Jump to content

Comparison of disk encryption software: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Opshop.pm (talk | contribs)
Tags: Mobile edit Mobile web edit
 
(31 intermediate revisions by 20 users not shown)
Line 1: Line 1:
{{short description|None}}

This is a technical feature '''comparison of different [[disk encryption software]]'''.
This is a technical feature '''comparison of different [[disk encryption software]]'''.
<!-- NB! Please do ''not'' add a table comparing support for different encryption algorithms, as almost all encryption software supports all popular algorithms, and such a table would be useless for practical information. If you disagree, you are welcome to discuss on the talk page. -->
<!-- NB! Please do ''not'' add a table comparing support for different encryption algorithms, as almost all encryption software supports all popular algorithms, and such a table would be useless for practical information. If you disagree, you are welcome to discuss on the talk page. -->
Line 42: Line 44:
|-
|-
!{{Rh}}| Bloombase StoreSafe
!{{Rh}}| Bloombase StoreSafe
| Bloombase
| [https://www.bloombase.com/ Bloombase]
| 2012
| 2012
| {{Proprietary}}
| {{Proprietary}}
Line 51: Line 53:
| 2011
| 2011
| {{Proprietary}}
| {{Proprietary}}
| {{yes}}
| {{no}}
|-
|-
!{{Rh}}| CGD
!{{Rh}}| CGD
Line 97: Line 99:
!{{Rh}}| Cryptainer
!{{Rh}}| Cryptainer
| Cypherix Software
| Cypherix Software
| 1999
| 1998
| {{Proprietary}}
| {{Proprietary}}
| {{yes}}
| {{yes}}
Line 119: Line 121:
| {{no}}
| {{no}}
|-
|-
!{{Rh}}| Cryptomator
!{{Rh}}| [[Cryptomator]]
| Skymatic UG (haftungsbeschränkt)
| Skymatic UG (haftungsbeschränkt)
| 2016-03-09<ref>http://www.cryptomator.org/</ref>
| 2016-03-09<ref>{{cite web |url=http://www.cryptomator.org/ |title=Home |website=cryptomator.org}}</ref>
| {{free|[[GPLv3]]}}
| {{free|[[GPLv3]]}}
| {{yes}}
| {{yes}}
Line 140: Line 142:
| Stefan Küng
| Stefan Küng
| 2012
| 2012
| {{free|[[Gpl v2]]}}
| {{free|[[GPL v2]]}}
| {{yes}}
| {{yes}}
|-
|-
Line 153: Line 155:
| 2007
| 2007
| {{free|[[GNU General Public License|GPL]]}}
| {{free|[[GNU General Public License|GPL]]}}
| {{yes}}<ref>{{Cite web|url=https://github.com/DavidXanatos/DiskCryptor/releases|title = Releases · DavidXanatos/DiskCryptor|website = [[GitHub]]}}</ref>
| {{no}}<ref>{{Cite web|url=https://github.com/DavidXanatos/DiskCryptor/releases|title = Releases · DavidXanatos/DiskCryptor|website = [[GitHub]]}}</ref>
|-
|-
!{{Rh}}| DISK Protect
!{{Rh}}| DISK Protect
Line 172: Line 174:
| {{free|[[GNU General Public License|GPL]]}}
| {{free|[[GNU General Public License|GPL]]}}
| {{yes}}
| {{yes}}
|-
!{{Rh}}| [https://www.securstar.com/en/drivecrypt.html DriveCrypt]
| SecurStar GmbH
| 2001
| {{Proprietary}}
| {{yes}}<ref>{{cite web |author=SecurStar GmbH |title=DriveCrypt v5.8 Released |url=https://www.securstar.com/en/drivecrypt.html |access-date=2015-10-26 |archive-url=https://web.archive.org/web/20151027223747/https://www.securstar.com/en/drivecrypt.html |archive-date=2015-10-27 |url-status=dead }}</ref>
|-
|-
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
Line 213: Line 209:
| 2003<ref>{{cite web |author=Valient Gough |date=2003 |title= EncFS - an Encrypted Filesystem |work=README.md file |url=https://github.com/vgough/encfs |access-date=2007-01-14 }}</ref>
| 2003<ref>{{cite web |author=Valient Gough |date=2003 |title= EncFS - an Encrypted Filesystem |work=README.md file |url=https://github.com/vgough/encfs |access-date=2007-01-14 }}</ref>
| {{free|[[GNU Lesser General Public License|LGPLv3]]}}
| {{free|[[GNU Lesser General Public License|LGPLv3]]}}
| {{yes}}
| {{no}}
|-
|-
!{{Rh}}| EncryptStick
!{{Rh}}| EncryptStick
| ENC Security Systems
| ENC Security Systems
| 2009
| 2009
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| EncryptUSB
| ClevX
| 2016
| {{Proprietary}}
| {{Proprietary}}
| {{yes}}
| {{yes}}
Line 308: Line 298:
| n-Trance Security Ltd
| n-Trance Security Ltd
| 2005
| 2005
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| [https://netlibsecurity.com/ NetLib Encryptionizer (directory encryption)]
| NetLib Security
| 1987
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| [https://www.nodrive.cloud/ Nodrive (Virtual Encrypted Disk)]
| Hidden Solutions
| 2018
| {{Proprietary}}
| {{Proprietary}}
| {{yes}}
| {{yes}}
Line 360: Line 338:
|-
|-
!{{Rh}}| SafeGuard PrivateDisk
!{{Rh}}| SafeGuard PrivateDisk
| [[Sophos]] (Utimaco)<ref name="LenovoPrivateDisk">Rebranded as ThinkVantage Client Security {{cite web|url=ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|title=ThinkVantage Technologies Deployment Guide|publisher=[[Lenovo]]|access-date=2008-03-05}}{{dead link|date=August 2017 |bot=InternetArchiveBot |fix-attempted=yes }}</ref>
| [[Sophos]] (Utimaco)<ref name="LenovoPrivateDisk">Rebranded as ThinkVantage Client Security {{cite web|url=ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|title=ThinkVantage Technologies Deployment Guide|publisher=[[Lenovo]]|access-date=2008-03-05}}{{dead link|date=August 2024|bot=medic}}{{cbignore|bot=medic}}</ref>
| 2000
| 2000
| {{Proprietary}}
| {{Proprietary}}
Line 392: Line 370:
| SECUDE
| SECUDE
| 2003
| 2003
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| SecureDoc
| [https://www.winmagic.com WinMagic Inc.]
| 1997
| {{Proprietary}}
| {{Proprietary}}
| {{yes}}
| {{yes}}
Line 441: Line 413:
| 2012-01-28<ref>{{cite web|url=https://github.com/bwalex/tc-play/releases|title=bwalex/tc-play|website=[[GitHub]]|date=2019-08-27}}</ref>
| 2012-01-28<ref>{{cite web|url=https://github.com/bwalex/tc-play/releases|title=bwalex/tc-play|website=[[GitHub]]|date=2019-08-27}}</ref>
| {{free|[[BSD licenses|BSD]]}}
| {{free|[[BSD licenses|BSD]]}}
| {{no}}<ref>Last update: 2020-03-02 {{cite web|publisher = Github | title = bwalex/tc-play | url=https://github.com/bwalex/tc-play|date=2023-04-03}}</ref>
| {{yes}}
|-
|-
!{{Rh}}| [[Trend Micro]] Endpoint Encryption (Mobile Armor)
!{{Rh}}| [[Trend Micro]] Endpoint Encryption (Mobile Armor)
Line 464: Line 436:
| IDRIX
| IDRIX
| 2013-06-22<ref>{{cite web|url=https://veracrypt.codeplex.com/SourceControl/list/changesets?page=8|title=VeraCrypt}}</ref>
| 2013-06-22<ref>{{cite web|url=https://veracrypt.codeplex.com/SourceControl/list/changesets?page=8|title=VeraCrypt}}</ref>
| {{free|Apache License 2.0}}<ref>{{cite web | title =Apache License 2.0 | publisher =IDRIX | date =2015-06-28 | url =https://veracrypt.codeplex.com/license | access-date = 2015-08-08 }}</ref>
| {{free|Apache License 2.0}}<ref>{{cite web | title =Apache License 2.0 | publisher =IDRIX | date =2015-06-28 | url =https://veracrypt.codeplex.com/license | access-date =2015-08-08 | archive-date =2015-07-09 | archive-url =https://web.archive.org/web/20150709234209/https://veracrypt.codeplex.com/license | url-status =dead }}</ref>
TrueCrypt License Version 3.0 (legacy code only)
TrueCrypt License Version 3.0 (legacy code only)
| {{yes}}
| {{yes}}
Line 479: Line 451:
!{{Rh}}| Licensing
!{{Rh}}| Licensing
!{{Rh}}| Maintained?
!{{Rh}}| Maintained?
|-
!ZzEnc
![https://imdtech.ru/ru/technologies/fde/ IMDTech]
!2013
!Commercial
!
|}
|}


