Comparison of disk encryption software

From Glitchdata
Jump to navigation Jump to search

This is a technical feature comparison of different disk encryption software.

Background information

Encryption Developer First released Licensing Maintained?
Aloaha Crypt Disk Aloaha 2008 Template:FreeTemplate:Cn Yes
ArchiCrypt Live Softwaredevelopment Remus ArchiCrypt 1998 Template:Proprietary Yes
BestCrypt Jetico 1993[1] Template:Proprietary Yes
BitArmor DataControl BitArmor Systems Inc. 2008-05 Template:Proprietary Yes
BitLocker Microsoft 2006 Template:Proprietary Yes
Bloombase Keyparc Bloombase 2007 Template:Proprietary No[2]
Boxcryptor Secomba GmbH 2011 Template:Proprietary Yes
CGD Roland C. Dowdeswell 2002-10-04[3] Template:Free Yes
CenterTools DriveLock CenterTools 2008 Template:Proprietary Yes
Check Point Full Disk Encryption Check Point Software Technologies Ltd 1999[4][5][6] Template:Proprietary Yes
CipherShed CipherShed Project 2014[7] Template:Nonfree[8] Yes
CrossCrypt Steven Scherrer 2004-02-10[9] Template:Free No
CryFS Sebastian Messmer 2015 Template:Free Yes
Cryhod Prim'X Technologies 2010 Template:Proprietary Yes
Cryptainer Cypherix Software 1999 Template:Proprietary Yes
CryptArchiver WinEncrypt Template:Dunno Template:Proprietary Yes
Cryptoloop Template:Dunno 2003-07-02[10] Template:Free No
Cryptomator Skymatic UG (haftungsbeschränkt) 2016-03-09 Template:Free Yes
CryptoPro Secure Disk Enterprise cpsd it-services GmbH 2010 Template:Proprietary Yes
CryptoPro Secure Disk for BitLocker cpsd it-services GmbH 2012 Template:Proprietary Yes
CryptSync Stefan Küng 2012 Template:Free Yes
Discryptor Cosect Ltd. 2008 Template:Proprietary No
DiskCryptor ntldr 2007 Template:Free Yes
DISK Protect Becrypt Ltd 2001 Template:Proprietary Yes
Cryptsetup/Dmsetup Christophe Saout 2004-03-11[11] Template:Free Yes
Dm-crypt/LUKS Clemens Fruhwirth (LUKS) 2005-02-05[12] Template:Free Yes
DriveCrypt SecurStar GmbH 2001 Template:Proprietary Yes[13]
DriveSentry GoAnywhere 2 DriveSentry 2008 Template:Proprietary No
E4M Paul Le Roux 1998-12-18[14] Template:Free No
e-Capsule Private Safe EISST Ltd. 2005 Template:Proprietary Yes
eCryptfs Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) 2005[15] Template:Free Yes
EgoSecure HDD Encryption EgoSecure GmbH 2006 Template:Proprietary Yes
EncFS Valient Gough 2003[16] Template:Free Yes
EncryptStick ENC Security Systems 2009 Template:Proprietary Yes
FileVault Apple Inc. 2003-10-24 Template:Proprietary Yes
FileVault 2 Apple Inc. 2011-07-20 Template:Proprietary Yes
FREE CompuSec CE-Infosys 2002 Template:Proprietary Yes
FreeOTFE Sarah Dean 2004-10-10[17] Template:Free No
GBDE Poul-Henning Kamp 2002-10-19[18] Template:Free Yes
GELI Pawel Jakub Dawidek 2005-04-11[19] Template:Free Yes
Knox AgileBits 2010 Template:Proprietary Yes
KryptOS The MorphOS Development Team 2010 Template:Proprietary Yes
LibreCrypt tdk 2014-06-19[20] Template:Free Yes
Loop-AES Jari Ruusu 2001-04-11 Template:Free Yes
McAfee Drive Encryption (SafeBoot) McAfee, Inc. 2007[21] Template:Proprietary Yes
n-Crypt Pro n-Trance Security Ltd 2005 Template:Proprietary Yes
PGPDisk PGP Corporation (acquired by Symantec in 2010) 1998-09-01[22] Template:Proprietary Yes
Private Disk Dekart 1993[23] Template:Proprietary Yes
ProxyCrypt v77 2013 Template:Free Yes
R-Crypto R-Tools Technology Inc 2008 Template:Proprietary Yes
SafeGuard Easy Sophos (Utimaco) 1993[24] Template:Proprietary Yes
SafeGuard Enterprise Sophos (Utimaco) 2007[25] Template:Proprietary Yes
SafeGuard PrivateDisk
Sophos (Utimaco)[26] 2000 Template:Proprietary Yes
SafeHouse Professional PC Dynamics, Inc. 1992 Template:Proprietary Yes
Scramdisk Shaun Hollingworth 1997-07-01 Template:Free No
Scramdisk 4 Linux Hans-Ulrich Juettner 2005-08-06[27] Template:Free No
SecuBox Aiko Solutions 2007-02-19 Template:Proprietary Yes
SECUDE Secure Notebook SECUDE 2003 Template:Proprietary Yes
SecureDoc WinMagic Inc. 1997 Template:Proprietary Yes
Sentry 2020 SoftWinter 1998[28] Template:Proprietary Yes
Softraid / RAID C OpenBSD 2007-11-01[29] Template:Free Yes
SpyProof! Information Security Corp. 2002 Template:Proprietary Yes
Svnd / Vnconfig OpenBSD 2000-12-01[30] Template:Free Yes
Symantec Endpoint Encryption Symantec Corporation 2008 Template:Proprietary Yes
Tcplay Alex Hornung 2012-01-28[31] Template:Free Yes
Trend Micro Endpoint Encryption (Mobile Armor) Trend Micro[32] 2004[33] Template:Proprietary Yes
TrueCrypt TrueCrypt Foundation 2004-02-02[34] Template:Nonfree[35] No
USBCrypt WinAbility Software Corp. 2010 Template:Proprietary Yes
VeraCrypt IDRIX 2013-06-22[36] Template:Free[37]

