | No | No | No | Legacy support[127] | Yes | ? |
BestCrypt | No | Yes | No | Yes[128] | Yes[129] | ? |
BitArmor DataControl | No | Yes | Plumb-IV | No | No | ? |
BitLocker | No[130] | Yes[130] | No | No | Yes, Windows 10 10547+ | ? |
Bloombase Keyparc | ? | Yes | ? | ? | ? | ? |
CGD | No | Yes[131] | No | No | No | ? |
CenterTools DriveLock | ? | ? | ? | ? | ? | ? |
Check Point Full Disk Encryption | No | No | Yes | Yes | Yes | ? |
CipherShed | Legacy support[132] | No | No | Legacy support[133] | Yes[134] | ? |
CrossCrypt | Yes | No | No | No | No | ? |
CryFS | No | No | Yes | No | No | ? |
CryptArchiver | ? | ? | ? | ? | ? | ? |
Cryptic Disk | No | No | No | No | Yes | No |
Cryhod | No | Yes | No | No | No | ? |
Cryptoloop | Yes | No | No | No | No | No |
DiskCryptor | No | No | No | No | Yes | ? |
Dm-crypt / LUKS | Yes | Yes | No | Yes, using *-lrw-benbi[135] | Yes, using *-xts-plain | Yes, using --integrity mode[136] |
DriveCrypt | ? | ? | ? | ? | ? | ? |
DriveSentry GoAnywhere 2 | ? | ? | ? | ? | ? | ? |
E4M | ? | ? | ? | No | No | ? |
e-Capsule Private Safe | ? | ? | ? | ? | ? | ? |
eCryptfs | No | Yes | ? | No | No | ? |
EgoSecure HDD Encryption | No | Yes | No | No | No | ? |
FileVault | Yes[86] | No | No | No | No | ? |
FileVault 2 | No | No | No | No | Yes[137] | ? |
FREE CompuSec | Yes | No | No | No | No | ? |
FreeOTFE | Yes | Yes | No | Yes | Yes | No |
GBDE | No | No | Yes[91] | No | No | ? |
GELI | No | Yes[138] | No | No | Yes | ? |
Loop-AES | single-key, multi-key-v2 modes[93] | multi-key-v3 mode[93] | No | No | No | No |
McAfee Drive Encryption (SafeBoot) | No | Yes | No | No | No | ? |
n-Crypt Pro | ? | ? | No | No | No | ? |
PGPDisk | ? | ? | ? | ? | ? | ? |
Private Disk | No | Yes | No | No | No | ? |
ProxyCrypt | No | No | No | No | Yes | ? |
R-Crypto | ? | ? | ? | ? | ? | ? |
SafeGuard Easy | ? | ? | ? | ? | ? | ? |
SafeGuard Enterprise | ? | ? | ? | ? | ? | ? |
SafeGuard PrivateDisk | ? | ? | ? | ? | ? | ? |
SafeHouse Professional | Yes | No | No | No | No | ? |
Scramdisk | No | Yes | No | No | No | ? |
Scramdisk 4 Linux | No | Yes[139] | No | Yes[140] | Yes[141] | ? |
SecuBox | Yes | No | No | No | No | ? |
SecureDoc | ? | ? | ? | ? | ? | ? |
Sentry 2020 | ? | ? | ? | ? | ? | ? |
Seqrite Encryption Manager | No | Yes | No | Yes | Yes | ? |
Softraid / RAID C | ? | ? | ? | ? | Yes[142] | ? |
Svnd / Vnconfig | ? | ? | ? | ? | ? | ? |
Symantec Endpoint Encryption | No | No | Yes | No | No | ? |
TrueCrypt | Legacy support[132] | No | No | Legacy support[133] | Yes[143] | No |
USBCrypt | No | Yes | No | No | Yes | ? |
VeraCrypt | No | No | No | No | Yes | ? |
CyberSafe Top Secret | No | No | No | No | Yes | ? |
Name | CBC w/ predictable IVs | CBC w/ secret IVs | CBC w/ random per-sector keys | LRW | XTS | Authenticated encryption |
See also[edit]
Notes and references[edit]
- ^'Jetico Mission'. Jetico. Retrieved 2014-05-30.