Line 485: Line 463:
|-
|-
! Name
! Name
! [[Android (operating system)|Android]]
! [[Windows NT]]
! [[Windows NT]]
! [[iOS]]
! [[Windows Mobile]] (incl.[[Pocket PC]])
! [[Mac OS X]]
! [[Linux]]
! [[FreeBSD]]
! [[FreeBSD]]
! [[Linux]]
! [[OpenBSD]]
! [[Mac OS X]]
! [[NetBSD]]
! [[NetBSD]]
! [[OpenBSD]]
! [[DragonFly BSD]]
! [[Android (operating system)|Android]]
! [[iOS]]
|-
|-
!{{Rh}}| Aloaha Crypt Disk
!{{Rh}}| Aloaha Crypt Disk
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 503: Line 481:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[BestCrypt]] Volume Encryption
!{{Rh}}| [[BestCrypt]] Volume Encryption
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}<ref>{{cite web|url=http://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption|title=Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy}}</ref>
| {{no}}<ref>{{cite web|url=http://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption|title=Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy}}</ref>
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| BitArmor DataControl
!{{Rh}}| BitArmor DataControl
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 527: Line 501:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[BitLocker]]
!{{Rh}}| [[BitLocker]]
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{dunno}}
| {{Partial}}<ref name=dislocker>[https://github.com/Aorimn/dislocker] FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX</ref>
| {{Partial}}<ref name=dislocker />
| {{Partial}}<ref name=dislocker />
| {{Partial}}<ref name=dislocker>https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| Bloombase StoreSafe
!{{Rh}}| Bloombase StoreSafe
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 552: Line 521:
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| Boxcryptor
!{{Rh}}| Boxcryptor
| {{yes}}
| {{yes}}
| {{no}}
| {{yes}}
| {{no}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 565: Line 531:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
|-
|-
!{{Rh}}| CenterTools DriveLock
!{{Rh}}| CenterTools DriveLock
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 575: Line 541:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| CGD
!{{Rh}}| CGD
| {{dunno}}
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 587: Line 551:
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| Check Point Full Disk Encryption
!{{Rh}}| Check Point Full Disk Encryption
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{yes}}<ref>{{cite web |url=http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |title=Archived copy |access-date=2014-12-14 |url-status=dead |archive-url=https://web.archive.org/web/20150923202446/http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |archive-date=2015-09-23 }}</ref>
| {{yes}}<ref>{{cite web |url=http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |title=Archived copy |access-date=2014-12-14 |url-status=dead |archive-url=https://web.archive.org/web/20150923202446/http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |archive-date=2015-09-23 }}</ref>
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[CipherShed]]
!{{Rh}}| [[CipherShed]]
| {{yes}}<ref name="play.google.com">https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system</ref>
| {{yes}}
| {{yes}}
| {{no}}
| {{dunno}}
| {{no}}<ref>[http://www.truecrypt.org/misc/freebsd] Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used</ref>
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}<ref name="play.google.com">[https://play.google.com/store/apps/details?id=com.sovworks.edslite] Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system</ref>
| {{dunno}}
|-
|-
!{{Rh}}| [[CrossCrypt]]
!{{Rh}}| [[CrossCrypt]]
| {{no}}
| {{yes}}<ref>[[CrossCrypt]] - Only for the Microsoft Windows XP/2000 operating systems</ref>
| {{yes}}<ref>[[CrossCrypt]] - Only for the Microsoft Windows XP/2000 operating systems</ref>
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 623: Line 581:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| CryFS
!{{Rh}}| CryFS
| {{yes}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 637: Line 591:
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| Cryhod
!{{Rh}}| Cryhod
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
Line 648: Line 601:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| Cryptainer
!{{Rh}}| Cryptainer
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{Yes}}<ref>[http://cypherix.com/downloads.htm] PocketPC freeware release- SmartPhone beta available</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 660: Line 611:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| CryptArchiver
!{{Rh}}| CryptArchiver
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 671: Line 621:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| Cryptic Disk
!{{Rh}}| Cryptic Disk
| {{no}}
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 689: Line 633:
|-
|-
!{{Rh}}| [[Cryptoloop]]
!{{Rh}}| [[Cryptoloop]]
| {{dunno}}
| {{yes}}<ref name="freeotfe.org">[http://www.freeotfe.org/docs/Main/Linux_volumes.htm] FreeOTFE supports cryptoloop, dm-crypt/[[cryptsetup]]/[[dmsetup]], and dm-crypt/LUKS volumes</ref>
| {{yes}}<ref name="freeotfe.org">http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/[[cryptsetup]]/[[dmsetup]], and dm-crypt/LUKS volumes</ref>
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
Line 696: Line 641:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [http://www.Cryptomator.org Cryptomator]
!{{Rh}}| [[Cryptomator]]
| {{yes}}
| {{yes}}<ref name="cryptomator.org">{{Cite web | url=http://www.cryptomator.org |title = Cryptomator - Free Cloud Encryption}}</ref>
| {{yes}}<ref name="cryptomator.org">{{Cite web | url=http://www.cryptomator.org |title = Cryptomator - Free Cloud Encryption}}</ref>
| {{no}}
| {{yes}}
| {{no}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 709: Line 651:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
|-
|-
!{{Rh}}| CryptoPro Secure Disk Enterprise
!{{Rh}}| CryptoPro Secure Disk Enterprise
| {{no}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 719: Line 661:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| CryptoPro Secure Disk for BitLocker
!{{Rh}}| CryptoPro Secure Disk for BitLocker
| {{no}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 731: Line 671:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| [[Cryptsetup]] / [[Dmsetup]]
!{{Rh}}| [[Cryptsetup]] / [[Dmsetup]]
| {{dunno}}
| {{yes}}<ref name="freeotfe.org"/>
| {{yes}}<ref name="freeotfe.org"/>
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
Line 744: Line 681:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| CryptSync
!{{Rh}}| CryptSync
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 757: Line 691:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| Discryptor
!{{Rh}}| Discryptor
| {{dunno}}
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 767: Line 701:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[DiskCryptor]]
!{{Rh}}| [[DiskCryptor]]
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 779: Line 711:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| DISK Protect
!{{Rh}}| DISK Protect
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 791: Line 721:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[Dm-crypt]] / [[LUKS]]
!{{Rh}}| [[Dm-crypt]] / [[LUKS]]
| {{dunno}}
| {{yes}}<ref name="freeotfe.org"/>
| {{yes}}<ref name="freeotfe.org"/>
| {{dunno}}
| {{yes}}<ref>[http://www.freeotfe.org/docs/Main/Linux_volumes.htm] FreeOTFE4PDA supports dm-crypt/LUKS volumes</ref>
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
Line 804: Line 731:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
|-
| {{yes}}
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
| {{dunno}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [https://www.securstar.com/en/drivecrypt.html DriveCrypt]
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 827: Line 741:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[E4M]]
!{{Rh}}| [[E4M]]
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 839: Line 751:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| e-Capsule Private Safe
!{{Rh}}| e-Capsule Private Safe
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 851: Line 761:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[eCryptfs]]
!{{Rh}}| [[eCryptfs]]
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
Line 864: Line 771:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| EgoSecure HDD Encryption
!{{Rh}}| EgoSecure HDD Encryption
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 875: Line 781:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[EncFS]]
!{{Rh}}| [[EncFS]]
| {{yes}}<ref name="boxcryptor">{{cite web|url=https://www.boxcryptor.com/|title=Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS}}</ref>
| {{yes}}<ref name="save">{{cite web|url=http://www.getsafe.org/|title=Safe - Protect Your Files|access-date=2016-03-29|archive-url=https://web.archive.org/web/20160421064348/http://www.getsafe.org/|archive-date=2016-04-21|url-status=dead}}</ref>
| {{yes}}<ref name="save">{{cite web|url=http://www.getsafe.org/|title=Safe - Protect Your Files|access-date=2016-03-29|archive-url=https://web.archive.org/web/20160421064348/http://www.getsafe.org/|archive-date=2016-04-21|url-status=dead}}</ref>
| {{dunno}}
| {{yes}}<ref name="boxcryptor">{{cite web|url=https://www.boxcryptor.com/|title=Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS}}</ref>
| {{yes}} ([[Filesystem in Userspace|FUSE]])
| {{yes}} (FUSE)
| {{yes}}<ref name="save" />
| {{yes}}<ref name="save" />
| {{yes}} (FUSE)
| {{yes}} (FUSE)
| {{yes}} ([[Filesystem in Userspace|FUSE]])
| {{yes}} (FUSE)
| {{yes}} (FUSE)
| {{yes}} (FUSE)
| {{yes}} (FUSE)
| {{yes}}<ref name="boxcryptor" />
| {{dunno}}
|-
|-
!{{Rh}}| EncryptStick
!{{Rh}}| EncryptStick
| {{dunno}}
| {{Yes}}
| {{dunno}}
| {{Yes}}
| {{Yes}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
| {{Yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| EncryptUSB
!{{Rh}}| EncryptUSB
| {{dunno}}
| {{Yes}}
| {{dunno}}
| {{Yes}}
| {{Yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{Yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[FileVault]]
!{{Rh}}| [[FileVault]]
| {{dunno}}
| {{no}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[FileVault|FileVault 2]]
!{{Rh}}| [[FileVault|FileVault 2]]
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{partial}}<ref>[https://code.google.com/p/libfvde/] libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes</ref>
| {{yes}}
| {{yes}}
| {{partial}}<ref>https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| FREE CompuSec
!{{Rh}}| FREE CompuSec
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 947: Line 841:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[FreeOTFE]]
!{{Rh}}| [[FreeOTFE]]
| {{no}}
| {{yes}}
| {{yes}}
| {{Yes}}
| {{dunno}}
| {{no}}
| {{partial}}<ref>[http://www.freeotfe.org/docs/Main/Linux_volumes.htm] Supports Linux volumes</ref>
| {{no}}
| {{no}}
| {{partial}}<ref>http://www.freeotfe.org/docs/Main/Linux_volumes.htm Supports Linux volumes</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| [[GBDE]]
| {{dunno}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[GBDE]]
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 970: Line 861:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[Geli (software)|GELI]]
!{{Rh}}| [[Geli (software)|GELI]]
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 982: Line 871:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| Knox
!{{Rh}}| Knox
| {{dunno}}
| {{no}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| LibreCrypt
!{{Rh}}| LibreCrypt
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB Third party app allows a user to open LibreCrypt compatible LUKS containers</ref>
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{partial}}<ref>https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes</ref>
| {{no}}
| {{no}}
| {{partial}}<ref>[https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md] Supports Linux volumes</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}<ref>[https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB] Third party app allows a user to open LibreCrypt compatible LUKS containers</ref>
| {{dunno}}
|-
|-
!{{Rh}}| Loop-AES
!{{Rh}}| Loop-AES
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
Line 1,020: Line 901:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| McAfee Drive Encryption (SafeBoot)
!{{Rh}}| McAfee Drive Encryption (SafeBoot)
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{yes}}<ref name="Endpoint Encryption for Mobile">{{cite web|url=http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html|title=Endpoint Encryption Datasheet|publisher=[[McAfee]]|access-date=2010-06-14}}</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| n-Crypt Pro
!{{Rh}}| n-Crypt Pro
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}|[https://netlibsecurity.com/ NetLib Encryptionizer (directory encryption)]
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,061: Line 923:
|-
|-
!{{Rh}}| [[PGPDisk]]
!{{Rh}}| [[PGPDisk]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[PGP Whole Disk Encryption]]
!{{Rh}}| [[PGP Whole Disk Encryption]]
| {{dunno}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 1,081: Line 941:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[Private Disk]]
!{{Rh}}| [[Private Disk]]
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,091: Line 951:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| ProxyCrypt
!{{Rh}}| ProxyCrypt
| {{no}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,103: Line 961:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| R-Crypto
!{{Rh}}| R-Crypto
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,115: Line 971:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| SafeGuard Easy
!{{Rh}}| SafeGuard Easy
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,127: Line 981:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| SafeGuard Enterprise
!{{Rh}}| SafeGuard Enterprise
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| SafeGuard PrivateDisk
!{{Rh}}| SafeGuard PrivateDisk
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,151: Line 1,001:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| SafeHouse Professional
!{{Rh}}| SafeHouse Professional
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,163: Line 1,011:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[Scramdisk]]
!{{Rh}}| [[Scramdisk]]
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
Line 1,176: Line 1,021:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[Scramdisk]] 4 Linux
!{{Rh}}| [[Scramdisk]] 4 Linux
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
Line 1,188: Line 1,031:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| SecuBox
!{{Rh}}| SecuBox
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,200: Line 1,041:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| SecureDoc
!{{Rh}}| SecureDoc
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{dunno}}
| {{no}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 1,213: Line 1,051:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[Sentry 2020]]
!{{Rh}}| [[Sentry 2020]]
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,223: Line 1,061:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[Seqrite]] Volume Encryption
!{{Rh}}| [[Seqrite]] Volume Encryption
| {{no}}
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,241: Line 1,073:
|-
|-
!{{Rh}}| Softraid / RAID C
!{{Rh}}| Softraid / RAID C
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,249: Line 1,081:
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| SpyProof!
!{{Rh}}| SpyProof!
| {{dunno}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,259: Line 1,091:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| Svnd / Vnconfig
!{{Rh}}| Svnd / Vnconfig
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,273: Line 1,101:
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| [[NortonLifeLock|Symantec]] Endpoint Encryption
!{{Rh}}| [[NortonLifeLock|Symantec]] Endpoint Encryption
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}<ref>{{cite web|url=http://www.symantec.com/endpoint-encryption/system-requirements/|title=Endpoint Encryption Powered by PGP Technology - Symantec}}</ref>
| {{yes}}
| {{yes}}
| {{no}}<ref>{{cite web|url=https://www.broadcom.com/products/cybersecurity|title=Endpoint Encryption Powered by PGP Technology - Symantec}}</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
!{{Rh}}| Tcplay
!{{Rh}}| Tcplay
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
Line 1,296: Line 1,121:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| [[Trend Micro]] Endpoint Encryption
!{{Rh}}| [[Trend Micro]] Endpoint Encryption
| {{no}}
| {{yes}}
| {{yes}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}
Line 1,310: Line 1,131:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| [[TrueCrypt]]
!{{Rh}}| [[TrueCrypt]]
| {{yes}}<ref name="play.google.com"/>
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}<ref>[http://www.truecrypt.org/misc/freebsd] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used</ref>
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}<ref name="play.google.com"/>
| {{yes}}
|-
|-
!{{Rh}}| USBCrypt
!{{Rh}}| USBCrypt
| {{no}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,331: Line 1,151:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
|-
!{{Rh}}| [[VeraCrypt]]
!{{Rh}}| [[VeraCrypt]]
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.sovworks.eds.android Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{yes}}
| {{yes}}
| {{yes}}<ref>https://apps.apple.com/de/app/disk-decipher/id516538625 Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{no}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 1,344: Line 1,161:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}<ref>[https://play.google.com/store/apps/details?id=com.sovworks.eds.android] Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{yes}}<ref>[https://apps.apple.com/de/app/disk-decipher/id516538625] Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
|-
|-
!{{Rh}}| CyberSafe Top Secret
!{{Rh}}| CyberSafe Top Secret
| {{yes}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,355: Line 1,171:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{dunno}}
|-class="sortbottom"
|-class="sortbottom"
! Name
! Name
! [[Android (operating system)|Android]]
! [[Windows NT]]
! [[Windows NT]]
! [[iOS]]
! [[Windows Mobile]] (incl. [[Pocket PC]])
! [[Mac OS X]]
! [[Linux]]
! [[FreeBSD]]
! [[FreeBSD]]
! [[Linux]]
! [[OpenBSD]]
! [[Mac OS X]]
! [[NetBSD]]
! [[NetBSD]]
! [[OpenBSD]]
! [[DragonFly BSD]]
! [[Android (operating system)|Android]]
! [[iOS]]
|}
|}


