Skip to content
Surf Wiki
Save to docs
technology/cryptography

From Surf Wiki (app.surf) — the open knowledge base

Comparison of disk encryption software

None


None

This is a technical feature comparison of different disk encryption software.

Background information

NameDeveloperFirst releasedLicensingMaintained?Aloaha Crypt DiskArchiCrypt LiveBestCryptBitArmor DataControlBitLockerBloombase StoreSafeBoxcryptorCGDCenterTools DriveLockCheck Point Full Disk EncryptionCipherShedCrossCryptCryFSCryhodCryptainerCryptic DiskCryptArchiverCryptoloopCryptomatorCryptoPro Secure Disk EnterpriseCryptoPro Secure Disk for BitLockerCryptSyncDiscryptorDiskCryptorDISK ProtectCryptsetup / DmsetupDm-crypt / LUKSDriveSentry GoAnywhere 2E4Me-Capsule Private SafeeCryptfsEgoSecure HDD EncryptionEncFSEncryptStickFileVaultFileVault 2FREE CompuSecFreeOTFEGBDEGELIGnuPGgocryptfsKnoxKryptOSLibreCryptLoop-AESMcAfee Drive Encryption (SafeBoot)n-Crypt ProPGPDiskPrivate DiskProxyCryptR-CryptoSafeGuard EasySafeGuard EnterpriseSafeGuard PrivateDiskSafeHouse ProfessionalScramdiskScramdisk 4 LinuxSecuBoxSECUDE Secure NotebookSeqrite Encryption ManagerSentry 2020Softraid / RAID CSpyProof!Svnd / VnconfigSymantec Endpoint EncryptionTcplayTrend Micro Endpoint Encryption (Mobile Armor)TrueCryptUSBCryptVeraCryptCyberSafe Top SecretNameDeveloperFirst releasedLicensingMaintained?
Aloaha2008
Softwaredevelopment Remus ArchiCrypt1998
Jetico1993
BitArmor Systems Inc.2008-05
Microsoft2006
Bloombase2012
Secomba GmbH2011
Roland C. Dowdeswell2002-10-04
CenterTools2008
Check Point Software Technologies Ltdtitle=Protect guards laptop and desktop dataurl=http://www.infoworld.com/cgi-bin/displayArchive.pl?/99/25/c05-25.48.htmaccess-date=2008-09-03url-status=deadarchive-url=https://web.archive.org/web/20050302202315/http://www.infoworld.com/cgi-bin/displayArchive.pl?%2F99%2F25%2Fc05-25.48.htmarchive-date=March 2, 2005 }}
CipherShed Project2014
Steven Scherrer2004-02-10
Sebastian Messmer2015
Prim'X Technologies2010
Cypherix Software1998
Exlade2003
WinEncrypt
2003-07-02
Skymatic UG (limited liability)2016-03-09
cpsd it-services GmbH2010
cpsd it-services GmbH2012
Stefan Küng2012
Cosect Ltd.2008
ntldr, David Xanatos2007
Becrypt Ltd2001
Christophe Saout2004-03-11
Clemens Fruhwirth (LUKS)2005-02-05
DriveSentry2008
Paul Le Roux1998-12-18
EISST Ltd.2005
Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow)2005
EgoSecure GmbH2006
Valient Gough2003
ENC Security Systems2009
Apple Inc.2003-10-24
Apple Inc.2011-07-20
CE-Infosys2002
Sarah Dean2004-10-10
Poul-Henning Kamp2002-10-19
Pawel Jakub Dawidek2005-04-11
Werner Koch1999-09-07
Jakob Unterwurzacher2015-10-07
AgileBits2010
The MorphOS Development Team2010
tdk2014-06-19
Jari Ruusu2001-04-11
McAfee, LLC2007
n-Trance Security Ltd2005
PGP Corporation (acquired by Symantec in 2010)1998-09-01
Dekart1993
v772013
R-Tools Technology Inc2008
Sophos (Utimaco)1993
Sophos (Utimaco)2007
url=ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdfserver=Lenovourl-status=deadtitle=ThinkVantage Technologies Deployment Guideaccess-date=2008-03-05}}2000
PC Dynamics, Inc.1992
Shaun Hollingworth1997-07-01
Hans-Ulrich Juettner2005-08-06
Aiko Solutions2007-02-19
SECUDE2003
Quick Heal Technologies Ltd.2017
SoftWinter1998
OpenBSD2007-11-01
Information Security Corp.2002
OpenBSD2000-12-01
Symantec Corporation2008
Alex Hornung2012-01-28
Trend Micro2004 or earlier
TrueCrypt Foundation2004-02-02
WinAbility Software Corp.2010
IDRIX2013-06-22
CyberSoft2013