TrueCrypt License Version 3.0 (legacy code only)

Yes
CyberSafe Top Secret CyberSoft 2013 Template:Proprietary Yes
Name Developer First released Licensing Maintained?

Operating systems

Name Windows NT-based Pre-Windows NT Windows Mobile/Pocket PC FreeBSD Linux Mac OS X NetBSD OpenBSD DragonFly BSD Android iOS
Aloaha Crypt Disk Yes No No No No No No No No
BestCrypt Volume Encryption Yes Yes No No No[38] Yes No No No
BitArmor DataControl Yes No No No No No No No No
BitLocker Drive Encryption Yes No No No Template:Partial[39] Template:Partial[39] No No No No
Bloombase Keyparc Yes Yes No No Yes Yes No No No
Boxcryptor Yes No No No Yes Yes No No No Yes Yes
CenterTools DriveLock Yes No No No No No No No No
CGD No No No No No No Yes No No
Check Point Full Disk Encryption Yes No Yes No Yes[40] Yes No No No
CipherShed Yes No No No[41] Yes Yes No No No Yes[42]
CrossCrypt Yes[43] No No No No No No No No No
CryFS No No No Yes Yes Yes Yes Yes Yes No
Cryhod Yes No No No Yes No No No No
Cryptainer Yes No Yes[44] No No No No No No
CryptArchiver Yes No No No No No No No No
Cryptoloop Yes[45] No No No Yes No No No No
Cryptomator Yes No No No Yes Yes No No No Yes Yes
CryptoPro Secure Disk Enterprise Yes No No No No No No No No No
CryptoPro Secure Disk for BitLocker Yes No No No No No No No No No
Cryptsetup/ Dmsetup Yes[45] No No No Yes No No No Yes
CryptSync Yes No No No Yes Yes No No No No
Discryptor No No No No No No No No No
DiskCryptor Yes No No No No No No No No
DISK Protect Yes No No No No No No No No
Dm-crypt/LUKS Yes[45] No Yes[46] No Yes No No No Yes
DriveCrypt Yes Yes No No No No No No No
DriveSentry GoAnywhere 2 Yes No No No No No No No No
E4M Yes Yes No No No No No No No
e-Capsule Private Safe Yes No No No No No No No No
eCryptfs No No No No Yes No No No No
EgoSecure HDD Encryption Yes No No No No No No No No
EncFS Yes[47] Yes[47] Yes[48] Yes (FUSE) Yes (FUSE) Yes[47] Yes (FUSE) Yes (FUSE) Yes (FUSE) Yes[48]
EncryptStick Yes No No No Yes Yes No No No
FileVault No No No No No Yes No No No
FileVault 2 No No No No Template:Partial[49] Yes No No No
FREE CompuSec Yes No No No No No No No No
FreeOTFE Yes No Yes No Template:Partial[50] No No No No No
GBDE No No No Yes No No No No No
GELI No No No Yes No No No No No
Knox No No No No No Yes No No No
LibreCrypt Yes No No No Template:Partial[51] No No No No Yes[52]
Loop-AES No No No No Yes No No No No
McAfee Drive Encryption (SafeBoot) Yes Yes Yes[53] No No Yes No No No
n-Crypt Pro Yes No No No No No No No No
PGPDisk Yes No No No No Yes No No No
PGP Whole Disk Encryption Yes No Yes No Yes Yes No No No
Private Disk Yes Yes No No No No No No No
ProxyCrypt Yes No No No No No No No No No
R-Crypto Yes No No No No No No No No
SafeGuard Easy Yes No No No No No No No No
SafeGuard Enterprise Yes No No No No Yes No No No
SafeGuard PrivateDisk Yes No No No No No No No No
SafeHouse Professional Yes Yes No No No No No No No
Scramdisk Yes Yes No No Yes No No No No
Scramdisk 4 Linux No No No No Yes No No No No
SecuBox No No Yes No No No No No No
SecureDoc Yes No No No Yes Yes No No No
Sentry 2020 Yes No No No No No No No No
Softraid / RAID C No No No No No No No Yes No
SpyProof! Yes No No No No No No No No
Svnd / Vnconfig No No No No No No No Yes No
Symantec Endpoint Encryption Yes No No No No[54] Yes No No No
Tcplay No No No No Yes No No No Yes No
Trend Micro Endpoint Encryption Yes No No No No Yes No No No No
TrueCrypt Yes No No No[55] Yes Yes No No No Yes[42]
USBCrypt Yes No No No No No No No No No
VeraCrypt Yes No No No Yes Yes No No No Yes[56]
CyberSafe Top Secret Yes No No No No No No No No Yes
Name Windows NT-based Pre-Windows NT Windows Mobile/Pocket PC FreeBSD Linux Mac OS X NetBSD OpenBSD DragonFly BSD Android iOS