- ^'Keyparc - Free Encryption for Everyone'. Bloombase. Retrieved 2014-11-28.
- ^Roland Dowdeswell (2002-10-04). 'CryptoGraphic Disk'. mailing list announcement. Retrieved 2007-01-14.
- ^'Protect guards laptop and desktop data'. Archived from the original on March 2, 2005. Retrieved 2008-09-03.
- ^Company and product name change to Pointsec 'Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc'. Archived from the original on 2004-08-20. Retrieved 2008-09-03.
- ^'Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent'. Archived from the original on 2008-08-20. Retrieved 2008-09-03.
- ^Niklas Lemcke (2014-12-15). 'Pre-Alpha testing started'. Retrieved 2014-12-24.
- ^'TrueCrypt License Version 3.0'. TrueCrypt Foundation. 2012-02-07. Retrieved 2014-12-24.
- ^Sarah Dean (2004-02-10). 'OTFEDB entry'. Archived from the original on 2008-12-11. Retrieved 2008-08-10.
- ^Initial cryptoloop patches for the Linux 2.5 development kernel: 'Archived copy'. Archived from the original on 2005-01-10. Retrieved 2006-12-24.CS1 maint: Archived copy as title (link)
- ^dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/
- ^Clemens Fruhwirth. 'LUKS version history'. Archived from the original on 2006-12-25. Retrieved 2006-12-24.
- ^SecurStar GmbH. 'DriveCrypt v5.8 Released'. Archived from the original on 2015-10-27. Retrieved 2015-10-26.
- ^'archived E4M documentation'. Archived from the original on 2000-05-24.
- ^'eCryptfs'. Retrieved 2008-04-29.
- ^Valient Gough (2003). 'EncFS - an Encrypted Filesystem'. README.md file. Retrieved 2007-01-14.
- ^'FreeOTFE version history'. Archived from the original on 2006-12-07. Retrieved 2006-12-24.
- ^'gbde(4) man page in FreeBSD 4.11'. GBDE manual page as it appeared in FreeBSD 4.11. Retrieved 2006-12-24.
- ^'geli(8) man page in FreeBSD 6.0'. GELI manual page as it first appeared in FreeBSD 6.0. Retrieved 2006-12-24.
- ^Release Notes. GnuPG
- ^'gocryptfs changelog on github'. Retrieved 2018-01-16.
- ^https://github.com/t-d-k/LibreCrypt/commit/a395620545beff7736427dfc3b508b4f67609396. Retrieved 2015-09-14.Missing or empty
|title=
(help) - ^'McAfee Drive Encryption'. product description. McAfee. Retrieved 2019-07-31.
- ^'PGP 6.0 Freeware released- any int'l links?'. Newsgroup: comp.security.pgp. Usenet:6sh4vm$jbf$1@news.cybercity.dk. Retrieved 2007-01-04.
- ^'Dekart Encryption software timeline'. Dekart.
- ^'SafeGuard Easy 4.5 Technical Whitepaper'(PDF). Utimaco. Retrieved 2009-08-10.
- ^'SafeGuard Enterprise Technical Whitepaper'(PDF). Utimaco. Retrieved 2009-08-10.
- ^Rebranded as ThinkVantage Client Security 'ThinkVantage Technologies Deployment Guide'(PDF). Lenovo. Retrieved 2008-03-05.[permanent dead link]
- ^'ScramDisk 4 Linux Releases'.
- ^'Sentry 2020 news'. Retrieved 2007-01-02.
- ^'OpenBSD 4.2 Changelog'.
- ^'OpenBSD 2.8 Changelog'.
- ^'bwalex/tc-play'. 2019-08-27.
- ^Trend Micro
- ^'Mobile Armor: Your Data.Secure. Everywhere'. 4 September 2004. Archived from the original on 4 September 2004.
- ^'TrueCrypt'.
- ^'TrueCrypt License Version 3.1'. TrueCrypt Foundation. 2014-05-28. Retrieved 2014-05-29.