==Features==
==Features==
* '''Hidden containers''': Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)<ref>[http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm] Hidden containers description from Jetico (BestCrypt)</ref> can be created for [[deniable encryption]]. Note that some [[Block cipher modes of operation|modes of operation]] like CBC with a plain IV can be more prone to [[watermarking attack]]s than others.
* '''Hidden containers''': Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)<ref>http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm Hidden containers description from Jetico (BestCrypt)</ref> can be created for [[deniable encryption]]. Note that some [[Block cipher modes of operation|modes of operation]] like CBC with a plain IV can be more prone to [[watermarking attack]]s than others.
* '''Pre-boot authentication''': Whether authentication can be required before booting the computer, thus allowing one to encrypt the [[boot disk]].
* '''Pre-boot authentication''': Whether authentication can be required before booting the computer, thus allowing one to encrypt the [[boot disk]].
* '''[[Single sign-on]]''': Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing [[password fatigue]] and reducing the need to remember multiple passwords.
* '''[[Single sign-on]]''': Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing [[password fatigue]] and reducing the need to remember multiple passwords.
* '''Custom authentication''': Whether custom authentication mechanisms can be implemented with third-party applications.{{clarify|e.g. perhaps link to WP's article re: 1-time password (OTP) tokens? See Talk Page: someone else also was confused about exactly what this includes; pls give some examples & links.|date=January 2011}}
* '''Custom authentication''': Whether custom authentication mechanisms can be implemented with third-party applications.{{clarify|e.g. perhaps link to WP's article re: 1-time password (OTP) tokens? See Talk Page: someone else also was confused about exactly what this includes; pls give some examples & links.|date=January 2011}}
* '''Multiple keys''': Whether an encrypted volume can have more than one active [[Key (cryptography)|key]].
* '''Multiple keys''': Whether an encrypted volume can have more than one active [[Key (cryptography)|key]].
* '''Passphrase strengthening''': Whether [[key strengthening]] is used with plain text passwords to frustrate [[dictionary attack]]s, usually using [[PBKDF2]].
* '''Passphrase strengthening''': Whether [[key strengthening]] is used with plain text passwords to frustrate [[dictionary attack]]s, usually using [[PBKDF2]] or [[Argon2]].
* '''Hardware acceleration''': Whether dedicated [[cryptographic accelerator]] expansion cards can be taken advantage of.
* '''Hardware acceleration''': Whether dedicated [[cryptographic accelerator]] expansion cards can be taken advantage of.
* '''[[Trusted Platform Module]]''': Whether the implementation can use a TPM [[cryptoprocessor]].
* '''[[Trusted Platform Module]]''': Whether the implementation can use a TPM [[cryptoprocessor]].
Line 1,411: Line 1,221:
|-
|-
! ArchiCrypt Live
! ArchiCrypt Live
| {{yes}}<ref name="ArchiCrypt">Secret-containers and Camouflage files [http://www.archicrypt-shop.com/ArchiCrypt-Live.htm ArchiCrypt Live Description]</ref>
| {{yes}}<ref name="ArchiCrypt">Secret-containers and Camouflage files [http://www.archicrypt-shop.com/ArchiCrypt-Live.htm ArchiCrypt Live Description] {{Webarchive|url=https://web.archive.org/web/20110824163518/http://www.archicrypt-shop.com/ArchiCrypt-Live.htm |date=2011-08-24 }}</ref>
| {{no}}
| {{no}}
| {{n/a}}
| {{n/a}}
Line 1,475: Line 1,285:
| {{n/a}}
| {{n/a}}
| {{yes}}<ref name=cgd-paper>{{Cite journal |author=Roland C. Dowdeswell, John Ioannidis |title=The CryptoGraphic Disk Driver |journal=CGD Design Paper |url=http://www.imrryr.org/~elric/cgd/cgd.pdf |access-date=2006-12-24 }}</ref>
| {{yes}}<ref name=cgd-paper>{{Cite journal |author=Roland C. Dowdeswell, John Ioannidis |title=The CryptoGraphic Disk Driver |journal=CGD Design Paper |url=http://www.imrryr.org/~elric/cgd/cgd.pdf |access-date=2006-12-24 }}</ref>
| {{yes}}<ref name=inside-cgd>{{cite web |author=Federico Biancuzzi |date=2005-12-21 |title=Inside NetBSD's CGD |work=interview with Roland Dowdeswell |url=http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 |publisher=ONLamp.com |access-date=2006-12-24 }}</ref>
| {{yes}}<ref name=inside-cgd>{{cite web |author=Federico Biancuzzi |date=2005-12-21 |title=Inside NetBSD's CGD |work=interview with Roland Dowdeswell |url=http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 |publisher=ONLamp.com |access-date=2006-12-24 |archive-date=2007-09-29 |archive-url=https://web.archive.org/web/20070929091538/http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 |url-status=dead }}</ref>
| {{yes}}<ref name=cgd-paper/>
| {{yes}}<ref name=cgd-paper/>
| {{no}}
| {{no}}
Line 1,590: Line 1,400:
| {{dunno}}
| {{dunno}}
|-
|-
! Cryptomator
! [[Cryptomator]]
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,659: Line 1,469:
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes |NTFS,FAT32}}
| {{yes |NTFS, FAT32}}
| {{yes}}
| {{yes}}
|-
|-
Line 1,671: Line 1,481:
| {{yes}}
| {{yes}}
| {{partial|Partial}}<ref name=dm-crypt_tpm>{{cite web |title=cryptsetup Frequently Asked Questions |url=https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions |access-date=2016-01-07 }}</ref> {{r|group=Note|dm-cryptTPM}}
| {{partial|Partial}}<ref name=dm-crypt_tpm>{{cite web |title=cryptsetup Frequently Asked Questions |url=https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions |access-date=2016-01-07 }}</ref> {{r|group=Note|dm-cryptTPM}}
| {{yes|Any supported by OS}}
| {{yes}}
|-
! [https://www.securstar.com/en/drivecrypt.html DriveCrypt]
| {{yes}}<ref name=drivecrypt>{{cite web |title=DriveCrypt features |publisher=SecurStar GmbH |url=http://www.securstar.com/products_drivecrypt.php |access-date=2007-01-03 |archive-url=https://web.archive.org/web/20070101114008/http://www.securstar.com/products_drivecrypt.php |archive-date=2007-01-01 |url-status=dead }}</ref>
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{no}}
| {{yes|Any supported by OS}}
| {{yes|Any supported by OS}}
| {{yes}}
| {{yes}}
Line 1,711: Line 1,509:
|-
|-
! e-Capsule Private Safe
! e-Capsule Private Safe
| {{yes}}<ref name=ps-mla>{{cite web |title=Multi level access with separate access credentials, each enabling a different set of functional or logical operations |publisher=EISST Ltd. |url=http://www.eisst.com/products/private_safe/compare/ |access-date=2007-07-25 }}</ref>
| {{yes}}<ref name=ps-mla>{{cite web |title=Multi level access with separate access credentials, each enabling a different set of functional or logical operations |publisher=EISST Ltd. |url=http://www.eisst.com/products/private_safe/compare/ |access-date=2007-07-25 |archive-date=2007-09-28 |archive-url=https://web.archive.org/web/20070928145451/http://www.eisst.com/products/private_safe/compare/ |url-status=dead }}</ref>
| {{no}}
| {{no}}
| {{n/a}}
| {{n/a}}
Line 1,832: Line 1,630:
! Loop-AES
! Loop-AES
| {{no}}
| {{no}}
| {{yes}}<ref name=loop-aes>{{cite web |author=Jari Ruusu |title=loop-AES README file |url=http://loop-aes.sourceforge.net/loop-AES.README |access-date=2007-04-23 }}</ref>
| {{yes}}<ref name=loop-aes>{{cite web |author=Jari Ruusu |title=loop-AES README file |url=http://loop-aes.sourceforge.net/loop-AES.README |access-date=2007-04-23 |archive-date=2023-08-23 |archive-url=https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README |url-status=dead }}</ref>
| {{dunno}}
| {{dunno}}
| {{yes}}<ref name=loop-aes/>
| {{yes}}<ref name=loop-aes/>
Line 1,868: Line 1,666:
! [[PGPDisk]]
! [[PGPDisk]]
| {{no}}
| {{no}}
| {{yes}}<ref name=pgp-faq>{{cite web |title=PGP Whole Disk Encryption FAQ |publisher=PGP Corporation |url=http://www.pgp.com/products/wholediskencryption/faq.html |access-date=2006-12-24 }}</ref>
| {{yes}}<ref name=pgp-faq>{{cite web |title=PGP Whole Disk Encryption FAQ |publisher=PGP Corporation |url=http://www.pgp.com/products/wholediskencryption/faq.html |access-date=2006-12-24 |archive-date=2006-12-24 |archive-url=https://web.archive.org/web/20061224231228/http://www.pgp.com/products/wholediskencryption/faq.html |url-status=dead }}</ref>
| {{yes}}
| {{yes}}
| {{dunno}}
| {{dunno}}
Line 2,129: Line 1,927:
! Filesystems
! Filesystems
! Two-factor authentication
! Two-factor authentication
|-
!ZzEnc
!No
!Yes
!Yes
!Yes
!Yes
!Yes
!No
!No
!Windows, Legacy BIOS & UEFI
!In UEFI with removable keys store on USB-flash
|}
|}
{{Reflist|group=Note|refs=
{{Reflist|group=Note|refs=
Line 2,134: Line 1,944:
<ref name=BitLockerFS>Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, [[Windows Vista]] and later are limited to be installable only on NTFS volumes</ref>
<ref name=BitLockerFS>Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, [[Windows Vista]] and later are limited to be installable only on NTFS volumes</ref>
<ref name=dm-cryptTPM>An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the [[standard input]]</ref>
<ref name=dm-cryptTPM>An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the [[standard input]]</ref>
<ref name=TrueCryptMystery>The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. http://www.zdnet.com/truecrypt-quits-inexplicable-7000029994/</ref>
<ref name=TrueCryptMystery>The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. https://www.zdnet.com/article/truecrypt-quits-inexplicable/</ref>
]}}
]}}


