Comparison of disk encryption software: Difference between revisions
Appearance
Content deleted Content added
→Operating systems: clarify one of my edits from a few days ago (upon further experience). |
Removing link(s) to "BitArmor": Removing links to deleted page BitArmor. |
||
(467 intermediate revisions by more than 100 users not shown) | |||
Line 1: | Line 1: | ||
{{short description|None}} |
|||
This is a technical feature '''comparison of different [[disk encryption software]]'''. |
This is a technical feature '''comparison of different [[disk encryption software]]'''. |
||
<!-- NB! Please do ''not'' add a table comparing support for different encryption algorithms, as almost all encryption software supports all popular algorithms, and such a table would be useless for practical information. If you disagree, you are welcome to discuss on the talk page. --> |
<!-- NB! Please do ''not'' add a table comparing support for different encryption algorithms, as almost all encryption software supports all popular algorithms, and such a table would be useless for practical information. If you disagree, you are welcome to discuss on the talk page. --> |
||
Line 5: | Line 7: | ||
{| class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
{| class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
||
|- |
|- |
||
!Name |
! Name |
||
!Developer |
! Developer |
||
!First released |
! First released |
||
!Licensing |
! Licensing |
||
!Maintained? |
! Maintained? |
||
|- |
|||
!{{Rh}}| Aloaha Crypt Disk |
|||
| Aloaha |
|||
| 2008 |
|||
| {{free|Source Auditable for Commercial Customers}} |
|||
| {{yes}} |
|||
|- |
|- |
||
!{{Rh}}| ArchiCrypt Live |
!{{Rh}}| ArchiCrypt Live |
||
Line 19: | Line 27: | ||
!{{Rh}}| [[BestCrypt]] |
!{{Rh}}| [[BestCrypt]] |
||
| Jetico |
| Jetico |
||
| 1993<ref>{{cite web |publisher=Jetico |title=Jetico |
| 1993<ref>{{cite web |publisher=Jetico |title=Jetico Mission |url=https://www.jetico.com/about-jetico/mission-story |access-date=2014-05-30 }}</ref> |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| BitArmor DataControl |
!{{Rh}}| BitArmor DataControl |
||
| |
| BitArmor Systems Inc. |
||
| |
| 2008-05 |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| [[BitLocker |
!{{Rh}}| [[BitLocker]] |
||
| [[Microsoft]] |
| [[Microsoft]] |
||
| 2006 |
| 2006 |
||
Line 35: | Line 43: | ||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| Bloombase |
!{{Rh}}| Bloombase StoreSafe |
||
| [ |
| [https://www.bloombase.com/ Bloombase] |
||
| |
| 2012 |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{no}}<ref>{{cite web|publisher=Bloombase|title=Bloombase StoreSafe|url=https://www.bloombase.com/products/storesafe|access-date=2014-11-28}}</ref> |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| [[Boxcryptor]] |
|||
| Secomba GmbH |
|||
| 2011 |
|||
| {{Proprietary}} |
|||
| {{no}} |
|||
|- |
|- |
||
!{{Rh}}| CGD |
!{{Rh}}| CGD |
||
| Roland C. Dowdeswell |
| Roland C. Dowdeswell |
||
| 2002-10-04<ref>{{cite web |author=Roland Dowdeswell |date=2002-10-04 |title=CryptoGraphic Disk |work=mailing list announcement |url=http://mail-index.netbsd.org/current-users/2002/10/04/0008.html | |
| 2002-10-04<ref>{{cite web |author=Roland Dowdeswell |date=2002-10-04 |title=CryptoGraphic Disk |work=mailing list announcement |url=http://mail-index.netbsd.org/current-users/2002/10/04/0008.html |access-date=2007-01-14 }}</ref> |
||
| {{free|[[BSD licenses|BSD]]}} |
| {{free|[[BSD licenses|BSD]]}} |
||
| {{yes}} |
| {{yes}} |
||
Line 55: | Line 69: | ||
!{{Rh}}| Check Point Full Disk Encryption |
!{{Rh}}| Check Point Full Disk Encryption |
||
| [[Check Point|Check Point Software Technologies Ltd]] |
| [[Check Point|Check Point Software Technologies Ltd]] |
||
| 1999<ref name="infoworld.com"> |
| 1999<ref name="infoworld.com">{{cite web |title=Protect guards laptop and desktop data |url=http://www.infoworld.com/cgi-bin/displayArchive.pl?/99/25/c05-25.48.htm |access-date=2008-09-03 |url-status=dead |archive-url=https://web.archive.org/web/20050302202315/http://www.infoworld.com/cgi-bin/displayArchive.pl?%2F99%2F25%2Fc05-25.48.htm |archive-date=March 2, 2005 }}</ref><ref>Company and product name change to Pointsec {{cite web |title=Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc.|url=http://www.pointsec.com/news/news.asp?newsid=85 |access-date=2008-09-03 |archive-url=https://web.archive.org/web/20040820174918/http://www.pointsec.com/news/news.asp?newsid=85 |archive-date=2004-08-20}}</ref><ref>{{cite web |title=Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent |url=http://www.checkpoint.com/press/2007/protectdataacquisition011107.html |access-date=2008-09-03 |url-status=dead |archive-url=https://web.archive.org/web/20080820034450/http://www.checkpoint.com/press/2007/protectdataacquisition011107.html |archive-date=2008-08-20 }}</ref> |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|||
!{{Rh}}| [[CipherShed]] |
|||
| CipherShed Project |
|||
| 2014<ref>{{cite web |author=Niklas Lemcke | date=2014-12-15 |title=Pre-Alpha testing started |url=https://ciphershed.org/pre-alpha-testing-started/ |access-date=2014-12-24 }}</ref> |
|||
| {{nonfree|TrueCrypt License Version 3.0}}<ref>{{cite web | title =TrueCrypt License Version 3.0 | publisher =TrueCrypt Foundation | date =2012-02-07 | url =https://github.com/CipherShed/CipherShed/blob/master/src/License.txt | access-date = 2014-12-24 }}</ref> |
|||
| {{no}} |
|||
|- |
|- |
||
!{{Rh}}| [[CrossCrypt]] |
!{{Rh}}| [[CrossCrypt]] |
||
| Steven Scherrer |
| Steven Scherrer |
||
| 2004-02-10<ref>{{cite web |author=Sarah Dean | |
| 2004-02-10<ref>{{cite web |author=Sarah Dean |date=2004-02-10 |title=OTFEDB entry |url=http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |access-date=2008-08-10 |url-status=dead |archive-url=https://web.archive.org/web/20081211101509/http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |archive-date=2008-12-11 }}</ref> |
||
| {{free|[[GNU General Public License|GPL]]}} |
| {{free|[[GNU General Public License|GPL]]}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| CryFS |
|||
|Sebastian Messmer |
|||
|2015 |
|||
| {{free|[[GNU Lesser General Public Licence|LGPLv3]]}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| Cryhod |
|||
|Prim'X Technologies |
|||
|2010 |
|||
| {{Proprietary}} |
|||
| {{yes}} |
|||
|- |
|- |
||
!{{Rh}}| Cryptainer |
!{{Rh}}| Cryptainer |
||
| Cypherix |
| Cypherix Software |
||
| |
| 1998 |
||
| {{Proprietary}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| Cryptic Disk |
|||
| Exlade |
|||
| 2003 |
|||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
Line 73: | Line 111: | ||
!{{Rh}}| CryptArchiver |
!{{Rh}}| CryptArchiver |
||
| WinEncrypt |
| WinEncrypt |
||
| {{ |
| {{dunno}} |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[Cryptoloop]] |
||
| {{ |
| {{dunno}} |
||
| 2003-07-02<ref>Initial cryptoloop patches for the Linux 2.5 development kernel: http://uwsg.iu.edu/hypermail/linux/kernel/0307.0/0348.html</ref> |
| 2003-07-02<ref>Initial cryptoloop patches for the Linux 2.5 development kernel: {{cite web |url=http://uwsg.iu.edu/hypermail/linux/kernel/0307.0/0348.html |title=Archived copy |access-date=2006-12-24 |url-status=dead |archive-url=https://web.archive.org/web/20050110090339/http://www.uwsg.iu.edu/hypermail/linux/kernel/0307.0/0348.html |archive-date=2005-01-10 }}</ref> |
||
| {{free|[[GNU General Public License|GPL]]}} |
| {{free|[[GNU General Public License|GPL]]}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[Cryptomator]] |
||
| Skymatic UG (haftungsbeschränkt) |
|||
| SEAhawk |
|||
| 2016-03-09<ref>{{cite web |url=http://www.cryptomator.org/ |title=Home |website=cryptomator.org}}</ref> |
|||
| |
|||
| {{free|[[GPLv3]]}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| CryptoPro Secure Disk Enterprise |
|||
| cpsd it-services GmbH |
|||
| 2010 |
|||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| CryptoPro Secure Disk for BitLocker |
|||
| cpsd it-services GmbH |
|||
| 2012 |
|||
| {{Proprietary}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| CryptSync |
|||
| Stefan Küng |
|||
| 2012 |
|||
| {{free|[[GPL v2]]}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| Discryptor |
!{{Rh}}| Discryptor |
||
| |
| Cosect Ltd. |
||
| 2008 |
| 2008 |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{ |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[DiskCryptor]] |
!{{Rh}}| [[DiskCryptor]] |
||
| ntldr |
| ntldr, David Xanatos |
||
| 2007 |
| 2007 |
||
| {{free|[[GNU General Public License|GPL]]}} |
| {{free|[[GNU General Public License|GPL]]}} |
||
| {{no}}<ref>{{Cite web|url=https://github.com/DavidXanatos/DiskCryptor/releases|title = Releases · DavidXanatos/DiskCryptor|website = [[GitHub]]}}</ref> |
|||
| {{yes}} |
|||
|- |
|- |
||
!{{Rh}}| DISK Protect |
!{{Rh}}| DISK Protect |
||
Line 107: | Line 163: | ||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[Cryptsetup]] / [[Dmsetup]] |
||
| Christophe Saout |
| Christophe Saout |
||
| 2004-03-11<ref>dm-crypt was first included in Linux kernel version 2.6.4: |
| 2004-03-11<ref>dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/</ref> |
||
| {{free|[[GNU General Public License|GPL]]}} |
| {{free|[[GNU General Public License|GPL]]}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[Dm-crypt]] / [[LUKS]] |
||
| Clemens Fruhwirth (LUKS) |
| Clemens Fruhwirth (LUKS) |
||
| 2005-02-05<ref>{{cite web |author=Clemens Fruhwirth |title=LUKS version history |url=http://luks.endorphin.org/dm-crypt | |
| 2005-02-05<ref>{{cite web |author=Clemens Fruhwirth |title=LUKS version history |url=http://luks.endorphin.org/dm-crypt |access-date=2006-12-24 |url-status=dead |archive-url=https://web.archive.org/web/20061225094038/http://luks.endorphin.org/dm-crypt |archive-date=2006-12-25 }}</ref> |
||
| {{free|[[GNU General Public License|GPL]]}} |
| {{free|[[GNU General Public License|GPL]]}} |
||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| DriveCrypt |
|||
| SecurStar GmbH |
|||
| 2001 |
|||
| {{Proprietary}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
Line 129: | Line 179: | ||
| 2008 |
| 2008 |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{ |
| {{No}} |
||
|- |
|- |
||
!{{Rh}}| [[E4M]] |
!{{Rh}}| [[E4M]] |
||
| Paul Le Roux |
| [[Paul Le Roux]] |
||
| 1998-12-18<ref>{{cite web |title=archived E4M documentation|url=http://web.archive.org/web/20000524061402/www.e4m.net/news.html}} |
| 1998-12-18<ref>{{cite web |title=archived E4M documentation|url=http://www.e4m.net/news.html |archive-url=https://web.archive.org/web/20000524061402/http://www.e4m.net/news.html |archive-date=2000-05-24}}</ref> |
||
| {{free|[[Open source software|Open source]]}} |
| {{free|[[Open source software|Open source]]}} |
||
| {{no}} |
| {{no}} |
||
Line 145: | Line 195: | ||
!{{Rh}}| [[eCryptfs]] |
!{{Rh}}| [[eCryptfs]] |
||
| Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) |
| Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) |
||
| 2005<ref>{{cite web |title=eCryptfs |url=http://ecryptfs.sourceforge.net | |
| 2005<ref>{{cite web |title=eCryptfs |url=http://ecryptfs.sourceforge.net |access-date=2008-04-29 }}</ref> |
||
| {{free|[[GNU General Public License|GPL]]}} |
| {{free|[[GNU General Public License|GPL]]}} |
||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| EgoSecure HDD Encryption |
|||
| EgoSecure GmbH |
|||
| 2006 |
|||
| {{Proprietary}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| [[EncFS]] |
|||
| Valient Gough |
|||
| 2003<ref>{{cite web |author=Valient Gough |date=2003 |title= EncFS - an Encrypted Filesystem |work=README.md file |url=https://github.com/vgough/encfs |access-date=2007-01-14 }}</ref> |
|||
| {{free|[[GNU Lesser General Public License|LGPLv3]]}} |
|||
| {{no}} |
|||
|- |
|||
!{{Rh}}| EncryptStick |
|||
| ENC Security Systems |
|||
| 2009 |
|||
| {{Proprietary}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
Line 155: | Line 223: | ||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[FileVault|FileVault 2]] |
||
| [[ |
| [[Apple Inc.]] |
||
| 2011-07-20 |
|||
| 2006 |
|||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
Line 169: | Line 237: | ||
!{{Rh}}| [[FreeOTFE]] |
!{{Rh}}| [[FreeOTFE]] |
||
| Sarah Dean |
| Sarah Dean |
||
| 2004-10-10<ref>{{cite web |title=FreeOTFE version history |url=http://www.freeotfe.org/docs/version_history.htm#version_history | |
| 2004-10-10<ref>{{cite web |title=FreeOTFE version history |url=http://www.freeotfe.org/docs/version_history.htm#version_history |access-date=2006-12-24 |archive-url = https://web.archive.org/web/20061207224351/http://www.freeotfe.org/docs/version_history.htm#version_history <!-- Bot retrieved archive --> |archive-date = 2006-12-07}}</ref> |
||
| {{free|[[Open source software|Open source]]}} |
| {{free|[[Open source software|Open source]]}} |
||
| {{ |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[GBDE]] |
!{{Rh}}| [[GBDE]] |
||
| [[Poul-Henning Kamp]] |
| [[Poul-Henning Kamp]] |
||
| 2002-10-19<ref>{{cite web |title=gbde(4) man page in FreeBSD 4.11 |work=GBDE manual page as it appeared in FreeBSD 4.11 |url=http://www.freebsd.org/cgi/man.cgi?query=gbde&apropos=0&sektion=4&manpath=FreeBSD+5.0-RELEASE&format=html | |
| 2002-10-19<ref>{{cite web |title=gbde(4) man page in FreeBSD 4.11 |work=GBDE manual page as it appeared in FreeBSD 4.11 |url=http://www.freebsd.org/cgi/man.cgi?query=gbde&apropos=0&sektion=4&manpath=FreeBSD+5.0-RELEASE&format=html |access-date=2006-12-24 }}</ref> |
||
| {{free|[[BSD licenses|BSD]]}} |
| {{free|[[BSD licenses|BSD]]}} |
||
| {{ |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[Geli (software)|GELI]] |
!{{Rh}}| [[Geli (software)|GELI]] |
||
| Pawel Jakub Dawidek |
| Pawel Jakub Dawidek |
||
| 2005-04-11<ref>{{cite web |title=geli(8) man page in FreeBSD 6.0 |work=GELI manual page as it first appeared in FreeBSD 6.0 |url=http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+6.0-RELEASE&format=html | |
| 2005-04-11<ref>{{cite web |title=geli(8) man page in FreeBSD 6.0 |work=GELI manual page as it first appeared in FreeBSD 6.0 |url=http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+6.0-RELEASE&format=html |access-date=2006-12-24 }}</ref> |
||
| {{free|[[BSD licenses|BSD]]}} |
| {{free|[[BSD licenses|BSD]]}} |
||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| [[GNU Privacy Guard|GnuPG]] |
|||
| [[Werner Koch]] |
|||
| 1999-09-07<ref>[https://gnupg.org/download/release_notes.html Release Notes. GnuPG]</ref> |
|||
| {{free|[[GNU General Public License|GPL]]}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| gocryptfs |
|||
| Jakob Unterwurzacher |
|||
| 2015-10-07<ref>{{cite web |title=gocryptfs changelog on github |website=[[GitHub]] |url=https://github.com/rfjakob/gocryptfs#changelog |access-date=2018-01-16 }}</ref> |
|||
| {{free|[[MIT License|MIT / X Consortium License]]}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| Knox |
|||
| AgileBits |
|||
| 2010 |
|||
| {{Proprietary}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
Line 191: | Line 277: | ||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| LibreCrypt |
||
| tdk |
|||
| 2014-06-19<ref>{{cite web |title=as received from FreeOTFE version v5.21 with small changes |website=[[GitHub]] |url=https://github.com/t-d-k/LibreCrypt/commit/a395620545beff7736427dfc3b508b4f67609396 |date=2014-06-20 |access-date=2015-09-14 }}</ref> |
|||
| {{free|[[Open source software|Open source]]}} |
|||
| {{no}} |
|||
|- |
|||
!{{Rh}}| Loop-AES |
|||
| Jari Ruusu |
| Jari Ruusu |
||
| 2001-04-11 |
| 2001-04-11 |
||
| {{free|[[GNU General Public License|GPL]]}} |
| {{free|[[GNU General Public License|GPL]]}} |
||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| McAfee Drive Encryption (SafeBoot) |
|||
| [[McAfee|McAfee, LLC]] |
|||
| 2007<ref>{{cite web |publisher=McAfee|title=McAfee Drive Encryption |work=product description |url=https://www.mcafee.com/enterprise/en-us/products/technologies/drive-encryption.html |access-date=2019-07-31 }}</ref> |
|||
| {{Proprietary}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
Line 204: | Line 302: | ||
|- |
|- |
||
!{{Rh}}| [[PGPDisk]] |
!{{Rh}}| [[PGPDisk]] |
||
| [[PGP Corporation]] |
| [[PGP Corporation]] (acquired by Symantec in 2010) |
||
| 1998-09-01<ref>{{cite newsgroup |newsgroup=comp.security.pgp |title=PGP 6.0 Freeware released- any int'l links? |id=6sh4vm$jbf$1@news.cybercity.dk |url= |
| 1998-09-01<ref>{{cite newsgroup |newsgroup=comp.security.pgp |title=PGP 6.0 Freeware released- any int'l links? |message-id=6sh4vm$jbf$1@news.cybercity.dk |url=https://groups.google.com/group/comp.security.pgp/msg/da7ee135c5e99044 |access-date=2007-01-04 }}</ref> |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
Line 213: | Line 311: | ||