- ^'VeraCrypt'.
- ^'Apache License 2.0'. IDRIX. 2015-06-28. Retrieved 2015-08-08.
- ^'Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy'.
- ^ ab[1] FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX
- ^'Archived copy'(PDF). Archived from the original(PDF) on 2015-09-23. Retrieved 2014-12-14.CS1 maint: Archived copy as title (link)
- ^[2] Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used
- ^ ab[3] Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system
- ^CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems
- ^[4] PocketPC freeware release- SmartPhone beta available
- ^ abc[5] FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes
- ^'Cryptomator - Free Cloud Encryption'.
- ^[6] FreeOTFE4PDA supports dm-crypt/LUKS volumes
- ^ ab'Safe - Protect Your Files'.
- ^ ab'Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS'.
- ^[7] libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes
- ^[8] Supports Linux volumes
- ^[9] Supports Linux volumes
- ^[10] Third party app allows a user to open LibreCrypt compatible LUKS containers
- ^'Endpoint Encryption Datasheet'. McAfee. Retrieved 2010-06-14.
- ^'Endpoint Encryption Powered by PGP Technology - Symantec'.
- ^[11] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used
- ^[12] Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
- ^[13] Hidden containers description from Jetico (BestCrypt)
- ^ abcSecret-containers and Camouflage files ArchiCrypt Live Description
- ^Supports 'Guest' keys
- ^Using 'Archicrypt Card'
- ^Supported by the BestCrypt container format; see BestCrypt SDK
- ^Supported by the BestCrypt Volume Encryption software
- ^With PIN or USB key
- ^BitLocker Drive Encryption: Value Add Extensibility Options
- ^ ab'BitLocker Drive Encryption Technical Overview'. Microsoft. Archived from the original on 2008-02-24. Retrieved 2008-03-13.
- ^Recovery keys only.
- ^ abcdRoland C. Dowdeswell, John Ioannidis. 'The CryptoGraphic Disk Driver'(PDF). CGD Design Paper. Retrieved 2006-12-24.
- ^Federico Biancuzzi (2005-12-21). 'Inside NetBSD's CGD'. interview with Roland Dowdeswell. ONLamp.com. Retrieved 2006-12-24.
- ^'Operating Systems Supported for System Encryption'(PDF). CipherShed Documentation. CipherShed Project. Retrieved 2014-12-27.
- ^Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
- ^ ab'Keyfiles'. TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 2014-05-28.
- ^ ab'Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?'. TrueCrypt FAQ. TrueCrypt Foundation. Archived from the original on 2013-04-16. Retrieved 2014-05-28.
- ^ ab'Future'. TrueCrypt Foundation. Retrieved 2014-05-24.[permanent dead link]
- ^'CryFS: How it works'. Retrieved 2016-09-23.
- ^ abcdm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted
- ^ ab'DiskCryptor Features'. Archived from the original on 2010-05-29. Retrieved 2010-05-25.
- ^ ab'DISK Protect Data Sheet'(PDF). Retrieved 2018-12-02.
- ^'cryptsetup Frequently Asked Questions'. Retrieved 2016-01-07.
- ^ abc'DriveCrypt features'. SecurStar GmbH. Retrieved 2007-01-03.
- ^ ab'Multi level access with separate access credentials, each enabling a different set of functional or logical operations'. EISST Ltd. Retrieved 2007-07-25.
- ^uses the lower filesystem (stacking)
- ^ ab'Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3'. Intel. Retrieved 2012-07-26.
- ^ abcdeJacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). 'Unlocking FileVault: An Analysis of Apple's disk encryption'(PDF). Retrieved 2012-01-03.
- ^ ab'Mac OS X 10.7 Lion: the Ars Technica review'. Ars Technica. 2011-07-20. Retrieved 2012-01-03.
- ^FreeOTFE has a modular architecture and set of components to allow 3rd party integration
- ^FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
- ^ abcd'FreeBSD Handbook: Encrypting Disk Partitions'. Retrieved 2006-12-24.
- ^ abcPoul-Henning Kamp. 'GBDE - GEOM Based Disk Encryption'(PDF). GBDE Design Document. Retrieved 2006-12-24.