Line 2,328: Line 2,138:
| {{yes}}
| {{yes}}
| {{yes}}<ref>yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/</ref>
| {{yes}}<ref>yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/</ref>
| {{dunno}}
|-
! [[DriveCrypt]][https://www.securstar.com/en/drivecrypt.html]
| {{yes}}
| {{yes}}<ref name=drivecrypt/>
| {{yes}}<ref name=drivecrypt/>
| {{yes}}
| {{yes}}
| {{dunno}}
| {{dunno}}
|-
|-
Line 2,543: Line 2,345:
| {{n/a}}
| {{n/a}}
| {{no}}
| {{no}}
| {{dunno}}
|-
! [https://www.winmagic.com/encryption-solutions/enterprise-encryption SecureDoc]
| {{yes}}<ref name=sdoc-faq />
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{dunno}}
|-
|-
Line 2,643: Line 2,437:


==Modes of operation==
==Modes of operation==
{{details|Disk encryption theory}}
{{further|Disk encryption theory}}


Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
Line 2,780: Line 2,574:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}<ref>{{cite web |title=CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+ |url=https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-2022_35fr.pdf }}</ref>
| {{no}}
| {{dunno}}
| {{dunno}}
|-
|-
Line 2,810: Line 2,604:
| date = 2018-01-01 | access-date = 2018-05-08
| date = 2018-01-01 | access-date = 2018-05-08
}}</ref>}}
}}</ref>}}
|-
! [[DriveCrypt]] [https://www.securstar.com/en/drivecrypt.html]
| {{dunno}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
|-
|-
! [[DriveSentry]] GoAnywhere 2
! [[DriveSentry]] GoAnywhere 2
Line 3,136: Line 2,922:


[[Category:Disk encryption|*]]
[[Category:Disk encryption|*]]
[[Category:Software comparisons|Disk encryption software]]
[[Category:Security software comparisons|Disk encryption software]]
[[Category:Cryptographic software|*]]
[[Category:Cryptographic software|*]]
[[Category:Cryptography lists and comparisons|Disk encryption software]]
[[Category:Cryptography lists and comparisons|Disk encryption software]]

Latest revision as of 08:37, 8 October 2024

This is a technical feature comparison of different disk encryption software.