| 1993<ref>{{cite web |publisher=Dekart |title=Dekart Encryption software timeline |url=http://www.lazybit.com/index.php/a/2007/04/19/dekart_private_disk_timeline}}</ref> |
| 1993<ref>{{cite web |publisher=Dekart |title=Dekart Encryption software timeline |url=http://www.lazybit.com/index.php/a/2007/04/19/dekart_private_disk_timeline}}</ref> |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| ProxyCrypt |
|||
| v77 |
|||
| 2013 |
|||
| {{free|[[Open source software|Open source]]}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
Line 218: | Line 322: | ||
| R-Tools Technology Inc |
| R-Tools Technology Inc |
||
| 2008 |
| 2008 |
||
| {{Proprietary}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| McAfee Endpoint Encryption (SafeBoot) |
|||
| McAfee, Inc. |
|||
| 2007<ref>{{cite web |publisher=McAfee|title=McAfee Endpoint Encryption |work=product description |url=http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html |accessdate=2009-03-04 }}</ref> |
|||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
Line 229: | Line 327: | ||
!{{Rh}}| SafeGuard Easy |
!{{Rh}}| SafeGuard Easy |
||
| [[Sophos]] (Utimaco) |
| [[Sophos]] (Utimaco) |
||
| 1993<ref>{{cite web |publisher=Utimaco |title=SafeGuard Easy 4.5 Technical Whitepaper |url=http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-easy-dsus.pdf | |
| 1993<ref>{{cite web |publisher=Utimaco |title=SafeGuard Easy 4.5 Technical Whitepaper |url=http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-easy-dsus.pdf |access-date=2009-08-10 }}</ref> |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
Line 235: | Line 333: | ||
!{{Rh}}| SafeGuard Enterprise |
!{{Rh}}| SafeGuard Enterprise |
||
| [[Sophos]] (Utimaco) |
| [[Sophos]] (Utimaco) |
||
| 2007<ref>{{cite web |publisher=Utimaco |title=SafeGuard Enterprise Technical Whitepaper |url=http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-enterprise-dsus.pdf | |
| 2007<ref>{{cite web |publisher=Utimaco |title=SafeGuard Enterprise Technical Whitepaper |url=http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-enterprise-dsus.pdf |access-date=2009-08-10 }}</ref> |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| SafeGuard PrivateDisk |
!{{Rh}}| SafeGuard PrivateDisk |
||
| [[Sophos]] (Utimaco)<ref name="LenovoPrivateDisk">Rebranded as ThinkVantage Client Security {{cite web|url=ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|title=ThinkVantage Technologies Deployment Guide|publisher=[[Lenovo]]| |
| [[Sophos]] (Utimaco)<ref name="LenovoPrivateDisk">Rebranded as ThinkVantage Client Security {{cite web|url=ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|title=ThinkVantage Technologies Deployment Guide|publisher=[[Lenovo]]|access-date=2008-03-05}}{{dead link|date=August 2024|bot=medic}}{{cbignore|bot=medic}}</ref> |
||
| 2000 |
| 2000 |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
Line 261: | Line 359: | ||
| 2005-08-06<ref>{{cite web |title=ScramDisk 4 Linux Releases |url=http://sourceforge.net/project/showfiles.php?group_id=101952&package_id=109447}}</ref> |
| 2005-08-06<ref>{{cite web |title=ScramDisk 4 Linux Releases |url=http://sourceforge.net/project/showfiles.php?group_id=101952&package_id=109447}}</ref> |
||
| {{free|[[GNU General Public License|GPL]]}} |
| {{free|[[GNU General Public License|GPL]]}} |
||
| {{ |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| SecuBox |
!{{Rh}}| SecuBox |
||
Line 270: | Line 368: | ||
|- |
|- |
||
!{{Rh}}| SECUDE Secure Notebook |
!{{Rh}}| SECUDE Secure Notebook |
||
| |
| SECUDE |
||
| 2003 |
| 2003 |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| [[Seqrite]] Encryption Manager |
||
| [[Quick Heal]] Technologies Ltd. |
|||
| WinMagic Inc. |
|||
| |
| 2017 |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
Line 283: | Line 381: | ||
!{{Rh}}| [[Sentry 2020]] |
!{{Rh}}| [[Sentry 2020]] |
||
| SoftWinter |
| SoftWinter |
||
| 1998<ref>{{cite web |title=Sentry 2020 news |url=http://www.softwinter.com/ | |
| 1998<ref>{{cite web |title=Sentry 2020 news |url=http://www.softwinter.com/ |access-date=2007-01-02 }}</ref> |
||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{ |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| Softraid / RAID C |
||
| OpenBSD |
| OpenBSD |
||
| 2007-11-01<ref> |
| 2007-11-01<ref>{{cite web|url=http://www.openbsd.org/plus42.html|title=OpenBSD 4.2 Changelog}}</ref> |
||
| {{free|[[BSD licenses|BSD]]}} |
| {{free|[[BSD licenses|BSD]]}} |
||
| {{yes}} |
| {{yes}} |
||
Line 299: | Line 397: | ||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| Svnd / Vnconfig |
||
| OpenBSD |
| OpenBSD |
||
| 2000-12-01<ref> |
| 2000-12-01<ref>{{cite web|url=http://www.openbsd.org/plus28.html|title=OpenBSD 2.8 Changelog}}</ref> |
||
| {{free|[[BSD licenses|BSD]]}} |
| {{free|[[BSD licenses|BSD]]}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| [[Symantec]] Endpoint Encryption |
!{{Rh}}| [[NortonLifeLock|Symantec]] Endpoint Encryption |
||
| [[ |
| [[NortonLifeLock|Symantec Corporation]] |
||
| 2008 |
| 2008 |
||
| {{Proprietary}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| Tcplay |
|||
| Alex Hornung |
|||
| 2012-01-28<ref>{{cite web|url=https://github.com/bwalex/tc-play/releases|title=bwalex/tc-play|website=[[GitHub]]|date=2019-08-27}}</ref> |
|||
| {{free|[[BSD licenses|BSD]]}} |
|||
| {{no}}<ref>Last update: 2020-03-02 {{cite web|publisher = Github | title = bwalex/tc-play | url=https://github.com/bwalex/tc-play|date=2023-04-03}}</ref> |
|||
|- |
|||
!{{Rh}}| [[Trend Micro]] Endpoint Encryption (Mobile Armor) |
|||
| [[Trend Micro]]<ref>[[Trend Micro]]</ref> |
|||
| 2004 or earlier<ref>{{cite web|url=http://www.mobilearmor.com/products.html|archive-url=https://web.archive.org/web/20040904085456/http://www.mobilearmor.com/products.html|url-status=dead|archive-date=4 September 2004|title=Mobile Armor: Your Data.Secure. Everywhere. |date=4 September 2004}}</ref> |
|||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
Line 313: | Line 423: | ||
!{{Rh}}| [[TrueCrypt]] |
!{{Rh}}| [[TrueCrypt]] |
||
| TrueCrypt Foundation |
| TrueCrypt Foundation |
||
| 2004-02-02<ref> |
| 2004-02-02<ref>{{cite web|url=http://www.truecrypt.org/docs/?s=version-history2|title=TrueCrypt}}</ref> |
||
| {{nonfree|TrueCrypt License 3.1}}<ref>{{cite web | title =TrueCrypt License Version 3.1 | publisher =TrueCrypt Foundation | date =2014-05-28 | url =https://github.com/warewolf/truecrypt/compare/master...7.2#diff-dc5cde275269b574b34b1204b9221cb2L1 | access-date = 2014-05-29 }}</ref> |
|||
| {{free|[http://www.truecrypt.org/legal/license TrueCrypt Collective License]}} |
|||
| {{no}} |
|||
|- |
|||
!{{Rh}}| USBCrypt |
|||
| WinAbility Software Corp. |
|||
| 2010 |
|||
| {{Proprietary}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[VeraCrypt]] |
||
| IDRIX |
|||
| [[Aloaha]] |
|||
| 2013-06-22<ref>{{cite web|url=https://veracrypt.codeplex.com/SourceControl/list/changesets?page=8|title=VeraCrypt}}</ref> |
|||
| 2008 |
|||
| {{free|Apache License 2.0}}<ref>{{cite web | title =Apache License 2.0 | publisher =IDRIX | date =2015-06-28 | url =https://veracrypt.codeplex.com/license | access-date =2015-08-08 | archive-date =2015-07-09 | archive-url =https://web.archive.org/web/20150709234209/https://veracrypt.codeplex.com/license | url-status =dead }}</ref> |
|||
TrueCrypt License Version 3.0 (legacy code only) |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| CyberSafe Top Secret |
|||
| CyberSoft |
|||
| 2013 |
|||
| {{Proprietary}} |
| {{Proprietary}} |
||
| {{yes}} |
| {{yes}} |
||
Line 328: | Line 451: | ||
!{{Rh}}| Licensing |
!{{Rh}}| Licensing |
||
!{{Rh}}| Maintained? |
!{{Rh}}| Maintained? |
||
|- |
|||
!ZzEnc |
|||
![https://imdtech.ru/ru/technologies/fde/ IMDTech] |
|||
!2013 |
|||
!Commercial |
|||
! |
|||
|} |
|} |
||
Line 334: | Line 463: | ||
|- |
|- |
||
! Name |
! Name |
||
! [[Android (operating system)|Android]] |
|||
! [[Windows NT]]-based |
|||
! |
! [[Windows NT]] |
||
! [[iOS]] |
|||
! [[Windows Mobile]]/[[Pocket PC]] |
|||
! [[ |
! [[Mac OS X]] |
||
! [[Linux]] |
! [[Linux]] |
||
! [[ |
! [[FreeBSD]] |
||
! [[NetBSD]] |
|||
! [[OpenBSD]] |
! [[OpenBSD]] |
||
! [[NetBSD]] |
|||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| Aloaha Crypt Disk |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 353: | Line 482: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[BestCrypt]] |
!{{Rh}}| [[BestCrypt]] Volume Encryption |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}}<ref>{{cite web|url=http://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption|title=Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy}}</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 364: | Line 493: | ||
|- |
|- |
||
!{{Rh}}| BitArmor DataControl |
!{{Rh}}| BitArmor DataControl |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 373: | Line 502: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[BitLocker |
!{{Rh}}| [[BitLocker]] |
||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{Partial}}<ref name=dislocker /> |
|||
| {{no}} |
|||
| {{Partial}}<ref name=dislocker>https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX</ref> |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| Bloombase |
!{{Rh}}| Bloombase StoreSafe |
||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
|- |
|||
!{{Rh}}| Boxcryptor |
|||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| CenterTools DriveLock |
!{{Rh}}| CenterTools DriveLock |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 404: | Line 543: | ||
|- |
|- |
||
!{{Rh}}| CGD |
!{{Rh}}| CGD |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 411: | Line 551: | ||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
|- |
|- |
||
!{{Rh}}| Check Point Full Disk Encryption |
!{{Rh}}| Check Point Full Disk Encryption |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<ref>{{cite web |url=http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |title=Archived copy |access-date=2014-12-14 |url-status=dead |archive-url=https://web.archive.org/web/20150923202446/http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |archive-date=2015-09-23 }}</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
| {{no}} |
|||
|- |
|||
!{{Rh}}| [[CipherShed]] |
|||
| {{yes}}<ref name="play.google.com">https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[CrossCrypt]] |
!{{Rh}}| [[CrossCrypt]] |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref>[[CrossCrypt]] - Only for the Microsoft Windows XP/2000 operating systems</ref> |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 431: | Line 581: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| CryFS |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| Cryhod |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{Yes}}<ref>[http://cypherix.com/downloads.htm] PocketPC freeware release- SmartPhone beta available</ref> |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
|- |
|||
!{{Rh}}| Cryptainer |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 444: | Line 613: | ||
|- |
|- |
||
!{{Rh}}| CryptArchiver |
!{{Rh}}| CryptArchiver |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 450: | Line 621: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| Cryptic Disk |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| [[cryptoloop]] |
|||
| {{yes}}<ref name="freeotfe.org">[http://www.freeotfe.org/docs/Main/Linux_volumes.htm] FreeOTFE supports cryptoloop, dm-crypt/cryptsetup, and dm-crypt/LUKS volumes</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
|- |
|||
!{{Rh}}| [[Cryptoloop]] |
|||
| {{dunno}} |
|||
| {{yes}}<ref name="freeotfe.org">http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/[[cryptsetup]]/[[dmsetup]], and dm-crypt/LUKS volumes</ref> |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
Line 463: | Line 642: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| [[Cryptomator]] |
||
| {{yes}} |
|||
| {{yes}}<ref name="cryptomator.org">{{Cite web | url=http://www.cryptomator.org |title = Cryptomator - Free Cloud Encryption}}</ref> |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| CryptoPro Secure Disk Enterprise |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| [[DiskCryptor]] |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| CryptoPro Secure Disk for BitLocker |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 483: | Line 672: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| [[Cryptsetup]] / [[Dmsetup]] |
||
| {{dunno}} |
|||
| {{yes}}<ref name="freeotfe.org"/> |
|||
| {{dunno}} |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| CryptSync |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| Discryptor |
||
| {{dunno}} |
|||
| {{yes}}<ref name="freeotfe.org"/> |
|||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[DiskCryptor]] |
||
| {{dunno}} |
|||
| {{yes}}<ref name="freeotfe.org"/> |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref>[http://www.freeotfe.org/docs/Main/Linux_volumes.htm] FreeOTFE4PDA supports dm-crypt/LUKS volumes</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| DISK Protect |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
|- |
|||
!{{Rh}}| [[Dm-crypt]] / [[LUKS]] |
|||
| {{dunno}} |
|||
| {{yes}}<ref name="freeotfe.org"/> |
|||
| {{dunno}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 524: | Line 733: | ||
|- |
|- |
||
!{{Rh}}| [[DriveSentry]] GoAnywhere 2 |
!{{Rh}}| [[DriveSentry]] GoAnywhere 2 |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 534: | Line 743: | ||
|- |
|- |
||
!{{Rh}}| [[E4M]] |
!{{Rh}}| [[E4M]] |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 544: | Line 753: | ||
|- |
|- |
||
!{{Rh}}| e-Capsule Private Safe |
!{{Rh}}| e-Capsule Private Safe |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
|- |
|||
!{{Rh}}| [[eCryptfs]] |
|||
| {{dunno}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| EgoSecure HDD Encryption |
||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
|- |
|||
!{{Rh}}| [[EncFS]] |
|||
| {{yes}}<ref name="boxcryptor">{{cite web|url=https://www.boxcryptor.com/|title=Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS}}</ref> |
|||
| {{yes}}<ref name="save">{{cite web|url=http://www.getsafe.org/|title=Safe - Protect Your Files|access-date=2016-03-29|archive-url=https://web.archive.org/web/20160421064348/http://www.getsafe.org/|archive-date=2016-04-21|url-status=dead}}</ref> |
|||
| {{dunno}} |
|||
| {{yes}}<ref name="save" /> |
|||
| {{yes}} (FUSE) |
|||
| {{yes}} ([[Filesystem in Userspace|FUSE]]) |
|||
| {{yes}} (FUSE) |
|||
| {{yes}} (FUSE) |
|||
|- |
|||
!{{Rh}}| EncryptStick |
|||
| {{dunno}} |
|||
| {{Yes}} |
|||
| {{dunno}} |
|||
| {{Yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
Line 563: | Line 802: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| EncryptUSB |
||
| {{dunno}} |
|||
| {{Yes}} |
|||
| {{dunno}} |
|||
| {{Yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| [[FileVault]] |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| [[FileVault|FileVault 2]] |
||
| {{dunno}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{partial}}<ref>https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| FREE CompuSec |
|||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 584: | Line 843: | ||
|- |
|- |
||
!{{Rh}}| [[FreeOTFE]] |
!{{Rh}}| [[FreeOTFE]] |
||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{partial}}<ref>http://www.freeotfe.org/docs/Main/Linux_volumes.htm Supports Linux volumes</ref> |
|||
| {{Yes}} |
|||
| {{no}} |
|||
| {{partial}}<ref>[http://www.freeotfe.org/docs/Main/Linux_volumes.htm] Supports Linux volumes</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 594: | Line 853: | ||
|- |
|- |
||
!{{Rh}}| [[GBDE]] |
!{{Rh}}| [[GBDE]] |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[Geli (software)|GELI]] |
!{{Rh}}| [[Geli (software)|GELI]] |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| Knox |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
|- |
|||
!{{Rh}}| LibreCrypt |
|||
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB Third party app allows a user to open LibreCrypt compatible LUKS containers</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
|||
| {{partial}}<ref>https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| Loop-AES |
||
| {{dunno}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| McAfee Drive Encryption (SafeBoot) |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 633: | Line 912: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| n-Crypt Pro |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[PGPDisk]] |
||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
|- |
|||
!{{Rh}}| [[PGP Whole Disk Encryption]] |
|||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[Private Disk]] |
!{{Rh}}| [[Private Disk]] |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 661: | Line 951: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| ProxyCrypt |