Features

Name Hidden containers Pre-boot authentication Single sign-on Custom authentication Multiple keys Passphrase strengthening Hardware acceleration TPM Filesystems Two-factor authentication
Aloaha Secure Stick Yes No Template:N/a Yes Yes No No No NTFS, FAT32 Yes
ArchiCrypt Live Yes[58] No Template:N/a No Yes[58][59] No No No Template:Dunno Yes[58][60]
BestCrypt Yes Yes Template:Dunno No Yes[61] Yes Yes Yes Any supported by OS Yes[62]
BitArmor DataControl No Yes Template:Dunno No Yes Yes No No NTFS, FAT32 on non-system volumes No
BitLocker Drive Encryption No Yes[63] No Yes[64] Yes[65] Yes[66] Yes Yes[65] Chiefly NTFS Template:R Yes Template:R
Bloombase Keyparc No No Template:N/a Yes Yes Yes Yes No Template:Dunno Template:Dunno
CGD No No Template:N/a Yes[67] Yes[68] Yes[67] No No Any supported by OS Yes[67]
CenterTools DriveLock No Yes Yes No No Yes No No Any supported by OS Yes
Check Point Full Disk Encryption Yes Yes Yes Yes Yes Yes Yes Yes NTFS, FAT32 Yes
CipherShed Yes
(limited to one per
"outer" container)
Template:Partial[69] Template:Dunno No yes with multiple keyfiles[70][71] Yes Yes No[72] Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[73] Yes
CryFS No No Template:N/a No No Yes[74] No No Any supported by OS No
CrossCrypt No No Template:N/a No No No No No Template:Dunno No
CryptArchiver No No Template:N/a No No Template:Dunno No No Template:Dunno Template:Dunno
Cryhod No Yes Yes No Yes Yes Yes No Any supported by OS No
Cryptoloop No Yes[75] Template:Dunno Yes No No Yes[citation needed] No Any supported by OS Template:Dunno
Cryptomator No No Template:N/a No No Yes Yes No Any supported by OS No
CryptoPro Secure Disk Enterprise Yes with add-on Secure Device Yes Yes Yes Yes Yes Yes Yes Any supported by OS Yes
CryptoPro Secure Disk for BitLocker Yes with add-on Secure Device Yes Yes Yes Yes Yes Yes Yes Any supported by OS Yes
Cryptsetup/ Dmsetup No Yes[75] Template:Dunno Yes No No Yes No Any supported by OS No
DiskCryptor No Yes Template:Dunno No No No Yes[76] No Only Windows MBR volumes; no UEFI GPT drives Yes[76]
DISK Protect Template:Dunno Yes[77] Template:Dunno Template:Dunno Yes[77] Template:Dunno Template:Dunno No Template:Dunno Template:Dunno
Dm-crypt/LUKS No Yes[75] Template:Dunno Yes Yes Yes Yes Template:Partial[78] Template:R Any supported by OS Yes
DriveCrypt Yes[79] Yes Yes Yes Yes Yes Yes No Any supported by OS Yes
DriveSentry GoAnywhere 2 No No Template:N/a Yes No Yes No Template:Dunno Any supported by OS Yes
E4M No No Template:N/a No No Template:Dunno No No Template:Dunno No
e-Capsule Private Safe Yes[80] No Template:N/a No Yes[80] No Yes No Template:Dunno Template:Dunno
eCryptfs No No Template:N/a Yes Yes Yes Yes Yes Yes[81] Yes
EgoSecure HDD Encryption No Yes Yes Yes Yes Yes Yes[82] Yes NTFS, FAT32 Yes
FileVault No No Template:N/a No Template:Partial[83] Yes[83] ? No HFS+, possibly others No
FileVault 2 No Yes Yes No Yes Yes Yes[84] No HFS+, possibly others No
FREE CompuSec No Yes Template:Dunno No No No No No Any supported by OS No
FreeOTFE Yes No Template:N/a Yes[85] Yes[86] Yes Yes No Any supported by OS Yes
GBDE No No[87] Template:N/a Yes Yes[88] No[88] No[87] No Any supported by OS Yes
GELI No Yes[87] Template:Dunno Yes Yes[89] Yes[89] Yes[87] No Any supported by OS Yes
Loop-AES No Yes[90] Template:Dunno Yes[90] Yes[90] Yes[90] Yes[90] No Any supported by OS Yes[91]
McAfee Drive Encryption (SafeBoot) Yes Yes Yes Yes Yes Yes Yes[82]

[92]