Background information

[edit]
Name Developer First released Licensing Maintained?
Aloaha Crypt Disk Aloaha 2008 Source Auditable for Commercial Customers Yes
ArchiCrypt Live Softwaredevelopment Remus ArchiCrypt 1998 Proprietary Yes
BestCrypt Jetico 1993[1] Proprietary Yes
BitArmor DataControl BitArmor Systems Inc. 2008-05 Proprietary Yes
BitLocker Microsoft 2006 Proprietary Yes
Bloombase StoreSafe Bloombase 2012 Proprietary No[2]
Boxcryptor Secomba GmbH 2011 Proprietary No
CGD Roland C. Dowdeswell 2002-10-04[3] BSD Yes
CenterTools DriveLock CenterTools 2008 Proprietary Yes
Check Point Full Disk Encryption Check Point Software Technologies Ltd 1999[4][5][6] Proprietary Yes
CipherShed CipherShed Project 2014[7] TrueCrypt License Version 3.0[8] No
CrossCrypt Steven Scherrer 2004-02-10[9] GPL No
CryFS Sebastian Messmer 2015 LGPLv3 Yes
Cryhod Prim'X Technologies 2010 Proprietary Yes
Cryptainer Cypherix Software 1998 Proprietary Yes
Cryptic Disk Exlade 2003 Proprietary Yes
CryptArchiver WinEncrypt ? Proprietary Yes
Cryptoloop ? 2003-07-02[10] GPL No
Cryptomator Skymatic UG (haftungsbeschränkt) 2016-03-09[11] GPLv3 Yes
CryptoPro Secure Disk Enterprise cpsd it-services GmbH 2010 Proprietary Yes
CryptoPro Secure Disk for BitLocker cpsd it-services GmbH 2012 Proprietary Yes
CryptSync Stefan Küng 2012 GPL v2 Yes
Discryptor Cosect Ltd. 2008 Proprietary No
DiskCryptor ntldr, David Xanatos 2007 GPL No[12]
DISK Protect Becrypt Ltd 2001 Proprietary Yes
Cryptsetup / Dmsetup Christophe Saout 2004-03-11[13] GPL Yes
Dm-crypt / LUKS Clemens Fruhwirth (LUKS) 2005-02-05[14] GPL Yes
DriveSentry GoAnywhere 2 DriveSentry 2008 Proprietary No
E4M Paul Le Roux 1998-12-18[15] Open source No
e-Capsule Private Safe EISST Ltd. 2005 Proprietary Yes
eCryptfs Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) 2005[16] GPL Yes
EgoSecure HDD Encryption EgoSecure GmbH 2006 Proprietary Yes
EncFS Valient Gough 2003[17] LGPLv3 No
EncryptStick ENC Security Systems 2009 Proprietary Yes
FileVault Apple Inc. 2003-10-24 Proprietary Yes
FileVault 2 Apple Inc. 2011-07-20 Proprietary Yes
FREE CompuSec CE-Infosys 2002 Proprietary Yes
FreeOTFE Sarah Dean 2004-10-10[18] Open source No
GBDE Poul-Henning Kamp 2002-10-19[19] BSD No
GELI Pawel Jakub Dawidek 2005-04-11[20] BSD Yes
GnuPG Werner Koch 1999-09-07[21] GPL Yes
gocryptfs Jakob Unterwurzacher 2015-10-07[22] MIT / X Consortium License Yes
Knox AgileBits 2010 Proprietary Yes
KryptOS The MorphOS Development Team 2010 Proprietary Yes
LibreCrypt tdk 2014-06-19[23] Open source No
Loop-AES Jari Ruusu 2001-04-11 GPL Yes
McAfee Drive Encryption (SafeBoot) McAfee, LLC 2007[24] Proprietary Yes
n-Crypt Pro n-Trance Security Ltd 2005 Proprietary Yes
PGPDisk PGP Corporation (acquired by Symantec in 2010) 1998-09-01[25] Proprietary Yes
Private Disk Dekart 1993[26] Proprietary Yes
ProxyCrypt v77 2013 Open source Yes
R-Crypto R-Tools Technology Inc 2008 Proprietary Yes
SafeGuard Easy Sophos (Utimaco) 1993[27] Proprietary Yes
SafeGuard Enterprise Sophos (Utimaco) 2007[28] Proprietary Yes
SafeGuard PrivateDisk Sophos (Utimaco)[29] 2000 Proprietary Yes
SafeHouse Professional PC Dynamics, Inc. 1992 Proprietary Yes
Scramdisk Shaun Hollingworth 1997-07-01 Open source No
Scramdisk 4 Linux Hans-Ulrich Juettner 2005-08-06[30] GPL No
SecuBox Aiko Solutions 2007-02-19 Proprietary Yes
SECUDE Secure Notebook SECUDE 2003 Proprietary Yes
Seqrite Encryption Manager Quick Heal Technologies Ltd. 2017 Proprietary Yes
Sentry 2020 SoftWinter 1998[31] Proprietary No
Softraid / RAID C OpenBSD 2007-11-01[32] BSD Yes
SpyProof! Information Security Corp. 2002 Proprietary Yes
Svnd / Vnconfig OpenBSD 2000-12-01[33] BSD Yes
Symantec Endpoint Encryption Symantec Corporation 2008 Proprietary Yes
Tcplay Alex Hornung 2012-01-28[34] BSD No[35]
Trend Micro Endpoint Encryption (Mobile Armor) Trend Micro[36] 2004 or earlier[37] Proprietary Yes
TrueCrypt TrueCrypt Foundation 2004-02-02[38] TrueCrypt License 3.1[39] No
USBCrypt WinAbility Software Corp. 2010 Proprietary Yes
VeraCrypt IDRIX 2013-06-22[40] Apache License 2.0[41]

TrueCrypt License Version 3.0 (legacy code only)

Yes
CyberSafe Top Secret CyberSoft 2013 Proprietary Yes
Name Developer First released Licensing Maintained?
ZzEnc IMDTech 2013 Commercial

Operating systems

[edit]
Name Android Windows NT iOS Mac OS X Linux FreeBSD OpenBSD NetBSD
Aloaha Crypt Disk ? Yes ? No No No No No
BestCrypt Volume Encryption ? Yes ? Yes No[42] No No No
BitArmor DataControl ? Yes ? No No No No No
BitLocker No Yes ? Partial[43] Partial[43] No No No
Bloombase StoreSafe ? Yes ? Yes Yes Yes Yes Yes
Boxcryptor Yes Yes Yes Yes Yes No No No
CenterTools DriveLock ? Yes ? No No No No No
CGD ? No ? No No No No Yes
Check Point Full Disk Encryption ? Yes ? Yes Yes[44] No No No
CipherShed Yes[45] Yes ? Yes Yes No[46] No No
CrossCrypt No Yes[47] ? No No No No No
CryFS No Yes ? Yes Yes Yes No Yes
Cryhod ? Yes ? No Yes No No No
Cryptainer ? Yes ? No No No No No
CryptArchiver ? Yes ? No No No No No
Cryptic Disk No Yes No No No No No No
Cryptoloop ? Yes[48] ? No Yes No No No
Cryptomator Yes Yes[49] Yes Yes Yes No No No
CryptoPro Secure Disk Enterprise No Yes ? No No No No No
CryptoPro Secure Disk for BitLocker No Yes ? No No No No No
Cryptsetup / Dmsetup ? Yes[48] ? No Yes No No No
CryptSync No Yes ? Yes Yes No No No
Discryptor ? No ? No No No No No
DiskCryptor ? Yes ? No No No No No
DISK Protect ? Yes ? No No No No No
Dm-crypt / LUKS ? Yes[48] ? No Yes No No No
DriveSentry GoAnywhere 2 ? Yes ? No No No No No
E4M ? Yes ? No No No No No
e-Capsule Private Safe ? Yes ? No No No No No
eCryptfs ? No ? No Yes No No No
EgoSecure HDD Encryption ? Yes ? No No No No No
EncFS Yes[50] Yes[51] ? Yes[51] Yes (FUSE) Yes (FUSE) Yes (FUSE) Yes (FUSE)
EncryptStick ? Yes ? Yes Yes No No No
EncryptUSB ? Yes ? Yes No No No No
FileVault ? No ? Yes No No No No
FileVault 2 ? No ? Yes Partial[52] No No No
FREE CompuSec ? Yes ? No No No No No
FreeOTFE No Yes ? No Partial[53] No No No
GBDE ? No ? No No Yes No No
GELI ? No ? No No Yes No No
Knox ? No ? Yes No No No No
LibreCrypt Yes[54] Yes ? No Partial[55] No No No
Loop-AES ? No ? No Yes No No No
McAfee Drive Encryption (SafeBoot) ? Yes ? Yes No No No No
n-Crypt Pro ? Yes ? No No No No No
PGPDisk ? Yes ? Yes No No No No
PGP Whole Disk Encryption ? Yes ? Yes Yes No No No
Private Disk ? Yes ? No No No No No
ProxyCrypt No Yes ? No No No No No
R-Crypto ? Yes ? No No No No No
SafeGuard Easy ? Yes ? No No No No No
SafeGuard Enterprise ? Yes ? Yes No No No No
SafeGuard PrivateDisk ? Yes ? No No No No No
SafeHouse Professional ? Yes ? No No No No No
Scramdisk ? Yes ? No Yes No No No
Scramdisk 4 Linux ? No ? No Yes No No No
SecuBox ? No ? No No No No No
SecureDoc ? Yes ? Yes Yes No No No
Sentry 2020 ? Yes ? No No No No No
Seqrite Volume Encryption No Yes No No No No No No
Softraid / RAID C ? No ? No No No Yes No
SpyProof! ? Yes ? No No No No No
Svnd / Vnconfig ? No ? No No No Yes No
Symantec Endpoint Encryption ? Yes ? Yes No[56] No No No
Tcplay No No ? No Yes No No No
Trend Micro Endpoint Encryption No Yes ? Yes No No No No
TrueCrypt Yes[45] Yes Yes Yes Yes No[57] No No
USBCrypt No Yes ? No No No No No
VeraCrypt Yes[58] Yes Yes[59] Yes Yes Yes No No
CyberSafe Top Secret Yes Yes ? No No No No No
Name Android Windows NT iOS Mac OS X Linux FreeBSD OpenBSD NetBSD