Operating systems

NameAndroidWindows NTiOSMac OS XLinuxFreeBSDOpenBSDNetBSDAloaha Crypt DiskBestCrypt Volume EncryptionBitArmor DataControlBitLockerBloombase StoreSafeBoxcryptorCenterTools DriveLockCGDCheck Point Full Disk EncryptionCipherShedCrossCryptCryFSCryhodCryptainerCryptArchiverCryptic DiskCryptoloopCryptomatorCryptoPro Secure Disk EnterpriseCryptoPro Secure Disk for BitLockerCryptsetup / DmsetupCryptSyncDiscryptorDiskCryptorDISK ProtectDm-crypt / LUKSDriveSentry GoAnywhere 2E4Me-Capsule Private SafeeCryptfsEgoSecure HDD EncryptionEncFSEncryptStickEncryptUSBFileVaultFileVault 2FREE CompuSecFreeOTFEGBDEGELIKnoxLibreCryptLoop-AESMcAfee Drive Encryption (SafeBoot)n-Crypt ProPGPDiskPGP Whole Disk EncryptionPrivate DiskProxyCryptR-CryptoSafeGuard EasySafeGuard EnterpriseSafeGuard PrivateDiskSafeHouse ProfessionalScramdiskScramdisk 4 LinuxSecuBoxSecureDocSentry 2020Seqrite Volume EncryptionSoftraid / RAID CSpyProof!Svnd / VnconfigSymantec Endpoint EncryptionTcplayTrend Micro Endpoint EncryptionTrueCryptUSBCryptVeraCryptCyberSafe Top SecretNameAndroidWindows NTiOSMac OS XLinuxFreeBSDOpenBSDNetBSD
url=http://www.cryptomator.orgtitle = Cryptomator - Free Cloud Encryption}}
url=https://www.boxcryptor.com/title=Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS}}url=http://www.getsafe.org/title=Safe - Protect Your Filesaccess-date=2016-03-29archive-url=https://web.archive.org/web/20160421064348/http://www.getsafe.org/archive-date=2016-04-21url-status=dead}}(FUSE)(FUSE)(FUSE)(FUSE)