Yes Any supported by OS Yes
n-Crypt Pro No No Template:N/a No No Template:N/a[93] No No Template:Dunno Template:Dunno
PGPDisk No Yes[94] Yes Template:Dunno Yes Yes[95] Template:Dunno Yes Template:Dunno Yes
Private Disk No No Template:N/a No Yes Yes No No Any supported by OS Yes
ProxyCrypt Yes No No No No Yes Yes No Any supported by OS Yes
R-Crypto Template:Dunno No Template:N/a Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno Any supported by OS Template:Dunno
SafeGuard Easy No Yes Template:Dunno No Yes Yes No Yes[96] Any supported by OS Yes
SafeGuard Enterprise No Yes Yes No Yes Yes No Yes[96] Any supported by OS Yes
SafeGuard PrivateDisk No No Template:N/a No Yes Yes No Yes[97] Any supported by OS Yes
SafeHouse Professional No No Template:N/a Yes Yes Yes No No Any supported by OS Yes
Scramdisk Yes No Template:N/a No No No No No Template:Dunno Last update to web site 2009-07-02
Scramdisk 4 Linux Yes[98] No Template:N/a No No Yes[98] No No ext2, ext3, reiserfs, minix, ntfs, vfat/msdos No
SecuBox No No Template:N/a No No Yes No No Template:Dunno No
SecureDoc No Yes[99] Template:Dunno Yes Yes Yes Yes Yes Template:Dunno Yes
Sentry 2020 No No Template:Dunno No No No No No Template:Dunno No
Softraid / RAID C No No Template:Dunno Template:Dunno Template:Dunno Template:Dunno Yes Template:Dunno Any supported by OS Template:Dunno
Svnd / Vnconfig No No Template:N/a No No Yes[100] Yes Template:Dunno Any supported by OS Template:Dunno
Symantec Endpoint Encryption No Yes Yes Yes Yes Yes No No NTFS, FAT32 Yes
Trend Micro Endpoint Encryption No Yes Yes Yes Yes Yes[101] Yes [102] No Any supported by OS Yes [103]
TrueCrypt Template:R Yes
(limited to one per
"outer" container)
Template:Partial[104] Template:Dunno No yes with multiple keyfiles[71][105] Yes Yes No[72] Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[73] Yes
VeraCrypt Yes
(limited to one per
"outer" container)
Template:Partial[106] No No yes with multiple keyfiles Yes Yes No Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged Yes
CyberSafe Top Secret Yes No No No Yes Yes Yes No Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged Yes
Name Hidden containers Pre-boot authentication Single sign-on Custom authentication Multiple keys Passphrase strengthening Hardware acceleration TPM Filesystems Two-factor authentication