Features

[edit]
Name Hidden containers Pre-boot authentication Single sign-on Custom authentication Multiple keys Passphrase strengthening Hardware acceleration TPM Filesystems Two-factor authentication
Aloaha Secure Stick Yes No Yes Yes No No No NTFS, FAT32 Yes
ArchiCrypt Live Yes[61] No No Yes[61][62] No No No ? Yes[61][63]
BestCrypt Yes Yes Yes Yes Yes[64] Yes Yes Yes Any supported by OS Yes[65]
BitArmor DataControl No Yes ? No Yes Yes No No NTFS, FAT32 on non-system volumes No
BitLocker No Yes[66] No Yes[67] Yes[68] Yes[69] Yes Yes[68] Chiefly NTFS [Note 1] Yes [Note 2]
Bloombase StoreSafe No No Yes Yes Yes Yes No Any supported by OS Yes
CGD No No Yes[70] Yes[71] Yes[70] No No Any supported by OS Yes[70]
CenterTools DriveLock No Yes Yes No No Yes No No Any supported by OS Yes
Check Point Full Disk Encryption Yes Yes Yes Yes Yes Yes Yes Yes NTFS, FAT32 Yes
CipherShed Yes
(limited to one per
"outer" container)
only on Windows[72] ? No yes with multiple keyfiles[73][74] Yes Yes No[75] Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[76] Yes
CryFS No No No No Yes[77] No No Any supported by OS No
CrossCrypt No No No No No No No ? No
CryptArchiver No No No No ? No No ? ?
Cryptic Disk Yes No No No Yes Yes Yes No Any supported by OS Yes
Cryhod No Yes Yes No Yes Yes Yes No Any supported by OS Yes
Cryptoloop No Yes[78] ? Yes No No Yes[citation needed] No Any supported by OS ?
Cryptomator No No No No Yes Yes No Any supported by OS No
CryptoPro Secure Disk Enterprise Yes with add-on Secure Device Yes Yes Yes Yes Yes Yes Yes Any supported by OS Yes
CryptoPro Secure Disk for BitLocker Yes with add-on Secure Device Yes Yes Yes Yes Yes Yes Yes Any supported by OS Yes
Cryptsetup / Dmsetup No Yes[78] ? Yes No No Yes No Any supported by OS Yes
DiskCryptor No Yes ? No No No Yes[79] No Windows volumes on MBR and UEFI GPT drives, ReFs any FS supported by OS[80] Yes[79]
DISK Protect No Yes[81] Yes No Yes[81] No Yes Yes NTFS, FAT32 Yes
Dm-crypt / LUKS No Yes[78] ? Yes Yes Yes Yes Partial[82] [Note 3] Any supported by OS Yes
DriveSentry GoAnywhere 2 No No Yes No Yes No ? Any supported by OS Yes
E4M No No No No ? No No ? No
e-Capsule Private Safe Yes[83] No No Yes[83] No Yes No ? ?
eCryptfs No No Yes Yes Yes Yes Yes Yes[84] Yes
EgoSecure HDD Encryption No Yes Yes Yes Yes Yes Yes[85] Yes NTFS, FAT32 Yes
EncryptUSB No No No No No Yes No No NTFS, FAT32, exFAT No
FileVault No No No Two passwords[86] Yes[86] ? No HFS+, possibly others No
FileVault 2 No Yes Yes No Yes Yes Yes[87] No HFS+, possibly others No
FREE CompuSec No Yes ? No No No No No Any supported by OS No
FreeOTFE Yes No Yes[88] Yes[89] Yes Yes No Any supported by OS Yes
GBDE No No[90] Yes Yes[91] No[91] No[90] No Any supported by OS Yes
GELI No Yes[90] ? Yes Yes[92] Yes[92] Yes[90] No Any supported by OS Yes
Loop-AES No Yes[93] ? Yes[93] Yes[93] Yes[93] Yes[93] No Any supported by OS Yes[94]
McAfee Drive Encryption (SafeBoot) Yes Yes Yes Yes Yes Yes Yes[85][95] Yes Any supported by OS Yes
n-Crypt Pro No No No No [96] No No ? ?
PGPDisk No Yes[97] Yes ? Yes Yes[98] ? Yes ? Yes
Private Disk No No No Yes Yes No No Any supported by OS Yes
ProxyCrypt Yes No No No No Yes Yes No Any supported by OS Yes
R-Crypto ? No ? ? ? ? ? Any supported by OS ?
SafeGuard Easy No Yes ? No Yes Yes No Yes[99] Any supported by OS Yes
SafeGuard Enterprise No Yes Yes No Yes Yes No Yes[99] Any supported by OS Yes
SafeGuard PrivateDisk No No No Yes Yes No Yes[100] Any supported by OS Yes
SafeHouse Professional No No Yes Yes Yes No No Any supported by OS Yes
Scramdisk Yes No No No No No No ? Last update to web site 2009-07-02
Scramdisk 4 Linux Yes[101] No No No Yes[101] No No ext2, ext3, reiserfs, minix, ntfs, vfat/msdos No
SecuBox No No No No Yes No No ? No
SecureDoc No Yes[102] ? Yes Yes Yes Yes Yes ? Yes
Seqrite Encryption Manager No Yes Yes No Yes Yes Yes No Any supported by OS No
Sentry 2020 No No ? No No No No No ? No
Softraid / RAID C No No ? ? ? ? Yes ? Any supported by OS ?
Svnd / Vnconfig No No No No Yes[103] Yes ? Any supported by OS ?
Symantec Endpoint Encryption No Yes Yes Yes Yes Yes No No NTFS, FAT32 Yes
Trend Micro Endpoint Encryption No Yes Yes Yes Yes Yes[104] Yes[105] No Any supported by OS Yes[106]
TrueCrypt [Note 4] Yes
(limited to one per
"outer" container)
only on Windows[107] ? No yes with multiple keyfiles[74][108] Yes Yes No[75] Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[76] Yes
VeraCrypt Yes
(limited to one per
"outer" container)
only on Windows[109] No No yes with multiple keyfiles Yes Yes No Windows on both MBR and UEFI GPT drives; dynamic drives discouraged Yes
CyberSafe Top Secret Yes No No No Yes Yes Yes No Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged Yes
Name Hidden containers Pre-boot authentication Single sign-on Custom authentication Multiple keys Passphrase strengthening Hardware acceleration TPM Filesystems Two-factor authentication
ZzEnc No Yes Yes Yes Yes Yes No No Windows, Legacy BIOS & UEFI In UEFI with removable keys store on USB-flash
  1. ^ Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes
  2. ^ BitLocker can be used with a TPM PIN + external USB key for two-factor authentication
  3. ^ An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the standard input
  4. ^ The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. https://www.zdnet.com/article/truecrypt-quits-inexplicable/