|||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| R-Crypto |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 673: | Line 962: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| R-Crypto |
|||
!{{Rh}}| McAfee Endpoint Encryption (SafeBoot) |
|||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{yes}}<ref name="Endpoint Encryption for Mobile">{{cite web|url=http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html|title=Endpoint Encryption Datasheet|publisher=[[McAfee]]|accessdate=2010-06-14}}</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 684: | Line 973: | ||
|- |
|- |
||
!{{Rh}}| SafeGuard Easy |
!{{Rh}}| SafeGuard Easy |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 693: | Line 982: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| SafeGuard Enterprise |
!{{Rh}}| SafeGuard Enterprise |
||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 704: | Line 993: | ||
|- |
|- |
||
!{{Rh}}| SafeGuard PrivateDisk |
!{{Rh}}| SafeGuard PrivateDisk |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 714: | Line 1,003: | ||
|- |
|- |
||
!{{Rh}}| SafeHouse Professional |
!{{Rh}}| SafeHouse Professional |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 724: | Line 1,013: | ||
|- |
|- |
||
!{{Rh}}| [[Scramdisk]] |
!{{Rh}}| [[Scramdisk]] |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
Line 734: | Line 1,023: | ||
|- |
|- |
||
!{{Rh}}| [[Scramdisk]] 4 Linux |
!{{Rh}}| [[Scramdisk]] 4 Linux |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
Line 744: | Line 1,033: | ||
|- |
|- |
||
!{{Rh}}| SecuBox |
!{{Rh}}| SecuBox |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 753: | Line 1,042: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| SecureDoc |
||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
|- |
|||
!{{Rh}}| [[Sentry 2020]] |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 763: | Line 1,062: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| [[Seqrite]] Volume Encryption |
||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| Softraid / RAID C |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| SpyProof! |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| softraid / RAID C |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| Svnd / Vnconfig |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
|- |
|- |
||
!{{Rh}}| [[NortonLifeLock|Symantec]] Endpoint Encryption |
|||
!{{Rh}}| SpyProof! |
|||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{no}}<ref>{{cite web|url=https://www.broadcom.com/products/cybersecurity|title=Endpoint Encryption Powered by PGP Technology - Symantec}}</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| Tcplay |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| [[svnd]] / vnconfig |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| [[Trend Micro]] Endpoint Encryption |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[TrueCrypt]] |
||
| {{yes}}<ref name="play.google.com"/> |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|||
!{{Rh}}| USBCrypt |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 823: | Line 1,152: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| [[ |
!{{Rh}}| [[VeraCrypt]] |
||
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.sovworks.eds.android Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref> |
|||
| {{yes}} |
|||
| {{yes}}<ref>https://apps.apple.com/de/app/disk-decipher/id516538625 Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{no}}<ref>[http://www.truecrypt.org/misc/freebsd] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
Line 833: | Line 1,162: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
!{{Rh}}| |
!{{Rh}}| CyberSafe Top Secret |
||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 844: | Line 1,173: | ||
|-class="sortbottom" |
|-class="sortbottom" |
||
! Name |
! Name |
||
! [[Android (operating system)|Android]] |
|||
! [[Windows NT]]-based |
|||
! |
! [[Windows NT]] |
||
! [[iOS]] |
|||
! [[Windows Mobile]]/[[Pocket PC]] |
|||
! [[Mac OS X]] |
|||
! [[Linux]] |
|||
! [[FreeBSD]] |
! [[FreeBSD]] |
||
! [[ |
! [[OpenBSD]] |
||
! [[Mac OS]] |
|||
! [[NetBSD]] |
! [[NetBSD]] |
||
! [[OpenBSD]] |
|||
|} |
|} |
||
==Features== |
==Features== |
||
* '''Hidden containers''': Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)<ref> |
* '''Hidden containers''': Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)<ref>http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm Hidden containers description from Jetico (BestCrypt)</ref> can be created for [[deniable encryption]]. Note that some [[Block cipher modes of operation|modes of operation]] like CBC with a plain IV can be more prone to [[watermarking attack]]s than others. |
||
* '''Pre-boot authentication''': Whether authentication can be required before booting the computer, thus allowing one to encrypt the [[boot disk]]. |
* '''Pre-boot authentication''': Whether authentication can be required before booting the computer, thus allowing one to encrypt the [[boot disk]]. |
||
* '''[[Single sign-on]]''': Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing [[password fatigue]] and reducing the need to remember multiple passwords. |
|||
* '''Custom authentication''': Whether custom authentication mechanisms can be implemented with third-party applications.{{clarify|e.g. perhaps link to WP's article re: 1-time password (OTP) tokens? See Talk Page: someone else also was confused about exactly what this includes; pls give some examples & links.|date=January 2011}} |
* '''Custom authentication''': Whether custom authentication mechanisms can be implemented with third-party applications.{{clarify|e.g. perhaps link to WP's article re: 1-time password (OTP) tokens? See Talk Page: someone else also was confused about exactly what this includes; pls give some examples & links.|date=January 2011}} |
||
* '''Multiple keys''': Whether an encrypted volume can have more than one active [[ |
* '''Multiple keys''': Whether an encrypted volume can have more than one active [[Key (cryptography)|key]]. |
||
* '''Passphrase strengthening''': Whether [[key strengthening]] is used with plain text passwords to frustrate [[dictionary attack]]s, usually using [[PBKDF2]]. |
* '''Passphrase strengthening''': Whether [[key strengthening]] is used with plain text passwords to frustrate [[dictionary attack]]s, usually using [[PBKDF2]] or [[Argon2]]. |
||
* '''Hardware acceleration''': Whether dedicated [[cryptographic accelerator]] expansion cards can be taken advantage of. |
* '''Hardware acceleration''': Whether dedicated [[cryptographic accelerator]] expansion cards can be taken advantage of. |
||
* '''[[Trusted Platform Module]]''': Whether the implementation can use a TPM [[cryptoprocessor]]. |
* '''[[Trusted Platform Module]]''': Whether the implementation can use a TPM [[cryptoprocessor]]. |
||
* '''[[Two-factor authentication]]''': Whether optional [[security tokens]] ([[ |
* '''Filesystems''': What filesystems are supported. |
||
* '''[[Two-factor authentication]]''': Whether optional [[security tokens]] ([[hardware security module]]s, such as Aladdin eToken and [[smart cards]]) are supported (for example using [[PKCS11|PKCS#11]]) |
|||
{| class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
{| class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
||
|- |
|- |
||
Line 868: | Line 1,199: | ||
! Hidden containers |
! Hidden containers |
||
! Pre-boot authentication |
! Pre-boot authentication |
||
! Single sign-on |
|||
! Custom authentication |
! Custom authentication |
||
! Multiple keys |
! Multiple keys |
||
Line 876: | Line 1,208: | ||
! Two-factor authentication |
! Two-factor authentication |
||
|- |
|- |
||
! Aloaha Secure Stick |
|||
! [[BestCrypt]] |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{n/a}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
| {{yes}}<ref>Supported by the BestCrypt container format; see BestCrypt SDK</ref> |
|||
| {{no}} |
|||
| {{yes|NTFS, FAT32}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|||
! ArchiCrypt Live |
|||
| {{yes}}<ref name="ArchiCrypt">Secret-containers and Camouflage files [http://www.archicrypt-shop.com/ArchiCrypt-Live.htm ArchiCrypt Live Description] {{Webarchive|url=https://web.archive.org/web/20110824163518/http://www.archicrypt-shop.com/ArchiCrypt-Live.htm |date=2011-08-24 }}</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name="ArchiCrypt"/><ref>Supports "Guest" keys</ref> |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
| {{yes}}<ref name="ArchiCrypt"/><ref>Using "Archicrypt Card"</ref> |
|||
|- |
|||
! [[BestCrypt]] |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}}<ref>Supported by the BestCrypt container format; see BestCrypt SDK</ref> |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}}<ref>Supported by the BestCrypt Volume Encryption software</ref> |
| {{yes}}<ref>Supported by the BestCrypt Volume Encryption software</ref> |
||
|- |
|- |
||
! |
! BitArmor DataControl |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
Line 898: | Line 1,256: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
! [[BitLocker |
! [[BitLocker]] |
||
| {{no}} |
| {{no}} |
||
| {{yes}}< |
| {{yes}}<ref>With PIN or USB key</ref> |
||
| {{yes}}<ref>[http://download.microsoft.com/download/a/f/7/af7777e5-7dcd-4800-8a0a-b18336565f5b/BitLockerExt.doc BitLocker Drive Encryption: Value Add Extensibility Options]</ref> |
|||
| {{yes}}<ref name="BL_Overview"/><br /> |
|||
| {{yes}}<br />(Recovery keys only) |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref |
| {{yes}}<ref>[http://download.microsoft.com/download/a/f/7/af7777e5-7dcd-4800-8a0a-b18336565f5b/BitLockerExt.doc BitLocker Drive Encryption: Value Add Extensibility Options]</ref> |
||
| {{yes}}<ref name="BL_Overview"/> |
|||
| {{yes}}<ref>Recovery keys only.</ref> |
|||
| {{yes}} |
|||
| {{yes}}<ref name="BL_Overview">{{Cite web|url=http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true|title=BitLocker Drive Encryption Technical Overview|publisher=[[Microsoft]]|access-date=2008-03-13|url-status=dead|archive-url=https://web.archive.org/web/20080224023214/http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true|archive-date=2008-02-24}}</ref> |
|||
| {{yes|Chiefly NTFS}} {{r|group=Note|BitLockerFS}} |
| {{yes|Chiefly NTFS}} {{r|group=Note|BitLockerFS}} |
||
| {{yes}} {{r|group=Note|BitLocker2F}} |
| {{yes}} {{r|group=Note|BitLocker2F}} |
||
|- |
|- |
||
! Bloombase |
! Bloombase StoreSafe |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
Line 917: | Line 1,277: | ||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{yes|Any supported by OS}} |
||
| {{ |
| {{yes}} |
||
|- |
|- |
||
! CGD |
! CGD |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{yes}}<ref name=cgd-paper>{{cite paper |author=Roland C. Dowdeswell, John Ioannidis |date= |title=The CryptoGraphic Disk Driver |work=CGD design paper |url=http://www.imrryr.org/~elric/cgd/cgd.pdf |format=PDF |accessdate=2006-12-24 }}</ref> |
|||
| {{yes}}<ref name= |
| {{yes}}<ref name=cgd-paper>{{Cite journal |author=Roland C. Dowdeswell, John Ioannidis |title=The CryptoGraphic Disk Driver |journal=CGD Design Paper |url=http://www.imrryr.org/~elric/cgd/cgd.pdf |access-date=2006-12-24 }}</ref> |
||
| {{yes}}<ref name=inside-cgd>{{cite web |author=Federico Biancuzzi |date=2005-12-21 |title=Inside NetBSD's CGD |work=interview with Roland Dowdeswell |url=http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 |publisher=ONLamp.com |access-date=2006-12-24 |archive-date=2007-09-29 |archive-url=https://web.archive.org/web/20070929091538/http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 |url-status=dead }}</ref> |
|||
| {{yes}}<ref name=cgd-paper/> |
| {{yes}}<ref name=cgd-paper/> |
||
| {{no}} |
| {{no}} |
||
Line 933: | Line 1,294: | ||
! CenterTools DriveLock |
! CenterTools DriveLock |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
Line 942: | Line 1,304: | ||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
! |
! Check Point Full Disk Encryption |
||
| {{?}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{?}} |
|||
| {{yes}}<ref name="Lenovo">{{cite web|url=ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|title=ThinkVantage Technologies Deployment Guide|publisher=[[Lenovo]]|accessdate=2008-03-05}}</ref> |
|||
| {{?}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes|NTFS, FAT32}} |
|||
| {{yes}} |
|||
|- |
|||
! [[CipherShed]] |
|||
| {{yes}}<br />(limited to one per<br />"outer" container) |
|||
| {{partial|only on Windows}}<ref>{{cite web | title =Operating Systems Supported for System Encryption | work =CipherShed Documentation | publisher =CipherShed Project | url = https://github.com/CipherShed/CipherShed/blob/v0.7.3.0-dev/doc/userdocs/guide/CipherShed-User-Guide-0.7.3.0.pdf | access-date =2014-12-27 }}</ref> |
|||
| {{dunno}} |
|||
| {{no}} |
|||
| {{yes|yes with multiple keyfiles}}<ref>Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (''cf.'' TrueCrypt FAQ: ''[http://www.truecrypt.org/faq Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?]'')</ref><ref name="truecrypt.org">{{cite web | title =Keyfiles | work =TrueCrypt Documentation | publisher =TrueCrypt Foundation | url =http://www.truecrypt.org/docs/keyfiles | access-date =2014-05-28 }}</ref> |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}}<ref name="TrueCrypt Foundation">{{cite web|title=Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too? |work=TrueCrypt FAQ |publisher=TrueCrypt Foundation |url=http://www.truecrypt.org/faq#tpm |archive-url=https://archive.today/20130416052646/http://www.truecrypt.org/faq |url-status=dead |archive-date=2013-04-16 |access-date=2014-05-28 }}</ref> |
|||
| {{yes|Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged<ref name=TCfuture>{{cite web|title=Future |publisher=TrueCrypt Foundation |url=http://www.truecrypt.org/future.php |access-date=2014-05-24 }}{{dead link|date=November 2016 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> }} |
|||
| {{yes}} |
|||
|- |
|||
! CryFS |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{n/a}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}}<ref>{{cite web|title=CryFS: How it works|url=https://www.cryfs.org/howitworks|access-date=2016-09-23}}</ref> |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes|Any supported by OS}} |
|||
| {{no}} |
|||
|- |
|- |
||
! [[CrossCrypt]] |
! [[CrossCrypt]] |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 961: | Line 1,349: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
Line 967: | Line 1,355: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
|- |
|- |
||
! Cryptic Disk |
|||
! [[cryptoloop]] |
|||
| {{no}} |
|||
| {{yes}}<ref name=dmcrypt-initrd>dm-crypt and cryptoloop volumes can be mounted from the [[initrd]] before the system is booted</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
| {{yes}}{{Citation needed|date=January 2008}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{ |
| {{yes}} |
||
|- |
|- |
||
!Cryhod |
|||
! [[DiskCryptor]] |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
Line 992: | Line 1,382: | ||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}}<ref name=DiskCryptor>{{cite web |title=DiskCryptor Features |url=http://diskcryptor.net/wiki/Main_Page/en |accessdate=2010-05-25}}</ref> |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
! [[Cryptoloop]] |
|||
! DISK Protect |
|||
| {{?}} |
|||
| {{yes}}<ref name=disk-protect>{{cite web |title=DISK Protect 4.2 Data Sheet |format=PDF |url=http://www.becrypt.com/us/downloads/DISK%20Protect%204.2_US.pdf |accessdate=2008-02-27}}</ref> |
|||
| {{?}} |
|||
| {{yes}}<ref name=disk-protect/> |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=dmcrypt-initrd>dm-crypt and cryptoloop volumes can be mounted from the [[initrd]] before the system is booted</ref> |
|||
| {{?}} |
|||
| {{ |
| {{dunno}} |
||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}}{{Citation needed|date=January 2008}} |
|||
| {{no}} |
|||
| {{yes|Any supported by OS}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! [[ |
! [[Cryptomator]] |
||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=dmcrypt-initrd/> |
|||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
Line 1,019: | Line 1,412: | ||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
! CryptoPro Secure Disk Enterprise |
|||
! [[dm-crypt]]/[[LUKS]] |
|||
| {{yes|Yes with add-on Secure Device}} |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
! CryptoPro Secure Disk for BitLocker |
|||
! DriveCrypt |
|||
| {{yes|Yes with add-on Secure Device}} |
|||
| {{yes}}<ref name=drivecrypt>{{cite web |title=DriveCrypt features |publisher=SecurStar GmbH |url=http://www.securstar.com/products_drivecrypt.php |accessdate=2007-01-03 }}</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes|Any supported by OS}} |