Template:Reflist

Layering

Template:Details

  • Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table.
  • Partition: Whether individual disk partitions can be encrypted.
  • File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
  • Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.
  • Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
Name Whole disk Partition File Swap space Hibernation file
Aloaha Secure Stick No No Yes No No
ArchiCrypt Live Yes
(except for the boot volume)
Yes Yes No No
BestCrypt Yes Yes Yes Yes Yes[107]
BitArmor DataControl No Yes No Yes Yes
BitLocker Drive Encryption Yes
(except for the boot volume)
Yes Yes[108] Yes
(parent volume is encrypted)
Yes
(parent volume is encrypted)
Bloombase Keyparc Yes Yes Yes Yes No
CenterTools DriveLock Yes Yes Yes Yes Yes
CGD Yes Yes Yes[67] Yes No
Check Point Full Disk Encryption Yes Yes Yes Yes Yes
CipherShed Yes Yes Yes Yes Template:Partial
CrossCrypt No No Yes No No
CryFS No No No No No
CryptArchiver No No Yes No No
Cryhod No Yes No Yes Yes
(parent volume is encrypted)
Cryptoloop Yes Yes Yes Yes No
Cryptomill Yes Template:N/a Yes Template:N/a Template:N/a
CryptoPro Secure Disk Enterprise Yes Yes Yes
(add-on Secure Device)
Yes Yes
CryptoPro Secure Disk for BitLocker Yes Yes Yes Yes Yes
DiskCryptor Yes Yes No Yes Yes
Dm-crypt Yes Yes Yes[109] Yes Yes[110]
DriveCrypt Yes Yes[79] Yes[79] Yes Yes
DriveSentry GoAnywhere 2 No Yes Yes No No
E4M No Yes Yes No No
e-Capsule Private Safe No No Yes[111] No No
eCryptfs No No Yes No No
EgoSecure HDD Encryption Yes Yes Yes Yes Yes
FileVault No No Yes[83] Yes[112][83] Yes[112][113]
FileVault 2 Yes[114] Yes[84] No Yes Yes
FREE CompuSec Yes No Yes Yes Yes
FreeOTFE Yes
(except for the boot volume)
Yes Yes No No
GBDE Yes Yes Yes[115] Yes No
GELI Yes Yes Yes[115] Yes No
Loop-AES Yes Yes[90] Yes[90] Yes[90] Yes[90]
McAfee Drive Encryption (SafeBoot) Yes Yes Yes Yes Yes[116]
n-Crypt Pro Yes Yes Yes No No
PGPDisk Yes Yes Yes Yes Template:Partial
Private Disk No No Yes No No
ProxyCrypt Yes Yes Yes No No
R-Crypto No No Yes No No
SafeGuard Easy Yes Yes extra module Yes Each sector on disk is encrypted
SafeGuard Enterprise Yes Yes Yes Yes Each sector on disk is encrypted
SafeGuard PrivateDisk No No Yes No No
SafeHouse Professional No No Yes No No
Scramdisk No Yes Yes No No
Scramdisk 4 Linux Yes Yes Yes Yes No
SecuBox No No Yes Template:N/a No
SecureDoc Yes[99] Yes Yes Yes Yes
Sentry 2020 No No Yes No No
Softraid / RAID C Yes Yes No Yes (encrypted by default in OpenBSD)[117] No
Svnd / Vnconfig Template:Dunno Yes Yes Yes (encrypted by default in OpenBSD) Template:Dunno
SpyProof! No Yes Yes No No
Symantec Endpoint Encryption Yes Yes Yes Yes Yes
Trend Micro Endpoint Encryption Yes Yes Yes Yes Yes
TrueCrypt Yes[118] Yes Yes Yes Template:Partial[104]
VeraCrypt Yes Yes Yes Yes Template:Partial[104]
CyberSafe Top Secret No Yes Yes No No
Name Whole disk Partition File Swap space Hibernation file

Modes of operation

Template:Details

Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.

  • CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
  • CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
  • CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
  • LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[119]
  • XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
Name CBC w/ predictable IVs CBC w/ secret IVs CBC w/ random per-sector keys LRW XTS
Aloaha Crypt Disk No No No Yes Yes
ArchiCrypt Live No No No Template:Partial[120] Yes
BestCrypt No Yes No Yes[121] Yes[122]
BitArmor DataControl No Yes Plumb-IV No No
BitLocker Drive Encryption No[123] Yes[123] No No Yes, Windows 10 10547+
Bloombase Keyparc Template:Dunno Yes Template:Dunno Template:Dunno Template:Dunno
CGD No Yes[124] No No No
CenterTools DriveLock Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
Check Point Full Disk Encryption No No Yes Yes Yes
CipherShed Template:Partial[125] No No Template:Partial[126] Yes[127]
CrossCrypt Yes No No No No
CryFS No No Yes No No
CryptArchiver Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
Cryhod No Yes No No No
Cryptoloop Yes No No No No
DiskCryptor No No No No Yes
Dm-crypt Yes Yes No Yes, using *-lrw-benbi[128] Yes, using *-xts-plain
DriveCrypt Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
DriveSentry GoAnywhere 2 Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
E4M Template:Dunno Template:Dunno Template:Dunno No No
e-Capsule Private Safe Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
eCryptfs No Yes Template:Dunno No No
EgoSecure HDD Encryption No Yes No No No
FileVault Yes[83] No No No No
FileVault 2 No No No No Yes[129]
FREE CompuSec Yes No No No No
FreeOTFE Yes Yes No Yes Yes
GBDE No No Yes[88] No No
GELI No Yes[130] No No Yes
Loop-AES single-key, multi-key-v2 modes[90] multi-key-v3 mode[90] No No No
McAfee Drive Encryption (SafeBoot) No Yes No No No
n-Crypt Pro Template:Dunno Template:Dunno No No No
PGPDisk Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
Private Disk No Yes No No No
ProxyCrypt No No No No Yes
R-Crypto Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
SafeGuard Easy Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
SafeGuard Enterprise Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
SafeGuard PrivateDisk Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
SafeHouse Professional Yes No No No No
Scramdisk No Yes No No No
Scramdisk 4 Linux No Yes[131] No Yes[132] Yes[133]
SecuBox Yes No No No No
SecureDoc Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
Sentry 2020 Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
Softraid / RAID C Template:Dunno Template:Dunno Template:Dunno Template:Dunno Yes[134]
Svnd / Vnconfig Template:Dunno Template:Dunno Template:Dunno Template:Dunno Template:Dunno
Symantec Endpoint Encryption No No Yes No No
TrueCrypt Template:Partial[125] No No Template:Partial[126] Yes[135]
USBCrypt No Yes No No Yes
VeraCrypt No No No No Yes
CyberSafe Top Secret No No No No Yes
Name CBC w/ predictable IVs CBC w/ secret IVs CBC w/ random per-sector keys LRW XTS