Features

  • Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others.
  • Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
  • Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.
  • Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.
  • Multiple keys: Whether an encrypted volume can have more than one active key.
  • Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2 or Argon2.
  • Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.
  • Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.
  • Filesystems: What filesystems are supported.
  • Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11)
NameHidden containersPre-boot authenticationSingle sign-onCustom authenticationMultiple keysPassphrase strengtheningHardware accelerationTPMFilesystemsTwo-factor authenticationAloaha Secure StickArchiCrypt LiveBestCryptBitArmor DataControlBitLockerBloombase StoreSafeCGDCenterTools DriveLockCheck Point Full Disk EncryptionCipherShedCryFSCrossCryptCryptArchiverCryptic DiskCryhodCryptoloopCryptomatorCryptoPro Secure Disk EnterpriseCryptoPro Secure Disk for BitLockerCryptsetup / DmsetupDiskCryptorDISK ProtectDm-crypt / LUKSDriveSentry GoAnywhere 2E4Me-Capsule Private SafeeCryptfsEgoSecure HDD EncryptionEncryptUSBFileVaultFileVault 2FREE CompuSecFreeOTFEGBDEGELILoop-AESMcAfee Drive Encryption (SafeBoot)n-Crypt ProPGPDiskPrivate DiskProxyCryptR-CryptoSafeGuard EasySafeGuard EnterpriseSafeGuard PrivateDiskSafeHouse ProfessionalScramdiskScramdisk 4 LinuxSecuBoxSecureDocSeqrite Encryption ManagerSentry 2020Softraid / RAID CSvnd / VnconfigSymantec Endpoint EncryptionTrend Micro Endpoint EncryptionTrueCryptVeraCryptCyberSafe Top SecretNameHidden containersPre-boot authenticationSingle sign-onCustom authenticationMultiple keysPassphrase strengtheningHardware accelerationTPMFilesystemsTwo-factor authentication
url=https://web.archive.org/web/20110824163518/http://www.archicrypt-shop.com/ArchiCrypt-Live.htmdate=2011-08-24 }}
url=http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=truetitle=BitLocker Drive Encryption Technical Overviewpublisher=Microsoftaccess-date=2008-03-13url-status=deadarchive-url=https://web.archive.org/web/20080224023214/http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=truearchive-date=2008-02-24}}
author=Roland C. Dowdeswell, John Ioannidistitle=The CryptoGraphic Disk Driverjournal=CGD Design Paperurl=http://www.imrryr.org/~elric/cgd/cgd.pdfaccess-date=2006-12-24 }}author=Federico Biancuzzidate=2005-12-21title=Inside NetBSD's CGDwork=interview with Roland Dowdeswellurl=http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1publisher=ONLamp.comaccess-date=2006-12-24archive-date=2007-09-29archive-url=https://web.archive.org/web/20070929091538/http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1url-status=dead }}
(limited to one per
"outer" container)title=Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?work=TrueCrypt FAQpublisher=TrueCrypt Foundationurl=http://www.truecrypt.org/faq#tpmarchive-url=https://archive.today/20130416052646/http://www.truecrypt.org/faqurl-status=deadarchive-date=2013-04-16access-date=2014-05-28 }}
title=DiskCryptor Featuresurl=http://diskcryptor.net/wiki/Main_Page/enaccess-date=2010-05-25url-status=deadarchive-url=https://web.archive.org/web/20100529120057/http://diskcryptor.net/wiki/Main_Page/enarchive-date=2010-05-29 }}
title=DISK Protect Data Sheeturl=https://www.becrypt.com/uk/uploads/files/Disk%20Protect%20Standard_.pdfaccess-date=2018-12-02 }}
title=Multi level access with separate access credentials, each enabling a different set of functional or logical operationspublisher=EISST Ltd.url=http://www.eisst.com/products/private_safe/compare/access-date=2007-07-25archive-date=2007-09-28archive-url=https://web.archive.org/web/20070928145451/http://www.eisst.com/products/private_safe/compare/url-status=dead }}
url=http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-aes-instructions-set/title=Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3publisher=Intelaccess-date=2012-07-26}}
author=Jacob Appelbaum, Ralf-Philipp Weinmanndate=2006-12-29title=Unlocking FileVault: An Analysis of Apple's disk encryptionurl=https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdfaccess-date=2012-01-03 }}?
url=https://arstechnica.com/apple/reviews/2011/07/mac-os-x-10-7.ars/13title= Mac OS X 10.7 Lion: the Ars Technica reviewwebsite=Ars Technicadate=2011-07-20access-date=2012-01-03 }}
title=FreeBSD Handbook: Encrypting Disk Partitionsurl=http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.htmlaccess-date=2006-12-24 }}author=Poul-Henning Kamptitle=GBDE - GEOM Based Disk Encryptionjournal=GBDE Design Documenturl=http://phk.freebsd.dk/pubs/bsdcon-03.gbde.paper.pdfaccess-date=2006-12-24author-link=Poul-Henning Kamp }}
title=geli(8) man page in FreeBSD-currentwork=GELI manual page in current FreeBSDurl=http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+7-current&format=htmlaccess-date=2006-12-24 }}
author=Jari Ruusutitle=loop-AES README fileurl=https://loop-aes.sourceforge.net/loop-AES.READMEaccess-date=2007-04-23archive-date=2023-08-23archive-url=https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.READMEurl-status=dead }}
url=http://www.mcafee.com/us/resources/data-sheets/ds-endpoint-encryption.pdftitle=McAfee Endpoint Encryptionpublisher=McAfeeaccess-date=2012-07-26url-status=deadarchive-url=https://web.archive.org/web/20101217175911/http://mcafee.com/us/resources/data-sheets/ds-endpoint-encryption.pdfarchive-date=2010-12-17}}
title=PGP Whole Disk Encryption FAQpublisher=PGP Corporationurl=http://www.pgp.com/products/wholediskencryption/faq.htmlaccess-date=2006-12-24archive-date=2006-12-24archive-url=https://web.archive.org/web/20061224231228/http://www.pgp.com/products/wholediskencryption/faq.htmlurl-status=dead }}
url=http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.htmltitle=Embedded Security: Trusted Platform Module Technology Comes of Agepublisher=Utimacoaccess-date=2008-03-04url-status=deadarchive-url=https://web.archive.org/web/20060823075648/http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.htmlarchive-date=2006-08-23}}
url=http://download.lenovo.com/ibmdl/pub/pc/pccbbs/thinkcentre_pdf/rr30mst.pdftitle=ThinkVantage Technologies Deployment Guidepublisher=Lenovoaccess-date=2008-03-05}}
title=SecureDoc Product Informationpublisher=WinMagic Inc.url=http://www.winmagic.com/solutions/securedoc.htmlaccess-date=2008-03-05archive-url=https://web.archive.org/web/20080313174257/http://www.winmagic.com/solutions/securedoc.htmlarchive-date=2008-03-13url-status=dead }}
(limited to one per
"outer" container)
(limited to one per
"outer" container)