- ^ ab'geli(8) man page in FreeBSD-current'. GELI manual page in current FreeBSD. Retrieved 2006-12-24.
- ^ abcdefghijkJari Ruusu. 'loop-AES README file'. Retrieved 2007-04-23.
- ^Using customization
- ^'McAfee Endpoint Encryption'(PDF). McAfee. Archived from the original(PDF) on 2010-12-17. Retrieved 2012-07-26.
- ^n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
- ^'PGP Whole Disk Encryption FAQ'. PGP Corporation. Retrieved 2006-12-24.
- ^PGP private keys are always protected by strengthened passphrases
- ^ ab'Embedded Security: Trusted Platform Module Technology Comes of Age'. Utimaco. Archived from the original on 2006-08-23. Retrieved 2008-03-04.
- ^'ThinkVantage Technologies Deployment Guide'(PDF). Lenovo. Retrieved 2008-03-05.
- ^ abFor Truecrypt containers
- ^ ab'SecureDoc Product Information'. WinMagic Inc. Archived from the original on 2008-03-13. Retrieved 2008-03-05.
- ^optional by using -K OpenBSD Manual Pages: vnconfig(8)
- ^'Endpoint Encryption'.
- ^'Solutions for Solid-State Drives (SSD) - Endpoint Encryption'. Archived from the original on 2014-11-29. Retrieved 2014-11-17.
- ^'Support for smart card readers - Endpoint Encryption'.
- ^ abc'Operating Systems Supported for System Encryption'. TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 2013-01-08. Retrieved 2014-05-28.
- ^Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
- ^'Operating Systems Supported for System Encryption'. VeraCrypt Documentation. IDRIX. Retrieved 2017-10-11.
- ^'Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy'. Archived from the original on 2009-08-29. Retrieved 2009-09-17.
- ^Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/
- ^dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
- ^yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
- ^Uses proprietary e-Capsule file system not exposed to the OS.
- ^ abnot technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
- ^http://macmarshal.com/images/Documents/mm_wp_102.pdf[permanent dead link]
- ^'Use FileVault to encrypt the startup disk on your Mac'.
- ^ abFile-based volume encryption is possible when used with mdconfig(8) utility.
- ^'Control Break International Debuts SafeBoot Version 4.27'. September 2004. Retrieved 2015-03-05.
- ^http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
- ^however, not Windows UEFI-based computers with a GUID partition table (GPT)
- ^LRW_issue
- ^Containers created with ArchiCrypt Live version 5 use LRW
- ^'New features in BestCrypt version 8'. Jetico. Archived from the original on 2007-02-04. Retrieved 2007-03-02.
- ^'New features in version 2'. Jetico. Archived from the original on 2008-09-05. Retrieved 2009-03-01.
- ^ abNiels Fergusson (August 2006). 'AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista'(PDF). Microsoft. Retrieved 2008-02-22.
- ^'man 4 cgd in NetBSD-current'. NetBSD current manual page on CGD. 2006-03-11. Retrieved 2006-12-24.
- ^ abContainers created with TrueCrypt versions 1.0 through 4.0 use CBC.
- ^ abContainers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
- ^Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.
- ^Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/
- ^'cryptsetup - manage plain dm-crypt and LUKS encrypted volumes'. 2018-01-01. Retrieved 2018-05-08.
- ^'OS X Lion: About FileVault 2'. Retrieved 2011-01-03.
- ^'Linux/BSD disk encryption comparison'. Archived from the original on 2007-06-29. Retrieved 2006-12-24.
- ^For Scramdisk containers
- ^For Truecrypt 4 containers
- ^For Truecrypt 5 and 6 containers
- ^''CVS: cvs.openbsd.org: src' - MARC'.
- ^Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.
External links[edit]
- DiskCryptor vs Truecrypt - Comparison in between DiskCryptor and Truecrypt
- Buyer's Guide to Full Disk Encryption - Overview of full-disk encryption, how it works, and how it differs from file-level encryption—plus an overview of leading full-disk encryption software.