See also

Notes and references

Template:Reflist


External links

  1. "Jetico Mission". Jetico. https://www.jetico.com/about-jetico/mission-story. Retrieved 2014-05-30.
  2. "Keyparc - Free Encryption for Everyone". Bloombase. http://www.keyparc.com/web/en/download/. Retrieved 2014-11-28.
  3. Roland Dowdeswell (2002-10-04). "CryptoGraphic Disk". mailing list announcement. http://mail-index.netbsd.org/current-users/2002/10/04/0008.html. Retrieved 2007-01-14.
  4. "Protect guards laptop and desktop data". Archived from the original on March 2, 2005. https://web.archive.org/web/20050302202315/http://www.infoworld.com/cgi-bin/displayArchive.pl?/99/25/c05-25.48.htm. Retrieved 2008-09-03.
  5. Company and product name change to Pointsec "Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc.". Archived from the original on 2004-08-20. https://web.archive.org/web/20040820174918/http://www.pointsec.com/news/news.asp?newsid=85. Retrieved 2008-09-03.
  6. "Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent". http://www.checkpoint.com/press/2007/protectdataacquisition011107.html. Retrieved 2008-09-03.
  7. Niklas Lemcke (2014-12-15). "Pre-Alpha testing started". https://ciphershed.org/pre-alpha-testing-started/. Retrieved 2014-12-24.
  8. "TrueCrypt License Version 3.0". TrueCrypt Foundation. 2012-02-07. https://github.com/CipherShed/CipherShed/blob/master/src/License.txt. Retrieved 2014-12-24.
  9. Sarah Dean (2004-02-10). "OTFEDB entry". http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46. Retrieved 2008-08-10.
  10. Initial cryptoloop patches for the Linux 2.5 development kernel: http://uwsg.iu.edu/hypermail/linux/kernel/0307.0/0348.html
  11. dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/
  12. Clemens Fruhwirth. "LUKS version history". http://luks.endorphin.org/dm-crypt. Retrieved 2006-12-24.
  13. SecurStar GmbH. "DriveCrypt v5.8 Released". http://www.securstar.biz/news/drivecrypt-v5-8-released-win-10-compatible.html. Retrieved 2015-10-26.
  14. "archived E4M documentation". Archived from the original on 2000-05-24. https://web.archive.org/web/20000524061402/http://www.e4m.net/news.html.).
  15. "eCryptfs". http://ecryptfs.sourceforge.net. Retrieved 2008-04-29.
  16. Valient Gough (2003). "EncFS - an Encrypted Filesystem". README.md file. https://github.com/vgough/encfs. Retrieved 2007-01-14.
  17. "FreeOTFE version history". Archived from the original on 2006-12-07. https://web.archive.org/web/20061207224351/http://www.freeotfe.org/docs/version_history.htm#version_history. Retrieved 2006-12-24.
  18. "gbde(4) man page in FreeBSD 4.11". GBDE manual page as it appeared in FreeBSD 4.11. http://www.freebsd.org/cgi/man.cgi?query=gbde&apropos=0&sektion=4&manpath=FreeBSD+5.0-RELEASE&format=html. Retrieved 2006-12-24.
  19. "geli(8) man page in FreeBSD 6.0". GELI manual page as it first appeared in FreeBSD 6.0. http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+6.0-RELEASE&format=html. Retrieved 2006-12-24.