Layering

  • Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table.
  • Partition: Whether individual disk partitions can be encrypted.
  • File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
  • Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.
  • Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
NameWhole diskPartitionFileSwap spaceHibernation fileRAIDAloaha Secure StickArchiCrypt LiveBestCryptBitArmor DataControlBitLockerBloombase StoreSafeCenterTools DriveLockCGDCheck Point Full Disk EncryptionCipherShedCrossCryptCryFSCryptArchiverCryptic DiskCryhodCryptoloopCryptomillCryptoPro Secure Disk EnterpriseCryptoPro Secure Disk for BitLockerDiskCryptorDisk ProtectDm-crypt / LUKSDriveSentry GoAnywhere 2E4Me-Capsule Private SafeeCryptfsEgoSecure HDD EncryptionEncryptUSBFileVaultFileVault 2FREE CompuSecFreeOTFEGBDEGELILoop-AESMcAfee Drive Encryption (SafeBoot)n-Crypt ProPGPDiskPrivate DiskProxyCryptR-CryptoSafeGuard EasySafeGuard EnterpriseSafeGuard PrivateDiskSafeHouse ProfessionalScramdiskScramdisk 4 LinuxSecuBoxSentry 2020Seqrite Encryption ManagerSoftraid / RAID CSvnd / VnconfigSpyProof!Symantec Endpoint EncryptionTrend Micro Endpoint EncryptionTrueCryptVeraCryptCyberSafe Top SecretNameWhole diskPartitionFileSwap spaceHibernation fileRAID
(except for the boot volume)
(except for the boot volume)
(parent volume is encrypted)
(parent volume is encrypted)
(parent volume is encrypted)
(add-on Secure Device)
date=August 2017bot=InternetArchiveBotfix-attempted=yes }}
url=http://support.apple.com/kb/HT4790?viewlocale=en_US&locale=en_UStitle=Use FileVault to encrypt the startup disk on your Mac}}
(except for the boot volume)
mdconfig(8)}}] utility.
title=Control Break International Debuts SafeBoot Version 4.27date=September 2004url=http://connection.ebscohost.com/c/articles/14197489/control-break-international-debuts-safeboot-version-4-27archive-url=https://web.archive.org/web/20150402092906/http://connection.ebscohost.com/c/articles/14197489/control-break-international-debuts-safeboot-version-4-27url-status=deadarchive-date=2015-04-02access-date=2015-03-05}}
(encrypted by default in OpenBSD)
(encrypted by default in OpenBSD)

Modes of operation

Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.

  • CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
  • CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
  • CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
  • LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.
  • XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
  • Authenticated encryption: Protection against ciphertext modification by an attacker
NameCBC w/ predictable IVsCBC w/ secret IVsCBC w/ random per-sector keysLRWXTSAuthenticated encryptionAloaha Crypt DiskArchiCrypt LiveBestCryptBitArmor DataControlBitLockerBloombase StoreSafeCGDCenterTools DriveLockCheck Point Full Disk EncryptionCipherShedCrossCryptCryFSCryptArchiverCryptic DiskCryhodCryptoloopDiskCryptorDm-crypt / LUKSDriveSentry GoAnywhere 2E4Me-Capsule Private SafeeCryptfsEgoSecure HDD EncryptionFileVaultFileVault 2FREE CompuSecFreeOTFEGBDEGELILoop-AESMcAfee Drive Encryption (SafeBoot)n-Crypt ProPGPDiskPrivate DiskProxyCryptR-CryptoSafeGuard EasySafeGuard EnterpriseSafeGuard PrivateDiskSafeHouse ProfessionalScramdiskScramdisk 4 LinuxSecuBoxSecureDocSentry 2020Seqrite Encryption ManagerSoftraid / RAID CSvnd / VnconfigSymantec Endpoint EncryptionTrueCryptUSBCryptVeraCryptCyberSafe Top SecretNameCBC w/ predictable IVsCBC w/ secret IVsCBC w/ random per-sector keysLRWXTSAuthenticated encryption
author=Niels Fergussontitle=AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vistaaccess-date=2008-02-22publisher=Microsoftdate=August 2006url=http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf}}
{{yesYes, using `--integrity` mode{{cite weburl = https://man.cx/?page=cryptsetup(8)title = cryptsetup - manage plain dm-crypt and LUKS encrypted volumesaccess-date = 2018-05-08
title=Linux/BSD disk encryption comparisonurl=http://mareichelt.de/pub/notmine/linuxbsd-comparison.htmlaccess-date=2006-12-24url-status=deadarchive-url=https://web.archive.org/web/20070629214031/http://mareichelt.de/pub/notmine/linuxbsd-comparison.htmlarchive-date=2007-06-29 }}{{yesYes, using `-a` option{{cite weburl = https://docs.freebsd.org/cgi/getmsg.cgi?fetch=326862+0+archive/2006/freebsd-current/20060611.freebsd-currenttitle = Data authentication for geli(8) committed to HEAD.author = Pawel Jakub Dawidekdate = 2006-06-08access-date = 2021-11-22