|||
| {{yes}} |
|||
|- |
|||
! [[Cryptsetup]] / [[Dmsetup]] |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=dmcrypt-initrd/> |
|||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes|Any supported by OS}} |
|||
| {{yes}} |
|||
|- |
|||
! [[DiskCryptor]] |
|||
| {{no}} |
| {{no}} |
||
| {{ |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}}<ref name=DiskCryptor>{{cite web |title=DiskCryptor Features |url=http://diskcryptor.net/wiki/Main_Page/en |access-date=2010-05-25 |url-status=dead |archive-url=https://web.archive.org/web/20100529120057/http://diskcryptor.net/wiki/Main_Page/en |archive-date=2010-05-29 }}</ref> |
|||
| {{no}} |
|||
| {{yes|Windows volumes on MBR and UEFI GPT drives, ReFs any FS supported by OS<ref>{{Cite web|url=https://github.com/DavidXanatos/DiskCryptor|title = DiskCryptor|website = [[GitHub]]|date = 10 February 2022}}</ref>}} |
|||
| {{yes}}<ref name=DiskCryptor/> |
|||
|- |
|||
! DISK Protect |
|||
| {{no}} |
|||
| {{yes}}<ref name=disk-protect>{{cite web |title=DISK Protect Data Sheet |url=https://www.becrypt.com/uk/uploads/files/Disk%20Protect%20Standard_.pdf |access-date=2018-12-02 }}</ref> |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{yes}}<ref name=disk-protect/> |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes |NTFS, FAT32}} |
|||
| {{yes}} |
|||
|- |
|||
! [[Dm-crypt]] / [[LUKS]] |
|||
| {{no}} |
|||
| {{yes}}<ref name=dmcrypt-initrd/> |
|||
| {{dunno}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{partial|Partial}}<ref name=dm-crypt_tpm>{{cite web |title=cryptsetup Frequently Asked Questions |url=https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions |access-date=2016-01-07 }}</ref> {{r|group=Note|dm-cryptTPM}} |
|||
| {{yes|Any supported by OS}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
Line 1,044: | Line 1,487: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,055: | Line 1,499: | ||
| {{No}} |
| {{No}} |
||
| {{No}} |
| {{No}} |
||
| {{n/a}} |
|||
| {{No}} |
| {{No}} |
||
| {{No}} |
| {{No}} |
||
| {{ |
| {{dunno}} |
||
| {{No}} |
| {{No}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
! e-Capsule Private Safe |
! e-Capsule Private Safe |
||
| {{yes}}<ref name=ps-mla>{{cite web |title=Multi level access with separate access credentials, each enabling a different set of functional or logical operations |publisher=EISST Ltd. |url=http://www.eisst.com/products/private_safe/compare/ | |
| {{yes}}<ref name=ps-mla>{{cite web |title=Multi level access with separate access credentials, each enabling a different set of functional or logical operations |publisher=EISST Ltd. |url=http://www.eisst.com/products/private_safe/compare/ |access-date=2007-07-25 |archive-date=2007-09-28 |archive-url=https://web.archive.org/web/20070928145451/http://www.eisst.com/products/private_safe/compare/ |url-status=dead }}</ref> |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name="ps-mla"/> |
| {{yes}}<ref name="ps-mla"/> |
||
Line 1,071: | Line 1,517: | ||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
|- |
|- |
||
! eCryptfs |
! [[eCryptfs]] |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,082: | Line 1,529: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes |
| {{yes}}<ref>uses the lower filesystem (stacking)</ref> |
||
| {{yes}} |
| {{yes}} |
||
|- |
|||
! EgoSecure HDD Encryption |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}}<ref name="Intel">{{cite web|url=http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-aes-instructions-set/|title=Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3|publisher=Intel|access-date=2012-07-26}}</ref> |
|||
| {{yes}} |
|||
| {{yes|NTFS, FAT32}} |
|||
| {{yes}} |
|||
|- |
|||
! EncryptUSB |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes|NTFS, FAT32, exFAT}} |
|||
| {{no}} |
|||
|- |
|- |
||
! [[FileVault]] |
! [[FileVault]] |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{partial|Two passwords}}<ref name=nsa-vilefault/> |
| {{partial|Two passwords}}<ref name=nsa-vilefault/> |
||
| {{yes}}<ref name=nsa-vilefault>{{ |
| {{yes}}<ref name=nsa-vilefault>{{Cite journal |author=Jacob Appelbaum, Ralf-Philipp Weinmann |date=2006-12-29 |title=Unlocking FileVault: An Analysis of Apple's disk encryption |url=https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf |access-date=2012-01-03 }}</ref> |
||
| ? |
|||
| {{no}} |
|||
| {{yes|HFS+, possibly others}} |
|||
| {{no}} |
|||
|- |
|||
! [[FileVault|FileVault 2]] |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}}<ref name=ars-filevault>{{cite web | url=https://arstechnica.com/apple/reviews/2011/07/mac-os-x-10-7.ars/13 | title= Mac OS X 10.7 Lion: the Ars Technica review | website=Ars Technica | date=2011-07-20 | access-date=2012-01-03 }}</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{yes|HFS+, possibly others}} |
|||
| {{no}} |
| {{no}} |
||
| {{?}} |
|||
| {{?}} |
|||
|- |
|- |
||
! FREE CompuSec |
! FREE CompuSec |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 1,110: | Line 1,595: | ||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{yes}}<ref name=components>FreeOTFE has a modular architecture and set of components to allow 3rd party integration</ref> |
| {{yes}}<ref name=components>FreeOTFE has a modular architecture and set of components to allow 3rd party integration</ref> |
||
| {{yes}}<ref name=keyfiles>FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles</ref> |
| {{yes}}<ref name=keyfiles>FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles</ref> |
||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
Line 1,120: | Line 1,606: | ||
! [[GBDE]] |
! [[GBDE]] |
||
| {{no}} |
| {{no}} |
||
| {{no}}<ref name=freebsd-disk>{{cite web |title=FreeBSD Handbook: Encrypting Disk Partitions |url=http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.html | |
| {{no}}<ref name=freebsd-disk>{{cite web |title=FreeBSD Handbook: Encrypting Disk Partitions |url=http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.html |access-date=2006-12-24 }}</ref> |
||
| {{n/a}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<ref name=gbde-paper>{{ |
| {{yes}}<ref name=gbde-paper>{{Cite journal |author=Poul-Henning Kamp |title=GBDE - GEOM Based Disk Encryption |journal=GBDE Design Document |url=http://phk.freebsd.dk/pubs/bsdcon-03.gbde.paper.pdf |access-date=2006-12-24 |author-link=Poul-Henning Kamp }}</ref> |
||
| {{no}}<ref name=gbde-paper/> |
| {{no}}<ref name=gbde-paper/> |
||
| {{no}}<ref name=freebsd-disk/> |
| {{no}}<ref name=freebsd-disk/> |
||
Line 1,132: | Line 1,619: | ||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=freebsd-disk/> |
| {{yes}}<ref name=freebsd-disk/> |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<ref name=geli-man>{{cite web |title=geli(8) man page in FreeBSD-current |work=GELI manual page in current FreeBSD |url=http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+7-current&format=html | |
| {{yes}}<ref name=geli-man>{{cite web |title=geli(8) man page in FreeBSD-current |work=GELI manual page in current FreeBSD |url=http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+7-current&format=html |access-date=2006-12-24 }}</ref> |
||
| {{yes}}<ref name=geli-man/> |
| {{yes}}<ref name=geli-man/> |
||
| {{yes}}<ref name=freebsd-disk/> |
| {{yes}}<ref name=freebsd-disk/> |
||
Line 1,140: | Line 1,628: | ||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
! Loop-AES |
|||
! [[GuardianEdge]] Hard Disk Encryption |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=loop-aes>{{cite web |author=Jari Ruusu |title=loop-AES README file |url=http://loop-aes.sourceforge.net/loop-AES.README |access-date=2007-04-23 |archive-date=2023-08-23 |archive-url=https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README |url-status=dead }}</ref> |
|||
| {{yes}} |
|||
| {{ |
| {{dunno}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes|NTFS, FAT32}} |
|||
| {{yes}} |
|||
|- |
|||
! loop-AES |
|||
| {{no}} |
|||
| {{yes}}<ref name=loop-aes>{{cite web |author=Jari Ruusu |title=loop-AES README file |url=http://loop-aes.sourceforge.net/loop-AES.README |accessdate=2007-04-23 }}</ref> |
|||
| {{yes}}<ref name=loop-aes/> |
| {{yes}}<ref name=loop-aes/> |
||
| {{yes}}<ref name=loop-aes/> |
| {{yes}}<ref name=loop-aes/> |
||
Line 1,160: | Line 1,638: | ||
| {{no}} |
| {{no}} |
||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}}<ref>Using customization</ref> |
|||
| {{no}} |
|||
|- |
|||
! McAfee Drive Encryption (SafeBoot) |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}}<ref name="Intel"/><ref>{{cite web|url=http://www.mcafee.com/us/resources/data-sheets/ds-endpoint-encryption.pdf|title=McAfee Endpoint Encryption|publisher=McAfee|access-date=2012-07-26|url-status=dead|archive-url=https://web.archive.org/web/20101217175911/http://mcafee.com/us/resources/data-sheets/ds-endpoint-encryption.pdf|archive-date=2010-12-17}}</ref> |
|||
| {{yes}} |
|||
| {{yes|Any supported by OS}} |
|||
| {{yes}} |
|||
|- |
|- |
||
! n-Crypt Pro |
! n-Crypt Pro |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 1,170: | Line 1,661: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
|- |
|- |
||
! [[PGPDisk]] |
! [[PGPDisk]] |
||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=pgp-faq>{{cite web |title=PGP Whole Disk Encryption FAQ |publisher=PGP Corporation |url=http://www.pgp.com/products/wholediskencryption/faq.html | |
| {{yes}}<ref name=pgp-faq>{{cite web |title=PGP Whole Disk Encryption FAQ |publisher=PGP Corporation |url=http://www.pgp.com/products/wholediskencryption/faq.html |access-date=2006-12-24 |archive-date=2006-12-24 |archive-url=https://web.archive.org/web/20061224231228/http://www.pgp.com/products/wholediskencryption/faq.html |url-status=dead }}</ref> |
||
| {{ |
| {{yes}} |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<ref>PGP private keys are always protected by strengthened passphrases</ref> |
| {{yes}}<ref>PGP private keys are always protected by strengthened passphrases</ref> |
||
| {{ |
| {{dunno}} |
||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
Line 1,187: | Line 1,679: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,195: | Line 1,688: | ||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
! ProxyCrypt |
|||
! R-Crypto |
|||
| {{ |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{yes|Any supported by OS}} |
|||
| {{?}} |
|||
|- |
|||
! McAfee Endpoint Encryption |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{no}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}}<ref>{{cite web|url=http://cache-www.intel.com/cd/00/00/44/77/447708_447708.pdf|title=Intel Advanced Encryption Standard: New Instructions|publisher=Intel|accessdate=2010-06-15}}</ref> |
|||
| {{yes}} |
|||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|||
! R-Crypto |
|||
| {{dunno}} |
|||
| {{no}} |
|||
| {{n/a}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{yes|Any supported by OS}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! SafeGuard Easy |
! SafeGuard Easy |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref>{{cite web|url=http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.html|title=Embedded Security: Trusted Platform Module Technology Comes of Age|publisher=Utimaco| |
| {{yes}}<ref name="EmbeddedSecurity">{{cite web|url=http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.html|title=Embedded Security: Trusted Platform Module Technology Comes of Age|publisher=Utimaco|access-date=2008-03-04|url-status=dead|archive-url=https://web.archive.org/web/20060823075648/http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.html|archive-date=2006-08-23}}</ref> |
||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,230: | Line 1,726: | ||
! SafeGuard Enterprise |
! SafeGuard Enterprise |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
Line 1,235: | Line 1,732: | ||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name="EmbeddedSecurity" /> |
|||
| {{yes}}<ref>{{cite web|url=http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.html|title=Embedded Security: Trusted Platform Module Technology Comes of Age|publisher=Utimaco|accessdate=2008-03-04}}</ref> |
|||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,241: | Line 1,738: | ||
! SafeGuard PrivateDisk |
! SafeGuard PrivateDisk |
||
| {{no}} |
| {{no}} |
||
| {{no |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name="Lenovo">{{cite web|url=http://download.lenovo.com/ibmdl/pub/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|title=ThinkVantage Technologies Deployment Guide|publisher=[[Lenovo]]|access-date=2008-03-05}}<!-- old URL ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf --></ref> |
|||
| {{yes}}<ref name="Lenovo"/> |
|||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,253: | Line 1,751: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,264: | Line 1,763: | ||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 1,269: | Line 1,769: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{yes|Last update to web site 2009-07-02}} |
| {{yes|Last update to web site 2009-07-02}} |
||
|- |
|- |
||
! [[Scramdisk]] 4 Linux |
! [[Scramdisk]] 4 Linux |
||
| {{yes}}<ref name=sd4l-tc>For |
| {{yes}}<ref name=sd4l-tc>For TrueCrypt containers</ref> |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 1,286: | Line 1,787: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 1,291: | Line 1,793: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
! SecureDoc |
|||
! FinallySecure Enterprise (SECUDE) |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=sdoc-faq>{{cite web |title=SecureDoc Product Information |publisher=WinMagic Inc. |url=http://www.winmagic.com/solutions/securedoc.html |access-date=2008-03-05 |archive-url=https://web.archive.org/web/20080313174257/http://www.winmagic.com/solutions/securedoc.html |archive-date=2008-03-13 |url-status=dead }}</ref> |
|||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{yes}} |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
! [[Seqrite]] Encryption Manager |
|||
! SecureDoc |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=sdoc-faq>{{cite web |title=SecureDoc Product Information |publisher=WinMagic Inc.|url=http://www.winmagic.com/solutions/securedoc.html |accessdate=2008-03-05 }}</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{no}} |
||
| {{yes}} |
| {{yes|Any supported by OS}} |
||
| {{no}} |
|||
|- |
|- |
||
! [[Sentry 2020]] |
! [[Sentry 2020]] |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 1,324: | Line 1,829: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
! |
! Softraid / RAID C |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{ |
| {{dunno}} |
||
|- |
|- |
||
! |
! Svnd / Vnconfig |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{n/a}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}}<ref>optional by using -K [https://man.openbsd.org/mount_vnd.8#K OpenBSD Manual Pages: vnconfig(8)]</ref> |
||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{ |
| {{dunno}} |
||
|- |
|- |
||
! [[Symantec]] Endpoint Encryption |
! [[NortonLifeLock|Symantec]] Endpoint Encryption |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,360: | Line 1,868: | ||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
! [[Trend Micro]] Endpoint Encryption |
|||
! [[TrueCrypt]] |
|||
| {{yes}}<br />(limited to one per<br />"outer" container) |
|||
| {{partial|only on Windows}}<ref name="truecrypt.org">http://www.truecrypt.org/docs/sys-encryption-supported-os.php</ref> |
|||
| {{no}} |
| {{no}} |
||
| {{no}}<ref>Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (''cf.'' TrueCrypt FAQ: ''Is there a way for an administrator to reset a password when a user forgets it?'')</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}}<ref>{{cite web|url=http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx|title=Endpoint Encryption}}</ref> |
|||
| {{yes}}<ref>{{cite web|url=http://esupport.trendmicro.com/solution/en-US/1058686.aspx|title=Solutions for Solid-State Drives (SSD) - Endpoint Encryption|access-date=2014-11-17|archive-url=https://web.archive.org/web/20141129081340/http://esupport.trendmicro.com/solution/en-US/1058686.aspx|archive-date=2014-11-29|url-status=dead}}</ref> |
|||
| {{no}} |
|||
| {{yes|Any supported by OS}} |
| {{yes|Any supported by OS}} |
||
| {{yes}}<ref>{{cite web|url=http://esupport.trendmicro.com/solution/en-US/1059884.aspx|title=Support for smart card readers - Endpoint Encryption}}</ref> |
|||
|- |
|||
! [[TrueCrypt]] {{r|group=Note|TrueCryptMystery}} |
|||
| {{yes}}<br />(limited to one per<br />"outer" container) |
|||