Layering

[edit]
  • Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table.
  • Partition: Whether individual disk partitions can be encrypted.
  • File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
  • Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.
  • Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
Name Whole disk Partition File Swap space Hibernation file RAID
Aloaha Secure Stick No No Yes No No ?
ArchiCrypt Live Yes
(except for the boot volume)
Yes Yes No No ?
BestCrypt Yes Yes Yes Yes Yes[110] ?
BitArmor DataControl No Yes No Yes Yes ?
BitLocker Yes
(except for the boot volume)
Yes Yes[111] Yes
(parent volume is encrypted)
Yes
(parent volume is encrypted)
?
Bloombase StoreSafe Yes Yes Yes Yes No Yes
CenterTools DriveLock Yes Yes Yes Yes Yes ?
CGD Yes Yes Yes[70] Yes No ?
Check Point Full Disk Encryption Yes Yes Yes Yes Yes ?
CipherShed Yes Yes Yes Yes only on Windows ?
CrossCrypt No No Yes No No ?
CryFS No No No No No ?
CryptArchiver No No Yes No No ?
Cryptic Disk No Yes Yes No No ?
Cryhod No Yes No Yes Yes
(parent volume is encrypted)
?
Cryptoloop Yes Yes Yes Yes No ?
Cryptomill Yes Yes ?
CryptoPro Secure Disk Enterprise Yes Yes Yes
(add-on Secure Device)
Yes Yes ?
CryptoPro Secure Disk for BitLocker Yes Yes Yes Yes Yes ?
DiskCryptor No Yes No Yes Yes ?
Disk Protect Yes No No Yes Yes ?
Dm-crypt / LUKS Yes Yes Yes[112] Yes Yes[113] ?
DriveSentry GoAnywhere 2 No Yes Yes No No ?
E4M No Yes Yes No No ?
e-Capsule Private Safe No No Yes[114] No No ?
eCryptfs No No Yes No No ?
EgoSecure HDD Encryption Yes Yes Yes Yes Yes ?
EncryptUSB No No Yes No No ?
FileVault No No Yes[86] Yes[115][86] Yes[115][116]
FileVault 2 Yes[117] Yes[87] No Yes Yes ?
FREE CompuSec Yes No Yes Yes Yes ?
FreeOTFE Yes
(except for the boot volume)
Yes Yes No No ?
GBDE Yes Yes Yes[118] Yes No ?
GELI Yes Yes Yes[118] Yes No ?
Loop-AES Yes Yes[93] Yes[93] Yes[93] Yes[93] ?
McAfee Drive Encryption (SafeBoot) Yes Yes Yes Yes Yes[119] ?
n-Crypt Pro Yes Yes Yes No No ?
PGPDisk Yes Yes Yes Yes only on Windows ?
Private Disk No No Yes No No ?
ProxyCrypt Yes Yes Yes No No ?
R-Crypto No No Yes No No ?
SafeGuard Easy Yes Yes extra module Yes Each sector on disk is encrypted ?
SafeGuard Enterprise Yes Yes Yes Yes Each sector on disk is encrypted ?
SafeGuard PrivateDisk No No Yes No No ?
SafeHouse Professional No No Yes No No ?
Scramdisk No Yes Yes No No ?
Scramdisk 4 Linux Yes Yes Yes Yes No ?
SecuBox No No Yes No ?
Sentry 2020 No No Yes No No ?
Seqrite Encryption Manager Yes Yes Yes Yes Yes RAID-5
Softraid / RAID C Yes Yes No Yes (encrypted by default in OpenBSD)[120] No ?
Svnd / Vnconfig ? Yes Yes Yes (encrypted by default in OpenBSD) ? ?
SpyProof! No Yes Yes No No ?
Symantec Endpoint Encryption Yes Yes Yes Yes Yes ?
Trend Micro Endpoint Encryption Yes Yes Yes Yes Yes ?
TrueCrypt Yes[121] Yes Yes Yes only on Windows[107] ?
VeraCrypt Yes Yes Yes Yes only on Windows[107] ?
CyberSafe Top Secret No Yes Yes No No ?
Name Whole disk Partition File Swap space Hibernation file RAID

Modes of operation

[edit]

Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.

  • CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
  • CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
  • CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
  • LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[122]
  • XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
  • Authenticated encryption: Protection against ciphertext modification by an attacker
Name CBC w/ predictable IVs CBC w/ secret IVs CBC w/ random per-sector keys LRW XTS Authenticated encryption
Aloaha Crypt Disk No No No Yes Yes ?
ArchiCrypt Live No No No Legacy support[123] Yes ?
BestCrypt No Yes No Yes[124] Yes[125] ?
BitArmor DataControl No Yes Plumb-IV No No ?
BitLocker No[126] Yes[126] No No Yes, Windows 10 10547+ ?
Bloombase StoreSafe Yes Yes Yes Yes Yes ?
CGD No Yes[127] No No No ?
CenterTools DriveLock ? ? ? ? ? ?
Check Point Full Disk Encryption No No Yes Yes Yes ?
CipherShed Legacy support[128] No No Legacy support[129] Yes[130] ?
CrossCrypt Yes No No No No ?
CryFS No No Yes No No ?
CryptArchiver ? ? ? ? ? ?
Cryptic Disk No No No No Yes No
Cryhod No Yes No No Yes[131] ?
Cryptoloop Yes No No No No No
DiskCryptor No No No No Yes ?
Dm-crypt / LUKS Yes Yes No Yes, using *-lrw-benbi[132] Yes, using *-xts-plain Yes, using --integrity mode[133]
DriveSentry GoAnywhere 2 ? ? ? ? ? ?
E4M ? ? ? No No ?
e-Capsule Private Safe ? ? ? ? ? ?
eCryptfs No Yes ? No No ?
EgoSecure HDD Encryption No Yes No No No ?
FileVault Yes[86] No No No No ?
FileVault 2 No No No No Yes[134] ?
FREE CompuSec Yes No No No No ?
FreeOTFE Yes Yes No Yes Yes No
GBDE No No Yes[91] No No ?
GELI No Yes[135] No No Yes Yes, using -a option[136]
Loop-AES single-key, multi-key-v2 modes[93] multi-key-v3 mode[93] No No No No
McAfee Drive Encryption (SafeBoot) No Yes No No No ?
n-Crypt Pro ? ? No No No ?
PGPDisk ? ? ? ? ? ?
Private Disk No Yes No No No ?
ProxyCrypt No No No No Yes ?
R-Crypto ? ? ? ? ? ?
SafeGuard Easy ? ? ? ? ? ?
SafeGuard Enterprise ? ? ? ? ? ?
SafeGuard PrivateDisk ? ? ? ? ? ?
SafeHouse Professional Yes No No No No ?
Scramdisk No Yes No No No ?
Scramdisk 4 Linux No Yes[137] No Yes[138] Yes[139] ?
SecuBox Yes No No No No ?
SecureDoc ? ? ? ? ? ?
Sentry 2020 ? ? ? ? ? ?
Seqrite Encryption Manager No Yes No Yes Yes ?
Softraid / RAID C ? ? ? ? Yes[140] ?
Svnd / Vnconfig ? ? ? ? ? ?
Symantec Endpoint Encryption No No Yes No No ?
TrueCrypt Legacy support[128] No No Legacy support[129] Yes[141] No
USBCrypt No Yes No No Yes ?
VeraCrypt No No No No Yes ?
CyberSafe Top Secret No No No No Yes ?
Name CBC w/ predictable IVs CBC w/ secret IVs CBC w/ random per-sector keys LRW XTS Authenticated encryption

See also

[edit]