References

  1. "Jetico Mission". Jetico.
  2. "Bloombase StoreSafe". Bloombase.
  3. Roland Dowdeswell. (2002-10-04). "CryptoGraphic Disk". mailing list announcement.
  4. "Protect guards laptop and desktop data".
  5. "Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc.".
  6. "Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent".
  7. Niklas Lemcke. (2014-12-15). "Pre-Alpha testing started".
  8. (2012-02-07). "TrueCrypt License Version 3.0". TrueCrypt Foundation.
  9. Sarah Dean. (2004-02-10). "OTFEDB entry".
  10. "Archived copy".
  11. "Home".
  12. "Releases · DavidXanatos/DiskCryptor".
  13. dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/
  14. Clemens Fruhwirth. "LUKS version history".
  15. "archived E4M documentation".
  16. "eCryptfs".
  17. Valient Gough. (2003). "EncFS - an Encrypted Filesystem". README.md file.
  18. "FreeOTFE version history".
  19. "gbde(4) man page in FreeBSD 4.11". GBDE manual page as it appeared in FreeBSD 4.11.
  20. "geli(8) man page in FreeBSD 6.0". GELI manual page as it first appeared in FreeBSD 6.0.
  21. [https://gnupg.org/download/release_notes.html Release Notes. GnuPG]
  22. "gocryptfs changelog on github".
  23. (2014-06-20). "as received from FreeOTFE version v5.21 with small changes".
  24. "McAfee Drive Encryption". McAfee.
  25. "PGP 6.0 Freeware released- any int'l links?".
  26. "Dekart Encryption software timeline". Dekart.
  27. "SafeGuard Easy 4.5 Technical Whitepaper". Utimaco.
  28. "SafeGuard Enterprise Technical Whitepaper". Utimaco.
  29. "ThinkVantage Technologies Deployment Guide".
  30. "ScramDisk 4 Linux Releases".
  31. "Sentry 2020 news".
  32. "OpenBSD 4.2 Changelog".
  33. "OpenBSD 2.8 Changelog".
  34. (2019-08-27). "bwalex/tc-play".
  35. (2023-04-03). "bwalex/tc-play". Github.
  36. [[Trend Micro]]
  37. (4 September 2004). "Mobile Armor: Your Data.Secure. Everywhere.".
  38. "TrueCrypt".
  39. (2014-05-28). "TrueCrypt License Version 3.1". TrueCrypt Foundation.
  40. "VeraCrypt".
  41. (2015-06-28). "Apache License 2.0". IDRIX.
  42. "Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy".
  43. https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX. In addition cryptsetup and Linux 5.6+ can open bitlocker volumes (except volumes with legacy header used in Windows Vista or partially decrypted volumes) with either a password, a recovery passphrase, a startup key, or the volume key.
  44. "Archived copy".
  45. https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system
  46. http://www.truecrypt.org/misc/freebsd Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used
  47. CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems
  48. http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/[[cryptsetup]]/[[dmsetup]], and dm-crypt/LUKS volumes
  49. "Cryptomator - Free Cloud Encryption".
  50. "Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS".
  51. "Safe - Protect Your Files".
  52. https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes. In addition cryptsetup also has partial FileVault2 support: it can open FileVault2 volumes with Core Storage and HFS+ filesystem, with a password.
  53. http://www.freeotfe.org/docs/Main/Linux_volumes.htm Supports Linux volumes
  54. https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB Third party app allows a user to open LibreCrypt compatible LUKS containers
  55. https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes
  56. "Endpoint Encryption Powered by PGP Technology - Symantec".
  57. http://www.truecrypt.org/misc/freebsd Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used
  58. https://play.google.com/store/apps/details?id=com.sovworks.eds.android Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
  59. https://apps.apple.com/de/app/disk-decipher/id516538625 Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
  60. http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm Hidden containers description from Jetico (BestCrypt)
  61. Secret-containers and Camouflage files [http://www.archicrypt-shop.com/ArchiCrypt-Live.htm ArchiCrypt Live Description] {{Webarchive. link. (2011-08-24)
  62. Supports "Guest" keys
  63. Using "Archicrypt Card"
  64. Supported by the BestCrypt container format; see BestCrypt SDK
  65. Supported by the BestCrypt Volume Encryption software
  66. With PIN or USB key
  67. [http://download.microsoft.com/download/a/f/7/af7777e5-7dcd-4800-8a0a-b18336565f5b/BitLockerExt.doc BitLocker Drive Encryption: Value Add Extensibility Options]
  68. Recovery keys only.
  69. "BitLocker Drive Encryption Technical Overview". [[Microsoft]].
  70. Roland C. Dowdeswell, John Ioannidis. "The CryptoGraphic Disk Driver". CGD Design Paper.
  71. Federico Biancuzzi. (2005-12-21). "Inside NetBSD's CGD". ONLamp.com.
  72. "Operating Systems Supported for System Encryption". CipherShed Project.
  73. Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (''cf.'' TrueCrypt FAQ: ''[http://www.truecrypt.org/faq Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?]'')
  74. "Keyfiles". TrueCrypt Foundation.
  75. "Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?". TrueCrypt Foundation.