| {{partial|only on Windows}}<ref name="ReferenceA">{{cite web|title=Operating Systems Supported for System Encryption |work=TrueCrypt Documentation |publisher=TrueCrypt Foundation |url=http://www.truecrypt.org/docs/?s=sys-encryption-supported-os |archive-url=https://archive.today/20130108161502/http://www.truecrypt.org/docs/?s=sys-encryption-supported-os |url-status=dead |archive-date=2013-01-08 |access-date=2014-05-28 }}</ref> |
|||
| {{dunno}} |
|||
| {{no}} |
|||
| {{yes|yes with multiple keyfiles}}<ref name="truecrypt.org"/><ref>Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (''cf.'' TrueCrypt FAQ: ''[http://www.truecrypt.org/faq Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?]'')</ref> |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}}<ref name="TrueCrypt Foundation"/> |
|||
| {{yes|Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged<ref name=TCfuture>{{cite web|title=Future |publisher=TrueCrypt Foundation |url=http://www.truecrypt.org/future.php |access-date=2014-05-24 }}{{dead link|date=November 2016 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> }} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|- |
||
! [[ |
! [[VeraCrypt]] |
||
| {{yes}}<br />(limited to one per<br />"outer" container) |
|||
| {{partial|only on Windows}}<ref>{{cite web |title=Operating Systems Supported for System Encryption |work=VeraCrypt Documentation |publisher =IDRIX |url=https://www.veracrypt.fr/en/Supported%20Systems%20for%20System%20Encryption.html |access-date=2017-10-11}}</ref> |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes|yes with multiple keyfiles}} |
|||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes|Windows on both MBR and UEFI GPT drives; dynamic drives discouraged}} |
|||
| {{yes}} |
| {{yes}} |
||
|- |
|||
! CyberSafe Top Secret |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes|NTFS, FAT32}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{yes|Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged}} |
|||
| {{yes}} |
|||
|-class="sortbottom" |
|-class="sortbottom" |
||
! Name |
! Name |
||
! Hidden containers |
! Hidden containers |
||
! Pre-boot authentication |
! Pre-boot authentication |
||
! Single sign-on |
|||
! Custom authentication |
! Custom authentication |
||
! Multiple keys |
! Multiple keys |
||
Line 1,393: | Line 1,927: | ||
! Filesystems |
! Filesystems |
||
! Two-factor authentication |
! Two-factor authentication |
||
|- |
|||
!ZzEnc |
|||
!No |
|||
!Yes |
|||
!Yes |
|||
!Yes |
|||
!Yes |
|||
!Yes |
|||
!No |
|||
!No |
|||
!Windows, Legacy BIOS & UEFI |
|||
!In UEFI with removable keys store on USB-flash |
|||
|} |
|} |
||
{{ |
{{Reflist|group=Note|refs= |
||
<ref name=BitLocker2F> |
<ref name=BitLocker2F>BitLocker can be used with a TPM PIN + external USB key for two-factor authentication</ref> |
||
<ref name=BitLockerFS> |
<ref name=BitLockerFS>Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, [[Windows Vista]] and later are limited to be installable only on NTFS volumes</ref> |
||
<ref name=dm-cryptTPM>An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the [[standard input]]</ref> |
|||
}} |
|||
<ref name=TrueCryptMystery>The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. https://www.zdnet.com/article/truecrypt-quits-inexplicable/</ref> |
|||
]}} |
|||
==Layering== |
==Layering== |
||
* '''Whole disk''': Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table. |
|||
{{details|Encryption layer in storage stack}} |
|||
* '''Whole disk''': Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to "pre-boot authentication" in the features comparison table. |
|||
* '''Partition''': Whether individual [[disk partition]]s can be encrypted. |
* '''Partition''': Whether individual [[disk partition]]s can be encrypted. |
||
* '''File''': Whether the encrypted container can be stored in a file (usually implemented as encrypted [[loop device]]s). |
* '''File''': Whether the encrypted container can be stored in a file (usually implemented as encrypted [[loop device]]s). |
||
* '''Swap space''': Whether the [[swap space]] (called a "pagefile" on Windows) can be encrypted individually/explicitly. |
* '''Swap space''': Whether the [[swap space]] (called a "pagefile" on Windows) can be encrypted individually/explicitly. |
||
* '''Hibernation file''': Whether the [[Hibernate (OS feature)|hibernation file]] is encrypted (if hibernation is supported). |
* '''Hibernation file''': Whether the [[Hibernate (OS feature)|hibernation file]] is encrypted (if hibernation is supported). |
||
{| class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
{| class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
||
|- |
|- |
||
Line 1,415: | Line 1,962: | ||
! Swap space |
! Swap space |
||
! Hibernation file |
! Hibernation file |
||
! RAID |
|||
|- |
|||
! Aloaha Secure Stick |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! ArchiCrypt Live |
! ArchiCrypt Live |
||
Line 1,422: | Line 1,978: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[BestCrypt]] |
! [[BestCrypt]] |
||
Line 1,428: | Line 1,985: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<ref>http://www.jetico.com/data-protection-encryption-bestcrypt-volume-encryption-enterprise/</ref> |
| {{yes}}<ref>{{cite web|url=http://www.jetico.com/data-protection-encryption-bestcrypt-volume-encryption-enterprise/|title=Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy|access-date=2009-09-17|archive-url=https://web.archive.org/web/20090829172925/http://www.jetico.com/data-protection-encryption-bestcrypt-volume-encryption-enterprise/|archive-date=2009-08-29|url-status=dead}}</ref> |
||
| {{dunno}} |
|||
|- |
|- |
||
! |
! BitArmor DataControl |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,436: | Line 1,994: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[BitLocker |
! [[BitLocker]] |
||
| {{yes}}<br />(except for the boot volume) |
| {{yes}}<br />(except for the boot volume) |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<ref>Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/</ref> |
|||
| {{no}} |
|||
| {{yes}}<br />(parent volume is encrypted) |
| {{yes}}<br />(parent volume is encrypted) |
||
| {{yes}}<br />(parent volume is encrypted) |
| {{yes}}<br />(parent volume is encrypted) |
||
| {{dunno}} |
|||
|- |
|- |
||
! Bloombase |
! Bloombase StoreSafe |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,450: | Line 2,010: | ||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
|- |
|- |
||
! CenterTools DriveLock |
! CenterTools DriveLock |
||
Line 1,457: | Line 2,018: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! CGD |
! CGD |
||
Line 1,464: | Line 2,026: | ||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! Check Point Full Disk Encryption |
! Check Point Full Disk Encryption |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{?}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|||
! [[CipherShed]] |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{partial|only on Windows}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! [[CrossCrypt]] |
! [[CrossCrypt]] |
||
Line 1,478: | Line 2,050: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|||
! CryFS |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! CryptArchiver |
! CryptArchiver |
||
Line 1,485: | Line 2,066: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! Cryptic Disk |
|||
! [[cryptoloop]] |
|||
| {{ |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
|- |
|||
! Cryhod |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{yes}}<br />(parent volume is encrypted) |
|||
| {{dunno}} |
|||
|- |
|- |
||
! [[ |
! [[Cryptoloop]] |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|||
! Cryptomill |
|||
| {{yes}} |
| {{yes}} |
||
| {{n/a}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{n/a}} |
|||
| {{n/a}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! CryptoPro Secure Disk Enterprise |
|||
! [[dm-crypt]] |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<br />(add-on Secure Device) |
|||
| {{yes}}<ref>dm-crypt can encrypt a file-based volume when used with the <tt>losetup</tt> utility included with all major Linux distributions</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}}<ref>yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/</ref> |
|||
| {{dunno}} |
|||
|- |
|- |
||
! CryptoPro Secure Disk for BitLocker |
|||
! DriveCrypt |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|||
! [[DiskCryptor]] |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|||
! [[Disk Protect]] |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|||
! [[Dm-crypt]] / [[Linux Unified Key Setup|LUKS]] |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}}<ref>dm-crypt can encrypt a file-based volume when used with the {{mono|losetup}} utility included with all major Linux distributions</ref> |
|||
| {{yes}} |
|||
| {{yes}}<ref>yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/</ref> |
|||
| {{dunno}} |
|||
|- |
|- |
||
! [[DriveSentry]] GoAnywhere 2 |
! [[DriveSentry]] GoAnywhere 2 |
||
Line 1,520: | Line 2,146: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[E4M]] |
! [[E4M]] |
||
Line 1,527: | Line 2,154: | ||
| {{No}} |
| {{No}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! e-Capsule Private Safe |
! e-Capsule Private Safe |
||
Line 1,534: | Line 2,162: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! eCryptfs |
! eCryptfs |
||
Line 1,541: | Line 2,170: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|||
! EgoSecure HDD Encryption |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|||
! EncryptUSB |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! [[FileVault]] |
! [[FileVault]] |
||
Line 1,546: | Line 2,192: | ||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=nsa-vilefault/> |
| {{yes}}<ref name=nsa-vilefault/> |
||
| {{yes}}<ref name=not-technically-filevault>not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault</ref><ref name=nsa-vilefault/> |
|||
| {{yes}}<ref name=nsa-vilefault/> |
|||
| {{yes}}<ref name=not-technically-filevault /><ref>http://macmarshal.com/images/Documents/mm_wp_102.pdf{{dead link|date=August 2017 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> |
|||
|- |
|||
! [[FileVault|FileVault 2]] |
|||
| {{yes}}<ref name=mac-filevault>{{cite web|url=http://support.apple.com/kb/HT4790?viewlocale=en_US&locale=en_US|title=Use FileVault to encrypt the startup disk on your Mac}}</ref> |
|||
| {{yes}}<ref name=ars-filevault /> |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! FREE CompuSec |
! FREE CompuSec |
||
Line 1,555: | Line 2,209: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[FreeOTFE]] |
! [[FreeOTFE]] |
||
Line 1,562: | Line 2,217: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[GBDE]] |
! [[GBDE]] |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<ref name=mdconfig>File-based volume encryption is possible when used with |
| {{yes}}<ref name=mdconfig>File-based volume encryption is possible when used with [http://www.freebsd.org/cgi/man.cgi?query=mdconfig&sektion=8 {{mono|mdconfig(8)}}] utility.</ref> |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Geli (software)|GELI]] |
! [[Geli (software)|GELI]] |
||
Line 1,576: | Line 2,233: | ||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! Loop-AES |
|||
! [[GuardianEdge]] Hard Disk Encryption |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<ref name=loop-aes/> |
|||
| {{yes}}<ref name=loop-aes/> |
|||
| {{yes}}<ref name=loop-aes/> |
|||
| {{yes}}<ref name=loop-aes/> |
|||
| {{dunno}} |
|||
|- |
|||
! McAfee Drive Encryption (SafeBoot) |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}}<ref name=ControlBreak>{{cite web |title=Control Break International Debuts SafeBoot Version 4.27|date=September 2004 |url=http://connection.ebscohost.com/c/articles/14197489/control-break-international-debuts-safeboot-version-4-27 |archive-url=https://web.archive.org/web/20150402092906/http://connection.ebscohost.com/c/articles/14197489/control-break-international-debuts-safeboot-version-4-27 |url-status=dead |archive-date=2015-04-02 |access-date=2015-03-05}}</ref> |
|||
|- |
|||
| {{dunno}} |
|||
! loop-AES |
|||
| {{yes}} |
|||
| {{yes}}<ref name=loop-aes/> |
|||
| {{yes}}<ref name=loop-aes/> |
|||
| {{yes}}<ref name=loop-aes/> |
|||
| {{no}} |
|||
|- |
|- |
||
! n-Crypt Pro |
! n-Crypt Pro |
||
Line 1,597: | Line 2,257: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[PGPDisk]] |
! [[PGPDisk]] |
||
Line 1,604: | Line 2,265: | ||
| {{yes}} |
| {{yes}} |
||
| {{partial|only on Windows}} |
| {{partial|only on Windows}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Private Disk]] |
! [[Private Disk]] |
||
Line 1,611: | Line 2,273: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|||
! ProxyCrypt |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! R-Crypto |
! R-Crypto |
||
Line 1,618: | Line 2,289: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|||
! Safeboot Device Encryption<br>(Now McAfee Endpoint Encryption) |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}}<ref name=Entrepreneur.com>{{cite web |title=Control Break Internation Debuts SafeBoot Version 4.27 |url=http://www.entrepreneur.com/tradejournals/article/120829729.html |accessdate=2008-08-12}}</ref> |
|||
|- |
|- |
||
! SafeGuard Easy |
! SafeGuard Easy |
||
Line 1,632: | Line 2,297: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes|Each sector on disk is encrypted}} |
| {{yes|Each sector on disk is encrypted}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! SafeGuard Enterprise |
! SafeGuard Enterprise |
||
Line 1,639: | Line 2,305: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes|Each sector on disk is encrypted}} |
| {{yes|Each sector on disk is encrypted}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! SafeGuard PrivateDisk |
! SafeGuard PrivateDisk |
||
Line 1,646: | Line 2,313: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! SafeHouse Professional |
! SafeHouse Professional |
||
Line 1,653: | Line 2,321: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Scramdisk]] |
! [[Scramdisk]] |
||
Line 1,660: | Line 2,329: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Scramdisk]] 4 Linux |
! [[Scramdisk]] 4 Linux |
||
Line 1,667: | Line 2,337: | ||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! SecuBox |
! SecuBox |
||
Line 1,674: | Line 2,345: | ||
| {{n/a}} |
| {{n/a}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Sentry 2020]] |
|||
! FinallySecure Enterprise (SECUDE) |
|||
| {{ |
| {{no}} |
||
| {{ |
| {{no}} |
||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! [[Seqrite]] Encryption Manager |
|||
! SecureDoc |
|||
| {{yes}}<ref name=sdoc-faq /> |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
|- |
|||
! [[Sentry 2020]] |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{yes | RAID-5}} |
||
| {{no}} |
|||
|- |
|- |
||
! |
! Softraid / RAID C |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,702: | Line 2,369: | ||
| {{yes}} (encrypted by default in OpenBSD)<ref>http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes</ref> |
| {{yes}} (encrypted by default in OpenBSD)<ref>http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes</ref> |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! |
! Svnd / Vnconfig |
||
| {{ |
| {{dunno}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} (encrypted by default in OpenBSD) |
| {{yes}} (encrypted by default in OpenBSD) |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! SpyProof! |
! SpyProof! |
||
Line 1,716: | Line 2,385: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Symantec]] Endpoint Encryption |
! [[NortonLifeLock|Symantec]] Endpoint Encryption |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,723: | Line 2,393: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
|- |
|||
! [[Trend Micro]] Endpoint Encryption |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! [[TrueCrypt]] |
! [[TrueCrypt]] |
||
| {{yes}}<ref>however, [http://www.truecrypt.org/future not Windows UEFI-based computers with a GUID partition table (GPT)]</ref> |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{partial|only on Windows}}<ref name="ReferenceA"/> |
|||
| {{dunno}} |
|||
|- |
|||
! [[VeraCrypt]] |
|||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
|||
| {{partial|only on Windows}}<ref name="truecrypt.org"/> |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{partial|only on Windows}}<ref name="ReferenceA"/> |
|||
| {{dunno}} |
|||
|- |
|- |
||
! CyberSafe Top Secret |
|||
! [[Aloaha]] Secure Stick |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|-class="sortbottom" |
|-class="sortbottom" |
||
! Name |
! Name |
||
Line 1,744: | Line 2,433: | ||
! Swap space |
! Swap space |
||
! Hibernation file |
! Hibernation file |
||
! RAID |
|||
|} |
|} |
||
==Modes of operation== |
==Modes of operation== |
||
{{ |
{{further|Disk encryption theory}} |
||
Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation. |
Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation. |
||
* '''CBC with predictable IVs''': The CBC ([[cipher block chaining]]) mode where [[initialization vector]]s are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to [[watermarking attack]]s. |
|||
* '''CBC with predictable IVs''': The CBC (cipher block chaining) mode where [[initialization vector]]s are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to [[watermarking attack]]s. |
|||
* '''CBC with secret IVs''': The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD). |
* '''CBC with secret IVs''': The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD). |
||
* '''CBC with random per-sector keys''': The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See [[GBDE]] for details) |
* '''CBC with random per-sector keys''': The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See [[GBDE]] for details) |
||
* '''LRW''': The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.<ref>[[IEEE P1619#LRW issue|LRW_issue]]</ref> |
* '''LRW''': The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.<ref>[[IEEE P1619#LRW issue|LRW_issue]]</ref> |
||
* '''XTS''': XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the [[IEEE P1619|SISWG]] (IEEE P1619) standard for disk encryption. |
* '''[[Disk encryption theory#XEX-based tweaked-codebook mode with ciphertext stealing (XTS)|XTS]]''': XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the [[IEEE P1619|SISWG]] (IEEE P1619) standard for disk encryption. |
||
* '''[[Authenticated encryption]]''': Protection against ciphertext modification by an attacker |
|||
{| class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
{| class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
||
Line 1,765: | Line 2,455: | ||
! LRW |
! LRW |
||
! XTS |
! XTS |
||
! Authenticated encryption |
|||
|- |
|||
! Aloaha Crypt Disk |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! ArchiCrypt Live |
! ArchiCrypt Live |
||
Line 1,770: | Line 2,469: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{partial|Legacy support}} |
| {{partial|Legacy support}}<ref>Containers created with ArchiCrypt Live version 5 use LRW</ref> |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[BestCrypt]] |
! [[BestCrypt]] |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref>{{cite web |title=New features in BestCrypt version 8 |publisher=Jetico |url=http://www.jetico.com/bc8_web_help/html/03_new_features/01_new_features.htm |access-date=2007-03-02 |archive-url=https://web.archive.org/web/20070204033742/http://www.jetico.com/bc8_web_help/html/03_new_features/01_new_features.htm |archive-date=2007-02-04 |url-status=dead }}</ref> |
|||
| {{no}} |
|||
| {{yes}}<ref>{{cite web |title=New features in |
| {{yes}}<ref>{{cite web |title=New features in version 2 |publisher=Jetico |url=http://www.jetico.com/bcve_web_help/html/01_introduction/04_new_in_version.htm |access-date=2009-03-01 |archive-url=https://web.archive.org/web/20080905174317/http://www.jetico.com/bcve_web_help/html/01_introduction/04_new_in_version.htm |archive-date=2008-09-05 |url-status=dead }}</ref> |
||
| {{dunno}} |
|||
| {{yes}}<ref>{{cite web |title=New features in version 2 |publisher=Jetico |url=http://www.jetico.com/bcve_web_help/html/01_introduction/04_new_in_version.htm |accessdate=2009-03-01 }}</ref> |
|||
|- |
|- |
||
! |
! BitArmor DataControl |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
Line 1,786: | Line 2,487: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[BitLocker |
! [[BitLocker]] |
||
| {{no}}<ref name="Fergusson">{{ |
| {{no}}<ref name="Fergusson">{{Cite journal|author=Niels Fergusson|title=AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista|access-date=2008-02-22|publisher=[[Microsoft]]|date=August 2006|url=http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf}}</ref> |
||
| {{yes}}<ref name="Fergusson"/> |
| {{yes}}<ref name="Fergusson"/> |
||
| {{No}} |
| {{No}} |
||
| {{No}} |
| {{No}} |
||
| {{Yes|Yes, Windows 10 10547+}} |
|||
| {{No}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! Bloombase |
! Bloombase StoreSafe |
||
| {{?}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{yes}} |
||
| {{ |
| {{yes}} |
||
| {{ |
| {{yes}} |
||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! CGD |
! CGD |
||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref>{{cite web |date=2006-03-11 |title=man 4 cgd in NetBSD-current |work=NetBSD current manual page on CGD |url=http://netbsd.gw.com/cgi-bin/man-cgi?cgd+4+NetBSD-current | |
| {{yes}}<ref>{{cite web |date=2006-03-11 |title=man 4 cgd in NetBSD-current |work=NetBSD current manual page on CGD |url=http://netbsd.gw.com/cgi-bin/man-cgi?cgd+4+NetBSD-current |access-date=2006-12-24 }}</ref> |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! CenterTools DriveLock |
! CenterTools DriveLock |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! Check Point Full Disk Encryption |
! Check Point Full Disk Encryption |
||
| {{ |
| {{no}} |
||
| {{ |
| {{no}} |
||
| {{ |
| {{yes}} |
||
| {{ |
| {{yes}} |
||
| {{ |
| {{yes}} |
||
| {{dunno}} |
|||
|- |
|||
! [[CipherShed]] |
|||
| {{partial|Legacy support}}<ref name="ReferenceB">Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.</ref> |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{partial|Legacy support}}<ref name="ReferenceC">Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.</ref> |
|||
| {{yes}}<ref>Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.</ref> |
|||
| {{dunno}} |
|||
|- |
|- |
||
! [[CrossCrypt]] |
! [[CrossCrypt]] |
||
Line 1,828: | Line 2,543: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|||
! CryFS |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! CryptArchiver |
! CryptArchiver |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! Cryptic Disk |
|||
! [[cryptoloop]] |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
|- |
|||
! Cryhod |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}}<ref>{{cite web |title=CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+ |url=https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-2022_35fr.pdf }}</ref> |
|||
| {{dunno}} |
|||
|- |
|||
! [[Cryptoloop]] |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 1,849: | Line 2,591: | ||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[ |
! [[Dm-crypt]] / [[Linux Unified Key Setup|LUKS]] |
||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes|Yes, using *-lrw-benbi}}<ref name=cryptoapi-lrw>Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: |
| {{yes|Yes, using *-lrw-benbi}}<ref name=cryptoapi-lrw>Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/</ref> |
||
| {{yes|Yes, using *-xts-plain}} |
| {{yes|Yes, using *-xts-plain}} |
||
| {{yes|Yes, using <code>--integrity</code> mode<ref>{{cite web |
|||
|- |
|||
| url = https://man.cx/?page=cryptsetup(8) |
|||
! DriveCrypt |
|||
| title = cryptsetup - manage plain dm-crypt and LUKS encrypted volumes |
|||
| {{?}} |
|||
| date = 2018-01-01 | access-date = 2018-05-08 |
|||
| {{?}} |
|||
}}</ref>}} |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
|- |
|- |
||
! [[DriveSentry]] GoAnywhere 2 |
! [[DriveSentry]] GoAnywhere 2 |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[E4M]] |
! [[E4M]] |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! e-Capsule Private Safe |
! e-Capsule Private Safe |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! eCryptfs |
! eCryptfs |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|||
! EgoSecure HDD Encryption |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! [[FileVault]] |
! [[FileVault]] |
||
Line 1,898: | Line 2,651: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|||
! [[FileVault|FileVault 2]] |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}}<ref>{{cite web |title=OS X Lion: About FileVault 2 |url=http://support.apple.com/kb/HT4790 |access-date=2011-01-03}}</ref> |
|||
| {{dunno}} |
|||
|- |
|- |
||
! FREE CompuSec |
! FREE CompuSec |
||
Line 1,905: | Line 2,667: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[FreeOTFE]] |
! [[FreeOTFE]] |
||
Line 1,912: | Line 2,675: | ||
| {{yes}} |
| {{yes}} |
||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
|||
|- |
|- |
||
! [[GBDE]] |
! [[GBDE]] |
||
Line 1,919: | Line 2,683: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Geli (software)|GELI]] |
! [[Geli (software)|GELI]] |
||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=linuxbsd>{{cite web |title=Linux/BSD disk encryption comparison |date= |url=http://mareichelt.de/pub/notmine/linuxbsd-comparison.html | |
| {{yes}}<ref name=linuxbsd>{{cite web |title=Linux/BSD disk encryption comparison |url=http://mareichelt.de/pub/notmine/linuxbsd-comparison.html |access-date=2006-12-24 |url-status=dead |archive-url=https://web.archive.org/web/20070629214031/http://mareichelt.de/pub/notmine/linuxbsd-comparison.html |archive-date=2007-06-29 }}</ref> |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{yes|Yes, using <code>-a</code> option<ref>{{cite web |
|||
| url = https://docs.freebsd.org/cgi/getmsg.cgi?fetch=326862+0+archive/2006/freebsd-current/20060611.freebsd-current |
|||
| title = Data authentication for geli(8) committed to HEAD. |
|||
| author = Pawel Jakub Dawidek |
|||
| date = 2006-06-08 |
|||
| access-date = 2021-11-22 |
|||
}}</ref>}} |
|||
|- |
|- |
||
! Loop-AES |
|||
! [[GuardianEdge]] Hard Disk Encryption |
|||
| {{yes|single-key, multi-key-v2 modes}}<ref name=loop-aes/> |
|||
| {{yes|multi-key-v3 mode}}<ref name=loop-aes/> |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
|- |
|- |
||
! McAfee Drive Encryption (SafeBoot) |
|||
! loop-AES |
|||
| {{yes|single-key, multi-key-v2 modes}}<ref name=loop-aes/> |
|||
| {{yes|multi-key-v3 mode}}<ref name=loop-aes/> |
|||
| {{no}} |
| {{no}} |
||
| {{Yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! n-Crypt Pro |
! n-Crypt Pro |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[PGPDisk]] |
! [[PGPDisk]] |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Private Disk]] |
! [[Private Disk]] |
||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}}{{Citation needed|date=October 2007}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! ProxyCrypt |
|||
! R-Crypto |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
|- |
|||
! McAfee Endpoint Encryption for PC's (SafeBoot Device Encryption) |
|||
| {{no}} |
| {{no}} |
||
| {{Yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|||
! R-Crypto |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! SafeGuard Easy |
! SafeGuard Easy |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! SafeGuard Enterprise |
! SafeGuard Enterprise |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! SafeGuard PrivateDisk |
! SafeGuard PrivateDisk |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! SafeHouse Professional |
! SafeHouse Professional |
||
Line 2,003: | Line 2,785: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Scramdisk]] |
! [[Scramdisk]] |
||
Line 2,010: | Line 2,793: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Scramdisk]] 4 Linux |
! [[Scramdisk]] 4 Linux |
||
Line 2,015: | Line 2,799: | ||
| {{yes}}<ref name=sd4l-sd>For Scramdisk containers</ref> |
| {{yes}}<ref name=sd4l-sd>For Scramdisk containers</ref> |
||
| {{no}} |
| {{no}} |
||
| {{yes}}<ref name=sd4l-tc4>For |
| {{yes}}<ref name=sd4l-tc4>For TrueCrypt 4 containers</ref> |
||
| {{yes}}<ref name=sd4l-tc5-6>For |
| {{yes}}<ref name=sd4l-tc5-6>For TrueCrypt 5 and 6 containers</ref> |
||
| {{dunno}} |
|||
|- |
|- |
||
! SecuBox |
! SecuBox |
||
Line 2,024: | Line 2,809: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|||
! FinallySecure Enterprise (SECUDE) |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
| {{?}} |
|||
|- |
|- |
||
! SecureDoc |
! SecureDoc |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Sentry 2020]] |
! [[Sentry 2020]] |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[Seqrite]] Encryption Manager |
|||
! softraid / RAID C |
|||
| {{ |
| {{no}} |
||
| {{ |
| {{yes}} |
||
| {{ |
| {{no}} |
||
| {{ |
| {{yes}} |
||
| {{yes}} |
|||
| {{yes}} <ref>[http://marc.info/?l=openbsd-cvs&m=121302798322835&w=2 Commit enabling AES XTS]</ref> |
|||
| {{dunno}} |
|||
|- |
|- |
||
! |
! Softraid / RAID C |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{ |
| {{dunno}} |
||
| {{yes}}<ref>{{cite web|url=http://marc.info/?l=openbsd-cvs&m=121302798322835&w=2|title='CVS: cvs.openbsd.org: src' - MARC}}</ref> |
|||
| {{?}} |
|||
| {{dunno}} |
|||
|- |
|- |
||
! Svnd / Vnconfig |
|||
! [[Symantec]] Endpoint Encryption |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
| {{dunno}} |
|||
|- |
|||
! [[NortonLifeLock|Symantec]] Endpoint Encryption |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
Line 2,066: | Line 2,857: | ||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{dunno}} |
|||
|- |
|- |
||
! [[TrueCrypt]] |
! [[TrueCrypt]] |
||
| {{partial|Legacy support}} |
| {{partial|Legacy support}}<ref name="ReferenceB"/> |
||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{partial|Legacy support}} <ref>Containers created with TrueCrypt versions |
| {{partial|Legacy support}}<ref name="ReferenceC"/> |
||
| {{yes}}<ref>Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.</ref> |
|||
| {{no}} |
|||
| {{yes}} <ref>Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.</ref> |
|||
|- |
|- |
||
! USBCrypt |
|||
! [[Aloaha]] Secure Stick |
|||
| {{no}} |
| {{no}} |
||
| {{yes}} |
|||
| {{no}} |
| {{no}} |
||
| {{no}} |
| {{no}} |
||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
|- |
|||
! [[VeraCrypt]] |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
|||
| {{dunno}} |
|||
|- |
|||
! CyberSafe Top Secret |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{yes}} |
| {{yes}} |
||
| {{dunno}} |
|||
|-class="sortbottom" |
|-class="sortbottom" |
||
! Name |
! Name |
||
Line 2,087: | Line 2,897: | ||
! LRW |
! LRW |
||
! XTS |
! XTS |
||
! Authenticated encryption |
|||
|} |
|} |
||
==See also== |
==See also== |
||
* [[Cold boot attack]] |
|||
* [[Comparison of encrypted external drives]] |
|||
* [[Disk encryption software]] |
* [[Disk encryption software]] |
||
* [[Disk encryption theory]] |
* [[Disk encryption theory]] |
||
* [[List of cryptographic file systems]] |
* [[List of cryptographic file systems]] |
||
* [[Cold boot attack]] |
|||
* [[Comparison of encrypted external drives]] |
|||
==Notes and references== |
==Notes and references== |
||
<!--See http://en.wikipedia.org/wiki/Wikipedia:Footnotes for an explanation of how to generate footnotes using the |
<!--See http://en.wikipedia.org/wiki/Wikipedia:Footnotes for an explanation of how to generate footnotes using the<ref> and </ref> tags and the tag below --> |
||
{{Reflist|2}} |
{{Reflist|2}} |
||
Line 2,103: | Line 2,914: | ||
<!-- |
<!-- |
||
Unused references: |
Unused references: |
||
<ref name=modern-systems>{{cite web |author=[[Jacob Appelbaum]] |
<ref name=modern-systems>{{cite web |author=[[Jacob Appelbaum]] |title=Modern Disk Encryption Systems |url=https://events.ccc.de/congress/2005/fahrplan/attachments/714-Slides-Modern_Disk_Encryption_Systems.pdf |format=PDF |access-date=2006-12-24 }}</ref> |
||
--> |
--> |
||
==External links== |
==External links== |
||
* [http://www.hacker10.com/encryption-software-2/diskcryptor-vs-truecrypt-comparison/ DiskCryptor vs Truecrypt] – Comparison between DiskCryptor and TrueCrypt |
|||
* [http://otfedb.sdean12.org/ On-The-Fly Encryption: A Comparison] - A much larger comparison of disk encryption software, sorted by OS |
|||
* [http://www.esecurityplanet.com/mobile-security/buyers-guide-to-full-disk-encryption.html Buyer's Guide to Full Disk Encryption] – Overview of full-disk encryption, how it works, and how it differs from file-level encryption |
|||
[[Category:Disk encryption|*]] |
|||
{{DEFAULTSORT:Comparison Of Disk Encryption Software}} |
|||
[[Category:Disk encryption]] |
[[Category:Security software comparisons|Disk encryption software]] |
||
[[Category: |
[[Category:Cryptographic software|*]] |
||
[[Category:Cryptographic software]] |
|||
[[Category:Cryptography lists and comparisons|Disk encryption software]] |
[[Category:Cryptography lists and comparisons|Disk encryption software]] |
||
[[id:Perbandingan perangkat lunak enkripsi cakram keras]] |
Latest revision as of 03:57, 22 December 2024
This is a technical feature comparison of different disk encryption software.
Background information
[edit]Name | Developer | First released | Licensing | Maintained? |
---|---|---|---|---|
Aloaha Crypt Disk | Aloaha | 2008 | Source Auditable for Commercial Customers | Yes |
ArchiCrypt Live | Softwaredevelopment Remus ArchiCrypt | 1998 | Proprietary | Yes |
BestCrypt | Jetico | 1993[1] | Proprietary | Yes |