Notes and references

[edit]
  1. ^ "Jetico Mission". Jetico. Retrieved 2014-05-30.
  2. ^ "Bloombase StoreSafe". Bloombase. Retrieved 2014-11-28.
  3. ^ Roland Dowdeswell (2002-10-04). "CryptoGraphic Disk". mailing list announcement. Retrieved 2007-01-14.
  4. ^ "Protect guards laptop and desktop data". Archived from the original on March 2, 2005. Retrieved 2008-09-03.
  5. ^ Company and product name change to Pointsec "Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc". Archived from the original on 2004-08-20. Retrieved 2008-09-03.
  6. ^ "Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent". Archived from the original on 2008-08-20. Retrieved 2008-09-03.
  7. ^ Niklas Lemcke (2014-12-15). "Pre-Alpha testing started". Retrieved 2014-12-24.
  8. ^ "TrueCrypt License Version 3.0". TrueCrypt Foundation. 2012-02-07. Retrieved 2014-12-24.
  9. ^ Sarah Dean (2004-02-10). "OTFEDB entry". Archived from the original on 2008-12-11. Retrieved 2008-08-10.
  10. ^ Initial cryptoloop patches for the Linux 2.5 development kernel: "Archived copy". Archived from the original on 2005-01-10. Retrieved 2006-12-24.{{cite web}}: CS1 maint: archived copy as title (link)
  11. ^ "Home". cryptomator.org.
  12. ^ "Releases · DavidXanatos/DiskCryptor". GitHub.
  13. ^ dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/
  14. ^ Clemens Fruhwirth. "LUKS version history". Archived from the original on 2006-12-25. Retrieved 2006-12-24.
  15. ^ "archived E4M documentation". Archived from the original on 2000-05-24.
  16. ^ "eCryptfs". Retrieved 2008-04-29.
  17. ^ Valient Gough (2003). "EncFS - an Encrypted Filesystem". README.md file. Retrieved 2007-01-14.
  18. ^ "FreeOTFE version history". Archived from the original on 2006-12-07. Retrieved 2006-12-24.
  19. ^ "gbde(4) man page in FreeBSD 4.11". GBDE manual page as it appeared in FreeBSD 4.11. Retrieved 2006-12-24.
  20. ^ "geli(8) man page in FreeBSD 6.0". GELI manual page as it first appeared in FreeBSD 6.0. Retrieved 2006-12-24.
  21. ^ Release Notes. GnuPG
  22. ^ "gocryptfs changelog on github". GitHub. Retrieved 2018-01-16.
  23. ^ "as received from FreeOTFE version v5.21 with small changes". GitHub. 2014-06-20. Retrieved 2015-09-14.
  24. ^ "McAfee Drive Encryption". product description. McAfee. Retrieved 2019-07-31.
  25. ^ "PGP 6.0 Freeware released- any int'l links?". Newsgroupcomp.security.pgp. Usenet: 6sh4vm$jbf$1@news.cybercity.dk. Retrieved 2007-01-04.
  26. ^ "Dekart Encryption software timeline". Dekart.
  27. ^ "SafeGuard Easy 4.5 Technical Whitepaper" (PDF). Utimaco. Retrieved 2009-08-10.
  28. ^ "SafeGuard Enterprise Technical Whitepaper" (PDF). Utimaco. Retrieved 2009-08-10.
  29. ^ Rebranded as ThinkVantage Client Security "ThinkVantage Technologies Deployment Guide" (PDF). Lenovo. Retrieved 2008-03-05.[dead link]
  30. ^ "ScramDisk 4 Linux Releases".
  31. ^ "Sentry 2020 news". Retrieved 2007-01-02.
  32. ^ "OpenBSD 4.2 Changelog".
  33. ^ "OpenBSD 2.8 Changelog".
  34. ^ "bwalex/tc-play". GitHub. 2019-08-27.
  35. ^ Last update: 2020-03-02 "bwalex/tc-play". Github. 2023-04-03.
  36. ^ Trend Micro
  37. ^ "Mobile Armor: Your Data.Secure. Everywhere". 4 September 2004. Archived from the original on 4 September 2004.
  38. ^ "TrueCrypt".
  39. ^ "TrueCrypt License Version 3.1". TrueCrypt Foundation. 2014-05-28. Retrieved 2014-05-29.
  40. ^ "VeraCrypt".
  41. ^ "Apache License 2.0". IDRIX. 2015-06-28. Archived from the original on 2015-07-09. Retrieved 2015-08-08.
  42. ^ "Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy".
  43. ^ a b https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX
  44. ^ "Archived copy" (PDF). Archived from the original (PDF) on 2015-09-23. Retrieved 2014-12-14.{{cite web}}: CS1 maint: archived copy as title (link)
  45. ^ a b https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system
  46. ^ http://www.truecrypt.org/misc/freebsd Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used
  47. ^ CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems
  48. ^ a b c http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes
  49. ^ "Cryptomator - Free Cloud Encryption".
  50. ^ "Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS".
  51. ^ a b "Safe - Protect Your Files". Archived from the original on 2016-04-21. Retrieved 2016-03-29.
  52. ^ https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes
  53. ^ http://www.freeotfe.org/docs/Main/Linux_volumes.htm Supports Linux volumes
  54. ^ https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB Third party app allows a user to open LibreCrypt compatible LUKS containers
  55. ^ https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes
  56. ^ "Endpoint Encryption Powered by PGP Technology - Symantec".
  57. ^ http://www.truecrypt.org/misc/freebsd Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used
  58. ^ https://play.google.com/store/apps/details?id=com.sovworks.eds.android Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
  59. ^ https://apps.apple.com/de/app/disk-decipher/id516538625 Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
  60. ^ http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm Hidden containers description from Jetico (BestCrypt)
  61. ^ a b c Secret-containers and Camouflage files ArchiCrypt Live Description Archived 2011-08-24 at the Wayback Machine
  62. ^ Supports "Guest" keys
  63. ^ Using "Archicrypt Card"
  64. ^ Supported by the BestCrypt container format; see BestCrypt SDK
  65. ^ Supported by the BestCrypt Volume Encryption software
  66. ^ With PIN or USB key
  67. ^ BitLocker Drive Encryption: Value Add Extensibility Options
  68. ^ a b "BitLocker Drive Encryption Technical Overview". Microsoft. Archived from the original on 2008-02-24. Retrieved 2008-03-13.
  69. ^ Recovery keys only.
  70. ^ a b c d Roland C. Dowdeswell, John Ioannidis. "The CryptoGraphic Disk Driver" (PDF). CGD Design Paper. Retrieved 2006-12-24.
  71. ^ Federico Biancuzzi (2005-12-21). "Inside NetBSD's CGD". interview with Roland Dowdeswell. ONLamp.com. Archived from the original on 2007-09-29. Retrieved 2006-12-24.
  72. ^ "Operating Systems Supported for System Encryption" (PDF). CipherShed Documentation. CipherShed Project. Retrieved 2014-12-27.
  73. ^ Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
  74. ^ a b "Keyfiles". TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 2014-05-28.
  75. ^ a b "Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?". TrueCrypt FAQ. TrueCrypt Foundation. Archived from the original on 2013-04-16. Retrieved 2014-05-28.
  76. ^ a b "Future". TrueCrypt Foundation. Retrieved 2014-05-24.[permanent dead link]
  77. ^ "CryFS: How it works". Retrieved 2016-09-23.
  78. ^ a b c dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted
  79. ^ a b "DiskCryptor Features". Archived from the original on 2010-05-29. Retrieved 2010-05-25.
  80. ^ "DiskCryptor". GitHub. 10 February 2022.
  81. ^ a b "DISK Protect Data Sheet" (PDF). Retrieved 2018-12-02.
  82. ^ "cryptsetup Frequently Asked Questions". Retrieved 2016-01-07.
  83. ^ a b "Multi level access with separate access credentials, each enabling a different set of functional or logical operations". EISST Ltd. Archived from the original on 2007-09-28. Retrieved 2007-07-25.
  84. ^ uses the lower filesystem (stacking)
  85. ^ a b "Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3". Intel. Retrieved 2012-07-26.
  86. ^ a b c d e Jacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). "Unlocking FileVault: An Analysis of Apple's disk encryption" (PDF). Retrieved 2012-01-03. {{cite journal}}: Cite journal requires |journal= (help)
  87. ^ a b "Mac OS X 10.7 Lion: the Ars Technica review". Ars Technica. 2011-07-20. Retrieved 2012-01-03.
  88. ^ FreeOTFE has a modular architecture and set of components to allow 3rd party integration
  89. ^ FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
  90. ^ a b c d "FreeBSD Handbook: Encrypting Disk Partitions". Retrieved 2006-12-24.
  91. ^ a b c Poul-Henning Kamp. "GBDE - GEOM Based Disk Encryption" (PDF). GBDE Design Document. Retrieved 2006-12-24.
  92. ^ a b "geli(8) man page in FreeBSD-current". GELI manual page in current FreeBSD. Retrieved 2006-12-24.
  93. ^ a b c d e f g h i j k Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23.
  94. ^ Using customization
  95. ^ "McAfee Endpoint Encryption" (PDF). McAfee. Archived from the original (PDF) on 2010-12-17. Retrieved 2012-07-26.
  96. ^ n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
  97. ^ "PGP Whole Disk Encryption FAQ". PGP Corporation. Archived from the original on 2006-12-24. Retrieved 2006-12-24.
  98. ^ PGP private keys are always protected by strengthened passphrases
  99. ^ a b "Embedded Security: Trusted Platform Module Technology Comes of Age". Utimaco. Archived from the original on 2006-08-23. Retrieved 2008-03-04.
  100. ^ "ThinkVantage Technologies Deployment Guide" (PDF). Lenovo. Retrieved 2008-03-05.
  101. ^ a b For TrueCrypt containers
  102. ^ "SecureDoc Product Information". WinMagic Inc. Archived from the original on 2008-03-13. Retrieved 2008-03-05.
  103. ^ optional by using -K OpenBSD Manual Pages: vnconfig(8)
  104. ^ "Endpoint Encryption".
  105. ^ "Solutions for Solid-State Drives (SSD) - Endpoint Encryption". Archived from the original on 2014-11-29. Retrieved 2014-11-17.
  106. ^ "Support for smart card readers - Endpoint Encryption".
  107. ^ a b c "Operating Systems Supported for System Encryption". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 2013-01-08. Retrieved 2014-05-28.
  108. ^ Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
  109. ^ "Operating Systems Supported for System Encryption". VeraCrypt Documentation. IDRIX. Retrieved 2017-10-11.
  110. ^ "Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy". Archived from the original on 2009-08-29. Retrieved 2009-09-17.
  111. ^ Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/
  112. ^ dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
  113. ^ yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
  114. ^ Uses proprietary e-Capsule file system not exposed to the OS.
  115. ^ a b not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
  116. ^ http://macmarshal.com/images/Documents/mm_wp_102.pdf[permanent dead link]
  117. ^ "Use FileVault to encrypt the startup disk on your Mac".
  118. ^ a b File-based volume encryption is possible when used with mdconfig(8) utility.
  119. ^ "Control Break International Debuts SafeBoot Version 4.27". September 2004. Archived from the original on 2015-04-02. Retrieved 2015-03-05.
  120. ^ http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
  121. ^ however, not Windows UEFI-based computers with a GUID partition table (GPT)
  122. ^ LRW_issue
  123. ^ Containers created with ArchiCrypt Live version 5 use LRW
  124. ^ "New features in BestCrypt version 8". Jetico. Archived from the original on 2007-02-04. Retrieved 2007-03-02.
  125. ^ "New features in version 2". Jetico. Archived from the original on 2008-09-05. Retrieved 2009-03-01.
  126. ^ a b Niels Fergusson (August 2006). "AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista" (PDF). Microsoft. Retrieved 2008-02-22. {{cite journal}}: Cite journal requires |journal= (help)
  127. ^ "man 4 cgd in NetBSD-current". NetBSD current manual page on CGD. 2006-03-11. Retrieved 2006-12-24.
  128. ^ a b Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
  129. ^ a b Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
  130. ^ Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.
  131. ^ "CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+" (PDF).
  132. ^ Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/
  133. ^ "cryptsetup - manage plain dm-crypt and LUKS encrypted volumes". 2018-01-01. Retrieved 2018-05-08.
  134. ^ "OS X Lion: About FileVault 2". Retrieved 2011-01-03.
  135. ^ "Linux/BSD disk encryption comparison". Archived from the original on 2007-06-29. Retrieved 2006-12-24.
  136. ^ Pawel Jakub Dawidek (2006-06-08). "Data authentication for geli(8) committed to HEAD". Retrieved 2021-11-22.
  137. ^ For Scramdisk containers
  138. ^ For TrueCrypt 4 containers
  139. ^ For TrueCrypt 5 and 6 containers
  140. ^ "'CVS: cvs.openbsd.org: src' - MARC".
  141. ^ Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.


[edit]