  76. (November 2016). "Future". TrueCrypt Foundation.
  77. "CryFS: How it works".
  78. dm-crypt and cryptoloop volumes can be mounted from the [[initrd]] before the system is booted
  79. "DiskCryptor Features".
  80. (10 February 2022). "DiskCryptor".
  81. "DISK Protect Data Sheet".
  82. "cryptsetup Frequently Asked Questions".
  83. "Multi level access with separate access credentials, each enabling a different set of functional or logical operations". EISST Ltd..
  84. uses the lower filesystem (stacking)
  85. "Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3". Intel.
  86. Jacob Appelbaum, Ralf-Philipp Weinmann. (2006-12-29). "Unlocking FileVault: An Analysis of Apple's disk encryption".
  87. (2011-07-20). "Mac OS X 10.7 Lion: the Ars Technica review".
  88. FreeOTFE has a modular architecture and set of components to allow 3rd party integration
  89. FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
  90. "FreeBSD Handbook: Encrypting Disk Partitions".
  91. Poul-Henning Kamp. "GBDE - GEOM Based Disk Encryption". GBDE Design Document.
  92. "geli(8) man page in FreeBSD-current". GELI manual page in current FreeBSD.
  93. Jari Ruusu. "loop-AES README file".
  94. Using customization
  95. "McAfee Endpoint Encryption". McAfee.
  96. n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
  97. "PGP Whole Disk Encryption FAQ". PGP Corporation.
  98. PGP private keys are always protected by strengthened passphrases
  99. "Embedded Security: Trusted Platform Module Technology Comes of Age". Utimaco.
  100. "ThinkVantage Technologies Deployment Guide". [[Lenovo]].
  101. For TrueCrypt containers
  102. "SecureDoc Product Information". WinMagic Inc..
  103. optional by using -K [https://man.openbsd.org/mount_vnd.8#K OpenBSD Manual Pages: vnconfig(8)]
  104. "Endpoint Encryption".
  105. "Solutions for Solid-State Drives (SSD) - Endpoint Encryption".
  106. "Support for smart card readers - Endpoint Encryption".
  107. "Operating Systems Supported for System Encryption". TrueCrypt Foundation.
  108. Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (''cf.'' TrueCrypt FAQ: ''[http://www.truecrypt.org/faq Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?]'')
  109. "Operating Systems Supported for System Encryption". IDRIX.
  110. BitLocker can be used with a TPM PIN + external USB key for two-factor authentication
  111. Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, [[Windows Vista]] and later are limited to be installable only on NTFS volumes
  112. An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the [[standard input]]
  113. The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. https://www.zdnet.com/article/truecrypt-quits-inexplicable/
  114. "Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy".
  115. Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/
  116. dm-crypt can encrypt a file-based volume when used with the {{mono. losetup utility included with all major Linux distributions
  117. yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
  118. Uses proprietary e-Capsule file system not exposed to the OS.
  119. not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
  120. http://macmarshal.com/images/Documents/mm_wp_102.pdf{{dead link. (August 2017)
  121. "Use FileVault to encrypt the startup disk on your Mac".
  122. mdconfig(8)] utility.
  123. (September 2004). "Control Break International Debuts SafeBoot Version 4.27".
  124. http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
  125. however, [http://www.truecrypt.org/future not Windows UEFI-based computers with a GUID partition table (GPT)]
  126. [[IEEE P1619#LRW issue. LRW_issue]]
  127. Containers created with ArchiCrypt Live version 5 use LRW
  128. "New features in BestCrypt version 8". Jetico.
  129. "New features in version 2". Jetico.
  130. Niels Fergusson. (August 2006). "AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista". [[Microsoft]].
  131. (2006-03-11). "man 4 cgd in NetBSD-current". NetBSD current manual page on CGD.
  132. Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
  133. Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
  134. Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.
  135. "CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+".
  136. Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/
  137. "OS X Lion: About FileVault 2".
  138. "Linux/BSD disk encryption comparison".
  139. For Scramdisk containers
  140. For TrueCrypt 4 containers
  141. For TrueCrypt 5 and 6 containers
  142. "'CVS: cvs.openbsd.org: src' - MARC".
  143. Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.
  144. and
  145. [[Jacob Appelbaum]]. "Modern Disk Encryption Systems".
Info: Wikipedia Source

This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.

Want to explore this topic further?

Ask Mako anything about Comparison of disk encryption software — get instant answers, deeper analysis, and related topics.

Research with Mako

Free with your Surf account

Content sourced from Wikipedia, available under CC BY-SA 4.0.

This content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.

Report