BitArmor DataControl | BitArmor Systems Inc. | 2008-05 | Proprietary | Yes |
BitLocker | Microsoft | 2006 | Proprietary | Yes |
Bloombase StoreSafe | Bloombase | 2012 | Proprietary | No[2] |
Boxcryptor | Secomba GmbH | 2011 | Proprietary | No |
CGD | Roland C. Dowdeswell | 2002-10-04[3] | BSD | Yes |
CenterTools DriveLock | CenterTools | 2008 | Proprietary | Yes |
Check Point Full Disk Encryption | Check Point Software Technologies Ltd | 1999[4][5][6] | Proprietary | Yes |
CipherShed | CipherShed Project | 2014[7] | TrueCrypt License Version 3.0[8] | No |
CrossCrypt | Steven Scherrer | 2004-02-10[9] | GPL | No |
CryFS | Sebastian Messmer | 2015 | LGPLv3 | Yes |
Cryhod | Prim'X Technologies | 2010 | Proprietary | Yes |
Cryptainer | Cypherix Software | 1998 | Proprietary | Yes |
Cryptic Disk | Exlade | 2003 | Proprietary | Yes |
CryptArchiver | WinEncrypt | ? | Proprietary | Yes |
Cryptoloop | ? | 2003-07-02[10] | GPL | No |
Cryptomator | Skymatic UG (haftungsbeschränkt) | 2016-03-09[11] | GPLv3 | Yes |
CryptoPro Secure Disk Enterprise | cpsd it-services GmbH | 2010 | Proprietary | Yes |
CryptoPro Secure Disk for BitLocker | cpsd it-services GmbH | 2012 | Proprietary | Yes |
CryptSync | Stefan Küng | 2012 | GPL v2 | Yes |
Discryptor | Cosect Ltd. | 2008 | Proprietary | No |
DiskCryptor | ntldr, David Xanatos | 2007 | GPL | No[12] |
DISK Protect | Becrypt Ltd | 2001 | Proprietary | Yes |
Cryptsetup / Dmsetup | Christophe Saout | 2004-03-11[13] | GPL | Yes |
Dm-crypt / LUKS | Clemens Fruhwirth (LUKS) | 2005-02-05[14] | GPL | Yes |
DriveSentry GoAnywhere 2 | DriveSentry | 2008 | Proprietary | No |
E4M | Paul Le Roux | 1998-12-18[15] | Open source | No |
e-Capsule Private Safe | EISST Ltd. | 2005 | Proprietary | Yes |
eCryptfs | Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) | 2005[16] | GPL | Yes |
EgoSecure HDD Encryption | EgoSecure GmbH | 2006 | Proprietary | Yes |
EncFS | Valient Gough | 2003[17] | LGPLv3 | No |
EncryptStick | ENC Security Systems | 2009 | Proprietary | Yes |
FileVault | Apple Inc. | 2003-10-24 | Proprietary | Yes |
FileVault 2 | Apple Inc. | 2011-07-20 | Proprietary | Yes |
FREE CompuSec | CE-Infosys | 2002 | Proprietary | Yes |
FreeOTFE | Sarah Dean | 2004-10-10[18] | Open source | No |
GBDE | Poul-Henning Kamp | 2002-10-19[19] | BSD | No |
GELI | Pawel Jakub Dawidek | 2005-04-11[20] | BSD | Yes |
GnuPG | Werner Koch | 1999-09-07[21] | GPL | Yes |
gocryptfs | Jakob Unterwurzacher | 2015-10-07[22] | MIT / X Consortium License | Yes |
Knox | AgileBits | 2010 | Proprietary | Yes |
KryptOS | The MorphOS Development Team | 2010 | Proprietary | Yes |
LibreCrypt | tdk | 2014-06-19[23] | Open source | No |
Loop-AES | Jari Ruusu | 2001-04-11 | GPL | Yes |
McAfee Drive Encryption (SafeBoot) | McAfee, LLC | 2007[24] | Proprietary | Yes |
n-Crypt Pro | n-Trance Security Ltd | 2005 | Proprietary | Yes |
PGPDisk | PGP Corporation (acquired by Symantec in 2010) | 1998-09-01[25] | Proprietary | Yes |
Private Disk | Dekart | 1993[26] | Proprietary | Yes |
ProxyCrypt | v77 | 2013 | Open source | Yes |
R-Crypto | R-Tools Technology Inc | 2008 | Proprietary | Yes |
SafeGuard Easy | Sophos (Utimaco) | 1993[27] | Proprietary | Yes |
SafeGuard Enterprise | Sophos (Utimaco) | 2007[28] | Proprietary | Yes |
SafeGuard PrivateDisk | Sophos (Utimaco)[29] | 2000 | Proprietary | Yes |
SafeHouse Professional | PC Dynamics, Inc. | 1992 | Proprietary | Yes |
Scramdisk | Shaun Hollingworth | 1997-07-01 | Open source | No |
Scramdisk 4 Linux | Hans-Ulrich Juettner | 2005-08-06[30] | GPL | No |
SecuBox | Aiko Solutions | 2007-02-19 | Proprietary | Yes |
SECUDE Secure Notebook | SECUDE | 2003 | Proprietary | Yes |
Seqrite Encryption Manager | Quick Heal Technologies Ltd. | 2017 | Proprietary | Yes |
Sentry 2020 | SoftWinter | 1998[31] | Proprietary | No |
Softraid / RAID C | OpenBSD | 2007-11-01[32] | BSD | Yes |
SpyProof! | Information Security Corp. | 2002 | Proprietary | Yes |
Svnd / Vnconfig | OpenBSD | 2000-12-01[33] | BSD | Yes |
Symantec Endpoint Encryption | Symantec Corporation | 2008 | Proprietary | Yes |
Tcplay | Alex Hornung | 2012-01-28[34] | BSD | No[35] |
Trend Micro Endpoint Encryption (Mobile Armor) | Trend Micro[36] | 2004 or earlier[37] | Proprietary | Yes |
TrueCrypt | TrueCrypt Foundation | 2004-02-02[38] | TrueCrypt License 3.1[39] | No |
USBCrypt | WinAbility Software Corp. | 2010 | Proprietary | Yes |
VeraCrypt | IDRIX | 2013-06-22[40] | Apache License 2.0[41]
TrueCrypt License Version 3.0 (legacy code only) |
Yes |
CyberSafe Top Secret | CyberSoft | 2013 | Proprietary | Yes |
Name | Developer | First released | Licensing | Maintained? |
ZzEnc | IMDTech | 2013 | Commercial |
Operating systems
[edit]Name | Android | Windows NT | iOS | Mac OS X | Linux | FreeBSD | OpenBSD | NetBSD |
---|---|---|---|---|---|---|---|---|
Aloaha Crypt Disk | ? | Yes | ? | No | No | No | No | No |
BestCrypt Volume Encryption | ? | Yes | ? | Yes | No[42] | No | No | No |
BitArmor DataControl | ? | Yes | ? | No | No | No | No | No |
BitLocker | No | Yes | ? | Partial[43] | Partial[43] | No | No | No |
Bloombase StoreSafe | ? | Yes | ? | Yes | Yes | Yes | Yes | Yes |
Boxcryptor | Yes | Yes | Yes | Yes | Yes | No | No | No |
CenterTools DriveLock | ? | Yes | ? | No | No | No | No | No |
CGD | ? | No | ? | No | No | No | No | Yes |
Check Point Full Disk Encryption | ? | Yes | ? | Yes | Yes[44] | No | No | No |
CipherShed | Yes[45] | Yes | ? | Yes | Yes | No[46] | No | No |
CrossCrypt | No | Yes[47] | ? | No | No | No | No | No |
CryFS | No | Yes | ? | Yes | Yes | Yes | No | Yes |
Cryhod | ? | Yes | ? | No | Yes | No | No | No |
Cryptainer | ? | Yes | ? | No | No | No | No | No |
CryptArchiver | ? | Yes | ? | No | No | No | No | No |
Cryptic Disk | No | Yes | No | No | No | No | No | No |
Cryptoloop | ? | Yes[48] | ? | No | Yes | No | No | No |
Cryptomator | Yes | Yes[49] | Yes | Yes | Yes | No | No | No |
CryptoPro Secure Disk Enterprise | No | Yes | ? | No | No | No | No | No |
CryptoPro Secure Disk for BitLocker | No | Yes | ? | No | No | No | No | No |
Cryptsetup / Dmsetup | ? | Yes[48] | ? | No | Yes | No | No | No |
CryptSync | No | Yes | ? | Yes | Yes | No | No | No |
Discryptor | ? | No | ? | No | No | No | No | No |
DiskCryptor | ? | Yes | ? | No | No | No | No | No |
DISK Protect | ? | Yes | ? | No | No | No | No | No |
Dm-crypt / LUKS | ? | Yes[48] | ? | No | Yes | No | No | No |
DriveSentry GoAnywhere 2 | ? | Yes | ? | No | No | No | No | No |
E4M | ? | Yes | ? | No | No | No | No | No |
e-Capsule Private Safe | ? | Yes | ? | No | No | No | No | No |
eCryptfs | ? | No | ? | No | Yes | No | No | No |
EgoSecure HDD Encryption | ? | Yes | ? | No | No | No | No | No |
EncFS | Yes[50] | Yes[51] | ? | Yes[51] | Yes (FUSE) | Yes (FUSE) | Yes (FUSE) | Yes (FUSE) |
EncryptStick | ? | Yes | ? | Yes | Yes | No | No | No |
EncryptUSB | ? | Yes | ? | Yes | No | No | No | No |
FileVault | ? | No | ? | Yes | No | No | No | No |
FileVault 2 | ? | No | ? | Yes | Partial[52] | No | No | No |
FREE CompuSec | ? | Yes | ? | No | No | No | No | No |
FreeOTFE | No | Yes | ? | No | Partial[53] | No | No | No |
GBDE | ? | No | ? | No | No | Yes | No | No |
GELI | ? | No | ? | No | No | Yes | No | No |
Knox | ? | No | ? | Yes | No | No | No | No |
LibreCrypt | Yes[54] | Yes | ? | No | Partial[55] | No | No | No |
Loop-AES | ? | No | ? | No | Yes | No | No | No |
McAfee Drive Encryption (SafeBoot) | ? | Yes | ? | Yes | No | No | No | No |
n-Crypt Pro | ? | Yes | ? | No | No | No | No | No |
PGPDisk | ? | Yes | ? | Yes | No | No | No | No |
PGP Whole Disk Encryption | ? | Yes | ? | Yes | Yes | No | No | No |
Private Disk | ? | Yes | ? | No | No | No | No | No |
ProxyCrypt | No | Yes | ? | No | No | No | No | No |
R-Crypto | ? | Yes | ? | No | No | No | No | No |
SafeGuard Easy | ? | Yes | ? | No | No | No | No | No |
SafeGuard Enterprise | ? | Yes | ? | Yes | No | No | No | No |
SafeGuard PrivateDisk | ? | Yes | ? | No | No | No | No | No |
SafeHouse Professional | ? | Yes | ? | No | No | No | No | No |
Scramdisk | ? | Yes | ? | No | Yes | No | No | No |
Scramdisk 4 Linux | ? | No | ? | No | Yes | No | No | No |
SecuBox | ? | No | ? | No | No | No | No | No |
SecureDoc | ? | Yes | ? | Yes | Yes | No | No | No |
Sentry 2020 | ? | Yes | ? | No | No | No | No | No |
Seqrite Volume Encryption | No | Yes | No | No | No | No | No | No |
Softraid / RAID C | ? | No | ? | No | No | No | Yes | No |
SpyProof! | ? | Yes | ? | No | No | No | No | No |
Svnd / Vnconfig | ? | No | ? | No | No | No | Yes | No |
Symantec Endpoint Encryption | ? | Yes | ? | Yes | No[56] | No | No | No |
Tcplay | No | No | ? | No | Yes | No | No | No |
Trend Micro Endpoint Encryption | No | Yes | ? | Yes | No | No | No | No |
TrueCrypt | Yes[45] | Yes | Yes | Yes | Yes | No[57] | No | No |
USBCrypt | No | Yes | ? | No | No | No | No | No |
VeraCrypt | Yes[58] | Yes | Yes[59] | Yes | Yes | Yes | No | No |
CyberSafe Top Secret | Yes | Yes | ? | No | No | No | No | No |
Name | Android | Windows NT | iOS | Mac OS X | Linux | FreeBSD | OpenBSD | NetBSD |
Features
[edit]- Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)[60] can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others.
- Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
- Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.
- Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.[clarification needed]
- Multiple keys: Whether an encrypted volume can have more than one active key.
- Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2 or Argon2.
- Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.
- Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.
- Filesystems: What filesystems are supported.
- Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11)
Name | Hidden containers | Pre-boot authentication | Single sign-on | Custom authentication | Multiple keys | Passphrase strengthening | Hardware acceleration | TPM | Filesystems | Two-factor authentication |
---|---|---|---|---|---|---|---|---|---|---|
Aloaha Secure Stick | Yes | No | — | Yes | Yes | No | No | No | NTFS, FAT32 | Yes |
ArchiCrypt Live | Yes[61] | No | — | No | Yes[61][62] | No | No | No | ? | Yes[61][63] |
BestCrypt | Yes | Yes | Yes | Yes | Yes[64] | Yes | Yes | Yes | Any supported by OS | Yes[65] |
BitArmor DataControl | No | Yes | ? | No | Yes | Yes | No | No | NTFS, FAT32 on non-system volumes | No |
BitLocker | No | Yes[66] | No | Yes[67] | Yes[68] | Yes[69] | Yes | Yes[68] | Chiefly NTFS [Note 1] | Yes [Note 2] |
Bloombase StoreSafe | No | No | — | Yes | Yes | Yes | Yes | No | Any supported by OS | Yes |
CGD | No | No | — | Yes[70] | Yes[71] | Yes[70] | No | No | Any supported by OS | Yes[70] |
CenterTools DriveLock | No | Yes | Yes | No | No | Yes | No | No | Any supported by OS | Yes |
Check Point Full Disk Encryption | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | NTFS, FAT32 | Yes |
CipherShed | Yes (limited to one per "outer" container) |
only on Windows[72] | ? | No | yes with multiple keyfiles[73][74] | Yes | Yes | No[75] | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[76] | Yes |
CryFS | No | No | — | No | No | Yes[77] | No | No | Any supported by OS | No |
CrossCrypt | No | No | — | No | No | No | No | No | ? | No |
CryptArchiver | No | No | — | No | No | ? | No | No | ? | ? |
Cryptic Disk | Yes | No | No | No | Yes | Yes | Yes | No | Any supported by OS | Yes |
Cryhod | No | Yes | Yes | No | Yes | Yes | Yes | No | Any supported by OS | Yes |
Cryptoloop | No | Yes[78] | ? | Yes | No | No | Yes[citation needed] | No | Any supported by OS | ? |
Cryptomator | No | No | — | No | No | Yes | Yes | No | Any supported by OS | No |
CryptoPro Secure Disk Enterprise | Yes with add-on Secure Device | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Any supported by OS | Yes |
CryptoPro Secure Disk for BitLocker | Yes with add-on Secure Device | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Any supported by OS | Yes |
Cryptsetup / Dmsetup | No | Yes[78] | ? | Yes | No | No | Yes | No | Any supported by OS | Yes |
DiskCryptor | No | Yes | ? | No | No | No | Yes[79] | No | Windows volumes on MBR and UEFI GPT drives, ReFs any FS supported by OS[80] | Yes[79] |
DISK Protect | No | Yes[81] | Yes | No | Yes[81] | No | Yes | Yes | NTFS, FAT32 | Yes |
Dm-crypt / LUKS | No | Yes[78] | ? | Yes | Yes | Yes | Yes | Partial[82] [Note 3] | Any supported by OS | Yes |
DriveSentry GoAnywhere 2 | No | No | — | Yes | No | Yes | No | ? | Any supported by OS | Yes |
E4M | No | No | — | No | No | ? | No | No | ? | No |
e-Capsule Private Safe | Yes[83] | No | — | No | Yes[83] | No | Yes | No | ? | ? |
eCryptfs | No | No | — | Yes | Yes | Yes | Yes | Yes | Yes[84] | Yes |
EgoSecure HDD Encryption | No | Yes | Yes | Yes | Yes | Yes | Yes[85] | Yes | NTFS, FAT32 | Yes |
EncryptUSB | No | No | No | No | No | Yes | No | No | NTFS, FAT32, exFAT | No |
FileVault | No | No | — | No | Two passwords[86] | Yes[86] | ? | No | HFS+, possibly others | No |
FileVault 2 | No | Yes | Yes | No | Yes | Yes | Yes[87] | No | HFS+, possibly others | No |
FREE CompuSec | No | Yes | ? | No | No | No | No | No | Any supported by OS | No |
FreeOTFE | Yes | No | — | Yes[88] | Yes[89] | Yes | Yes | No | Any supported by OS | Yes |
GBDE | No | No[90] | — | Yes | Yes[91] | No[91] | No[90] | No | Any supported by OS | Yes |
GELI | No | Yes[90] | ? | Yes | Yes[92] | Yes[92] | Yes[90] | No | Any supported by OS | Yes |
Loop-AES | No | Yes[93] | ? | Yes[93] | Yes[93] | Yes[93] | Yes[93] | No | Any supported by OS | Yes[94] |
McAfee Drive Encryption (SafeBoot) | Yes | Yes | Yes | Yes | Yes | Yes | Yes[85][95] | Yes | Any supported by OS | Yes |
n-Crypt Pro | No | No | — | No | No | —[96] | No | No | ? | ? |
PGPDisk | No | Yes[97] | Yes | ? | Yes | Yes[98] | ? | Yes | ? | Yes |
Private Disk | No | No | — | No | Yes | Yes | No | No | Any supported by OS | Yes |
ProxyCrypt | Yes | No | No | No | No | Yes | Yes | No | Any supported by OS | Yes |
R-Crypto | ? | No | — | ? | ? | ? | ? | ? | Any supported by OS | ? |
SafeGuard Easy | No | Yes | ? | No | Yes | Yes | No | Yes[99] | Any supported by OS | Yes |
SafeGuard Enterprise | No | Yes | Yes | No | Yes | Yes | No | Yes[99] | Any supported by OS | Yes |
SafeGuard PrivateDisk | No | No | — | No | Yes | Yes | No | Yes[100] | Any supported by OS | Yes |
SafeHouse Professional | No | No | — | Yes | Yes | Yes | No | No | Any supported by OS | Yes |
Scramdisk | Yes | No | — | No | No | No | No | No | ? | Last update to web site 2009-07-02 |
Scramdisk 4 Linux | Yes[101] | No | — | No | No | Yes[101] | No | No | ext2, ext3, reiserfs, minix, ntfs, vfat/msdos | No |
SecuBox | No | No | — | No | No | Yes | No | No | ? | No |
SecureDoc | No | Yes[102] | ? | Yes | Yes | Yes | Yes | Yes | ? | Yes |
Seqrite Encryption Manager | No | Yes | Yes | No | Yes | Yes | Yes | No | Any supported by OS | No |
Sentry 2020 | No | No | ? | No | No | No | No | No | ? | No |
Softraid / RAID C | No | No | ? | ? | ? | ? | Yes | ? | Any supported by OS | ? |
Svnd / Vnconfig | No | No | — | No | No | Yes[103] | Yes | ? | Any supported by OS | ? |
Symantec Endpoint Encryption | No | Yes | Yes | Yes | Yes | Yes | No | No | NTFS, FAT32 | Yes |
Trend Micro Endpoint Encryption | No | Yes | Yes | Yes | Yes | Yes[104] | Yes[105] | No | Any supported by OS | Yes[106] |
TrueCrypt [Note 4] | Yes (limited to one per "outer" container) |
only on Windows[107] | ? | No | yes with multiple keyfiles[74][108] | Yes | Yes | No[75] | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[76] | Yes |
VeraCrypt | Yes (limited to one per "outer" container) |
only on Windows[109] | No | No | yes with multiple keyfiles | Yes | Yes | No | Windows on both MBR and UEFI GPT drives; dynamic drives discouraged | Yes |
CyberSafe Top Secret | Yes | No | No | No | Yes | Yes | Yes | No | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged | Yes |
Name | Hidden containers | Pre-boot authentication | Single sign-on | Custom authentication | Multiple keys | Passphrase strengthening | Hardware acceleration | TPM | Filesystems | Two-factor authentication |
ZzEnc | No | Yes | Yes | Yes | Yes | Yes | No | No | Windows, Legacy BIOS & UEFI | In UEFI with removable keys store on USB-flash |
- ^ Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes
- ^ BitLocker can be used with a TPM PIN + external USB key for two-factor authentication
- ^ An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the standard input
- ^ The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. https://www.zdnet.com/article/truecrypt-quits-inexplicable/
Layering
[edit]- Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table.
- Partition: Whether individual disk partitions can be encrypted.
- File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
- Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.
- Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
Name | Whole disk | Partition | File | Swap space | Hibernation file | RAID |
---|---|---|---|---|---|---|
Aloaha Secure Stick | No | No | Yes | No | No | ? |
ArchiCrypt Live | Yes (except for the boot volume) |
Yes | Yes | No | No | ? |
BestCrypt | Yes | Yes | Yes | Yes | Yes[110] | ? |
BitArmor DataControl | No | Yes | No | Yes | Yes | ? |
BitLocker | Yes (except for the boot volume) |
Yes | Yes[111] | Yes (parent volume is encrypted) |
Yes (parent volume is encrypted) |
? |
Bloombase StoreSafe | Yes | Yes | Yes | Yes | No | Yes |
CenterTools DriveLock | Yes | Yes | Yes | Yes | Yes | ? |
CGD | Yes | Yes | Yes[70] | Yes | No | ? |
Check Point Full Disk Encryption | Yes | Yes | Yes | Yes | Yes | ? |
CipherShed | Yes | Yes | Yes | Yes | only on Windows | ? |
CrossCrypt | No | No | Yes | No | No | ? |
CryFS | No | No | No | No | No | ? |
CryptArchiver | No | No | Yes | No | No | ? |
Cryptic Disk | No | Yes | Yes | No | No | ? |
Cryhod | No | Yes | No | Yes | Yes (parent volume is encrypted) |
? |
Cryptoloop | Yes | Yes | Yes | Yes | No | ? |
Cryptomill | Yes | — | Yes | — | — | ? |
CryptoPro Secure Disk Enterprise | Yes | Yes | Yes (add-on Secure Device) |
Yes | Yes | ? |
CryptoPro Secure Disk for BitLocker | Yes | Yes | Yes | Yes | Yes | ? |
DiskCryptor | No | Yes | No | Yes | Yes | ? |
Disk Protect | Yes | No | No | Yes | Yes | ? |
Dm-crypt / LUKS | Yes | Yes | Yes[112] | Yes | Yes[113] | ? |
DriveSentry GoAnywhere 2 | No | Yes | Yes | No | No | ? |
E4M | No | Yes | Yes | No | No | ? |
e-Capsule Private Safe | No | No | Yes[114] | No | No | ? |
eCryptfs | No | No | Yes | No | No | ? |
EgoSecure HDD Encryption | Yes | Yes | Yes | Yes | Yes | ? |
EncryptUSB | No | No | Yes | No | No | ? |
FileVault | No | No | Yes[86] | Yes[115][86] | Yes[115][116] | |
FileVault 2 | Yes[117] | Yes[87] | No | Yes | Yes | ? |
FREE CompuSec | Yes | No | Yes | Yes | Yes | ? |
FreeOTFE | Yes (except for the boot volume) |
Yes | Yes | No | No | ? |
GBDE | Yes | Yes | Yes[118] | Yes | No | ? |
GELI | Yes | Yes | Yes[118] | Yes | No | ? |
Loop-AES | Yes | Yes[93] | Yes[93] | Yes[93] | Yes[93] | ? |
McAfee Drive Encryption (SafeBoot) | Yes | Yes | Yes | Yes | Yes[119] | ? |
n-Crypt Pro | Yes | Yes | Yes | No | No | ? |
PGPDisk | Yes | Yes | Yes | Yes | only on Windows | ? |
Private Disk | No | No | Yes | No | No | ? |
ProxyCrypt | Yes | Yes | Yes | No | No | ? |
R-Crypto | No | No | Yes | No | No | ? |
SafeGuard Easy | Yes | Yes | extra module | Yes | Each sector on disk is encrypted | ? |
SafeGuard Enterprise | Yes | Yes | Yes | Yes | Each sector on disk is encrypted | ? |
SafeGuard PrivateDisk | No | No | Yes | No | No | ? |
SafeHouse Professional | No | No | Yes | No | No | ? |
Scramdisk | No | Yes | Yes | No | No | ? |
Scramdisk 4 Linux | Yes | Yes | Yes | Yes | No | ? |
SecuBox | No | No | Yes | — | No | ? |
Sentry 2020 | No | No | Yes | No | No | ? |
Seqrite Encryption Manager | Yes | Yes | Yes | Yes | Yes | RAID-5 |
Softraid / RAID C | Yes | Yes | No | Yes (encrypted by default in OpenBSD)[120] | No | ? |
Svnd / Vnconfig | ? | Yes | Yes | Yes (encrypted by default in OpenBSD) | ? | ? |
SpyProof! | No | Yes | Yes | No | No | ? |
Symantec Endpoint Encryption | Yes | Yes | Yes | Yes | Yes | ? |
Trend Micro Endpoint Encryption | Yes | Yes | Yes | Yes | Yes | ? |
TrueCrypt | Yes[121] | Yes | Yes | Yes | only on Windows[107] | ? |
VeraCrypt | Yes | Yes | Yes | Yes | only on Windows[107] | ? |
CyberSafe Top Secret | No | Yes | Yes | No | No | ? |
Name | Whole disk | Partition | File | Swap space | Hibernation file | RAID |
Modes of operation
[edit]Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
- CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
- CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
- CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
- LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[122]
- XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
- Authenticated encryption: Protection against ciphertext modification by an attacker
Name | CBC w/ predictable IVs | CBC w/ secret IVs | CBC w/ random per-sector keys | LRW | XTS | Authenticated encryption |
---|---|---|---|---|---|---|
Aloaha Crypt Disk | No | No | No | Yes | Yes | ? |
ArchiCrypt Live | No | No | No | Legacy support[123] | Yes | ? |
BestCrypt | No | Yes | No | Yes[124] | Yes[125] | ? |
BitArmor DataControl | No | Yes | Plumb-IV | No | No | ? |
BitLocker | No[126] | Yes[126] | No | No | Yes, Windows 10 10547+ | ? |
Bloombase StoreSafe | Yes | Yes | Yes | Yes | Yes | ? |
CGD | No | Yes[127] | No | No | No | ? |
CenterTools DriveLock | ? | ? | ? | ? | ? | ? |
Check Point Full Disk Encryption | No | No | Yes | Yes | Yes | ? |
CipherShed | Legacy support[128] | No | No | Legacy support[129] | Yes[130] | ? |
CrossCrypt | Yes | No | No | No | No | ? |
CryFS | No | No | Yes | No | No | ? |
CryptArchiver | ? | ? | ? | ? | ? | ? |
Cryptic Disk | No | No | No | No | Yes | No |
Cryhod | No | Yes | No | No | Yes[131] | ? |
Cryptoloop | Yes | No | No | No | No | No |
DiskCryptor | No | No | No | No | Yes | ? |
Dm-crypt / LUKS | Yes | Yes | No | Yes, using *-lrw-benbi[132] | Yes, using *-xts-plain | Yes, using --integrity mode[133]
|
DriveSentry GoAnywhere 2 | ? | ? | ? | ? | ? | ? |
E4M | ? | ? | ? | No | No | ? |
e-Capsule Private Safe | ? | ? | ? | ? | ? | ? |
eCryptfs | No | Yes | ? | No | No | ? |
EgoSecure HDD Encryption | No | Yes | No | No | No | ? |
FileVault | Yes[86] | No | No | No | No | ? |
FileVault 2 | No | No | No | No | Yes[134] | ? |
FREE CompuSec | Yes | No | No | No | No | ? |
FreeOTFE | Yes | Yes | No | Yes | Yes | No |
GBDE | No | No | Yes[91] | No | No | ? |
GELI | No | Yes[135] | No | No | Yes | Yes, using -a option[136]
|
Loop-AES | single-key, multi-key-v2 modes[93] | multi-key-v3 mode[93] | No | No | No | No |
McAfee Drive Encryption (SafeBoot) | No | Yes | No | No | No | ? |
n-Crypt Pro | ? | ? | No | No | No | ? |
PGPDisk | ? | ? | ? | ? | ? | ? |
Private Disk | No | Yes | No | No | No | ? |
ProxyCrypt | No | No | No | No | Yes | ? |
R-Crypto | ? | ? | ? | ? | ? | ? |
SafeGuard Easy | ? | ? | ? | ? | ? | ? |
SafeGuard Enterprise | ? | ? | ? | ? | ? | ? |
SafeGuard PrivateDisk | ? | ? | ? | ? | ? | ? |
SafeHouse Professional | Yes | No | No | No | No | ? |
Scramdisk | No | Yes | No | No | No | ? |
Scramdisk 4 Linux | No | Yes[137] | No | Yes[138] | Yes[139] | ? |
SecuBox | Yes | No | No | No | No | ? |
SecureDoc | ? | ? | ? | ? | ? | ? |
Sentry 2020 | ? | ? | ? | ? | ? | ? |
Seqrite Encryption Manager | No | Yes | No | Yes | Yes | ? |
Softraid / RAID C | ? | ? | ? | ? | Yes[140] | ? |
Svnd / Vnconfig | ? | ? | ? | ? | ? | ? |
Symantec Endpoint Encryption | No | No | Yes | No | No | ? |
TrueCrypt | Legacy support[128] | No | No | Legacy support[129] | Yes[141] | No |
USBCrypt | No | Yes | No | No | Yes | ? |
VeraCrypt | No | No | No | No | Yes | ? |
CyberSafe Top Secret | No | No | No | No | Yes | ? |
Name | CBC w/ predictable IVs | CBC w/ secret IVs | CBC w/ random per-sector keys | LRW | XTS | Authenticated encryption |
See also
[edit]- Cold boot attack
- Comparison of encrypted external drives
- Disk encryption software
- Disk encryption theory
- List of cryptographic file systems
Notes and references
[edit]- ^ "Jetico Mission". Jetico. Retrieved 2014-05-30.
- ^ "Bloombase StoreSafe". Bloombase. Retrieved 2014-11-28.
- ^ Roland Dowdeswell (2002-10-04). "CryptoGraphic Disk". mailing list announcement. Retrieved 2007-01-14.
- ^ "Protect guards laptop and desktop data". Archived from the original on March 2, 2005. Retrieved 2008-09-03.
- ^ Company and product name change to Pointsec "Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc". Archived from the original on 2004-08-20. Retrieved 2008-09-03.
- ^ "Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent". Archived from the original on 2008-08-20. Retrieved 2008-09-03.
- ^ Niklas Lemcke (2014-12-15). "Pre-Alpha testing started". Retrieved 2014-12-24.
- ^ "TrueCrypt License Version 3.0". TrueCrypt Foundation. 2012-02-07. Retrieved 2014-12-24.
- ^ Sarah Dean (2004-02-10). "OTFEDB entry". Archived from the original on 2008-12-11. Retrieved 2008-08-10.
- ^ Initial cryptoloop patches for the Linux 2.5 development kernel: "Archived copy". Archived from the original on 2005-01-10. Retrieved 2006-12-24.
{{cite web}}
: CS1 maint: archived copy as title (link) - ^ "Home". cryptomator.org.
- ^ "Releases · DavidXanatos/DiskCryptor". GitHub.
- ^ dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/
- ^ Clemens Fruhwirth. "LUKS version history". Archived from the original on 2006-12-25. Retrieved 2006-12-24.
- ^ "archived E4M documentation". Archived from the original on 2000-05-24.
- ^ "eCryptfs". Retrieved 2008-04-29.
- ^ Valient Gough (2003). "EncFS - an Encrypted Filesystem". README.md file. Retrieved 2007-01-14.
- ^ "FreeOTFE version history". Archived from the original on 2006-12-07. Retrieved 2006-12-24.
- ^ "gbde(4) man page in FreeBSD 4.11". GBDE manual page as it appeared in FreeBSD 4.11. Retrieved 2006-12-24.
- ^ "geli(8) man page in FreeBSD 6.0". GELI manual page as it first appeared in FreeBSD 6.0. Retrieved 2006-12-24.
- ^ Release Notes. GnuPG
- ^ "gocryptfs changelog on github". GitHub. Retrieved 2018-01-16.
- ^ "as received from FreeOTFE version v5.21 with small changes". GitHub. 2014-06-20. Retrieved 2015-09-14.
- ^ "McAfee Drive Encryption". product description. McAfee. Retrieved 2019-07-31.
- ^ "PGP 6.0 Freeware released- any int'l links?". Newsgroup: comp.security.pgp. Usenet: 6sh4vm$jbf$1@news.cybercity.dk. Retrieved 2007-01-04.
- ^ "Dekart Encryption software timeline". Dekart.
- ^ "SafeGuard Easy 4.5 Technical Whitepaper" (PDF). Utimaco. Retrieved 2009-08-10.
- ^ "SafeGuard Enterprise Technical Whitepaper" (PDF). Utimaco. Retrieved 2009-08-10.
- ^ Rebranded as ThinkVantage Client Security "ThinkVantage Technologies Deployment Guide" (PDF). Lenovo. Retrieved 2008-03-05.[dead link ]
- ^ "ScramDisk 4 Linux Releases".
- ^ "Sentry 2020 news". Retrieved 2007-01-02.
- ^ "OpenBSD 4.2 Changelog".
- ^ "OpenBSD 2.8 Changelog".
- ^ "bwalex/tc-play". GitHub. 2019-08-27.
- ^ Last update: 2020-03-02 "bwalex/tc-play". Github. 2023-04-03.
- ^ Trend Micro
- ^ "Mobile Armor: Your Data.Secure. Everywhere". 4 September 2004. Archived from the original on 4 September 2004.
- ^ "TrueCrypt".
- ^ "TrueCrypt License Version 3.1". TrueCrypt Foundation. 2014-05-28. Retrieved 2014-05-29.
- ^ "VeraCrypt".
- ^ "Apache License 2.0". IDRIX. 2015-06-28. Archived from the original on 2015-07-09. Retrieved 2015-08-08.
- ^ "Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy".
- ^ a b https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX
- ^ "Archived copy" (PDF). Archived from the original (PDF) on 2015-09-23. Retrieved 2014-12-14.
{{cite web}}
: CS1 maint: archived copy as title (link) - ^ a b https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system
- ^ http://www.truecrypt.org/misc/freebsd Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used
- ^ CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems
- ^ a b c http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes
- ^ "Cryptomator - Free Cloud Encryption".
- ^ "Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS".
- ^ a b "Safe - Protect Your Files". Archived from the original on 2016-04-21. Retrieved 2016-03-29.
- ^ https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes
- ^ http://www.freeotfe.org/docs/Main/Linux_volumes.htm Supports Linux volumes
- ^ https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB Third party app allows a user to open LibreCrypt compatible LUKS containers
- ^ https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes
- ^ "Endpoint Encryption Powered by PGP Technology - Symantec".
- ^ http://www.truecrypt.org/misc/freebsd Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used
- ^ https://play.google.com/store/apps/details?id=com.sovworks.eds.android Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
- ^ https://apps.apple.com/de/app/disk-decipher/id516538625 Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
- ^ http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm Hidden containers description from Jetico (BestCrypt)
- ^ a b c Secret-containers and Camouflage files ArchiCrypt Live Description Archived 2011-08-24 at the Wayback Machine
- ^ Supports "Guest" keys
- ^ Using "Archicrypt Card"
- ^ Supported by the BestCrypt container format; see BestCrypt SDK
- ^ Supported by the BestCrypt Volume Encryption software
- ^ With PIN or USB key
- ^ BitLocker Drive Encryption: Value Add Extensibility Options
- ^ a b "BitLocker Drive Encryption Technical Overview". Microsoft. Archived from the original on 2008-02-24. Retrieved 2008-03-13.
- ^ Recovery keys only.
- ^ a b c d Roland C. Dowdeswell, John Ioannidis. "The CryptoGraphic Disk Driver" (PDF). CGD Design Paper. Retrieved 2006-12-24.
- ^ Federico Biancuzzi (2005-12-21). "Inside NetBSD's CGD". interview with Roland Dowdeswell. ONLamp.com. Archived from the original on 2007-09-29. Retrieved 2006-12-24.
- ^ "Operating Systems Supported for System Encryption" (PDF). CipherShed Documentation. CipherShed Project. Retrieved 2014-12-27.
- ^ Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
- ^ a b "Keyfiles". TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 2014-05-28.
- ^ a b "Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?". TrueCrypt FAQ. TrueCrypt Foundation. Archived from the original on 2013-04-16. Retrieved 2014-05-28.
- ^ a b "Future". TrueCrypt Foundation. Retrieved 2014-05-24.[permanent dead link ]
- ^ "CryFS: How it works". Retrieved 2016-09-23.
- ^ a b c dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted
- ^ a b "DiskCryptor Features". Archived from the original on 2010-05-29. Retrieved 2010-05-25.
- ^ "DiskCryptor". GitHub. 10 February 2022.
- ^ a b "DISK Protect Data Sheet" (PDF). Retrieved 2018-12-02.
- ^ "cryptsetup Frequently Asked Questions". Retrieved 2016-01-07.
- ^ a b "Multi level access with separate access credentials, each enabling a different set of functional or logical operations". EISST Ltd. Archived from the original on 2007-09-28. Retrieved 2007-07-25.
- ^ uses the lower filesystem (stacking)
- ^ a b "Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3". Intel. Retrieved 2012-07-26.
- ^ a b c d e Jacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). "Unlocking FileVault: An Analysis of Apple's disk encryption" (PDF). Retrieved 2012-01-03.
{{cite journal}}
: Cite journal requires|journal=
(help) - ^ a b "Mac OS X 10.7 Lion: the Ars Technica review". Ars Technica. 2011-07-20. Retrieved 2012-01-03.
- ^ FreeOTFE has a modular architecture and set of components to allow 3rd party integration
- ^ FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
- ^ a b c d "FreeBSD Handbook: Encrypting Disk Partitions". Retrieved 2006-12-24.
- ^ a b c Poul-Henning Kamp. "GBDE - GEOM Based Disk Encryption" (PDF). GBDE Design Document. Retrieved 2006-12-24.
- ^ a b "geli(8) man page in FreeBSD-current". GELI manual page in current FreeBSD. Retrieved 2006-12-24.
- ^ a b c d e f g h i j k Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23.
- ^ Using customization
- ^ "McAfee Endpoint Encryption" (PDF). McAfee. Archived from the original (PDF) on 2010-12-17. Retrieved 2012-07-26.
- ^ n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
- ^ "PGP Whole Disk Encryption FAQ". PGP Corporation. Archived from the original on 2006-12-24. Retrieved 2006-12-24.
- ^ PGP private keys are always protected by strengthened passphrases
- ^ a b "Embedded Security: Trusted Platform Module Technology Comes of Age". Utimaco. Archived from the original on 2006-08-23. Retrieved 2008-03-04.
- ^ "ThinkVantage Technologies Deployment Guide" (PDF). Lenovo. Retrieved 2008-03-05.
- ^ a b For TrueCrypt containers
- ^ "SecureDoc Product Information". WinMagic Inc. Archived from the original on 2008-03-13. Retrieved 2008-03-05.
- ^ optional by using -K OpenBSD Manual Pages: vnconfig(8)
- ^ "Endpoint Encryption".
- ^ "Solutions for Solid-State Drives (SSD) - Endpoint Encryption". Archived from the original on 2014-11-29. Retrieved 2014-11-17.
- ^ "Support for smart card readers - Endpoint Encryption".
- ^ a b c "Operating Systems Supported for System Encryption". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 2013-01-08. Retrieved 2014-05-28.
- ^ Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
- ^ "Operating Systems Supported for System Encryption". VeraCrypt Documentation. IDRIX. Retrieved 2017-10-11.
- ^ "Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy". Archived from the original on 2009-08-29. Retrieved 2009-09-17.
- ^ Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/
- ^ dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
- ^ yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
- ^ Uses proprietary e-Capsule file system not exposed to the OS.
- ^ a b not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
- ^ http://macmarshal.com/images/Documents/mm_wp_102.pdf[permanent dead link ]
- ^ "Use FileVault to encrypt the startup disk on your Mac".
- ^ a b File-based volume encryption is possible when used with mdconfig(8) utility.
- ^ "Control Break International Debuts SafeBoot Version 4.27". September 2004. Archived from the original on 2015-04-02. Retrieved 2015-03-05.
- ^ http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
- ^ however, not Windows UEFI-based computers with a GUID partition table (GPT)
- ^ LRW_issue
- ^ Containers created with ArchiCrypt Live version 5 use LRW
- ^ "New features in BestCrypt version 8". Jetico. Archived from the original on 2007-02-04. Retrieved 2007-03-02.
- ^ "New features in version 2". Jetico. Archived from the original on 2008-09-05. Retrieved 2009-03-01.
- ^ a b Niels Fergusson (August 2006). "AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista" (PDF). Microsoft. Retrieved 2008-02-22.
{{cite journal}}
: Cite journal requires|journal=
(help) - ^ "man 4 cgd in NetBSD-current". NetBSD current manual page on CGD. 2006-03-11. Retrieved 2006-12-24.
- ^ a b Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
- ^ a b Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
- ^ Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.
- ^ "CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+" (PDF).
- ^ Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/
- ^ "cryptsetup - manage plain dm-crypt and LUKS encrypted volumes". 2018-01-01. Retrieved 2018-05-08.
- ^ "OS X Lion: About FileVault 2". Retrieved 2011-01-03.
- ^ "Linux/BSD disk encryption comparison". Archived from the original on 2007-06-29. Retrieved 2006-12-24.
- ^ Pawel Jakub Dawidek (2006-06-08). "Data authentication for geli(8) committed to HEAD". Retrieved 2021-11-22.
- ^ For Scramdisk containers
- ^ For TrueCrypt 4 containers
- ^ For TrueCrypt 5 and 6 containers
- ^ "'CVS: cvs.openbsd.org: src' - MARC".
- ^ Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.
External links
[edit]- DiskCryptor vs Truecrypt – Comparison between DiskCryptor and TrueCrypt
- Buyer's Guide to Full Disk Encryption – Overview of full-disk encryption, how it works, and how it differs from file-level encryption