  20. "Template:Citation error". https://github.com/t-d-k/LibreCrypt/commit/a395620545beff7736427dfc3b508b4f67609396. Retrieved 2015-09-14.
  21. "McAfee Drive Encryption". product description. McAfee. http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html. Retrieved 2009-03-04.
  22. Template:Cite newsgroup
  23. "Dekart Encryption software timeline". Dekart. http://www.lazybit.com/index.php/a/2007/04/19/dekart_private_disk_timeline.
  24. "SafeGuard Easy 4.5 Technical Whitepaper". Utimaco. http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-easy-dsus.pdf. Retrieved 2009-08-10.
  25. "SafeGuard Enterprise Technical Whitepaper". Utimaco. http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-enterprise-dsus.pdf. Retrieved 2009-08-10.
  26. Rebranded as ThinkVantage Client Security "ThinkVantage Technologies Deployment Guide". Lenovo. ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf. Retrieved 2008-03-05.
  27. "ScramDisk 4 Linux Releases". http://sourceforge.net/project/showfiles.php?group_id=101952&package_id=109447.
  28. "Sentry 2020 news". http://www.softwinter.com/. Retrieved 2007-01-02.
  29. "OpenBSD 4.2 Changelog". http://www.openbsd.org/plus42.html.
  30. "OpenBSD 2.8 Changelog". http://www.openbsd.org/plus28.html.
  31. "bwalex/tc-play". https://github.com/bwalex/tc-play/releases.
  32. Trend Micro
  33. ">> Mobile Armor: Your Data.Secure. Everywhere.". 4 September 2004. http://www.mobilearmor.com/products.html.
  34. "TrueCrypt". http://www.truecrypt.org/docs/?s=version-history2.
  35. "TrueCrypt License Version 3.1". TrueCrypt Foundation. 2014-05-28. https://github.com/warewolf/truecrypt/compare/master...7.2#diff-dc5cde275269b574b34b1204b9221cb2L1. Retrieved 2014-05-29.
  36. "VeraCrypt". https://veracrypt.codeplex.com/SourceControl/list/changesets?page=8.
  37. "Apache License 2.0". IDRIX. 2015-06-28. https://veracrypt.codeplex.com/license. Retrieved 2015-08-08.
  38. "Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy". http://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption.
  39. 39.0 39.1 [1] FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
  40. http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf
  41. [2] Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used
  42. 42.0 42.1 [3] Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system
  43. CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems
  44. [4] PocketPC freeware release- SmartPhone beta available
  45. 45.0 45.1 45.2 [5] FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes
  46. [6] FreeOTFE4PDA supports dm-crypt/LUKS volumes
  47. 47.0 47.1 47.2 "Safe - Protect Your Files". http://www.getsafe.org/.
  48. 48.0 48.1 "Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS". https://www.boxcryptor.com/.
  49. [7] libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes
  50. [8] Supports Linux volumes
  51. [9] Supports Linux volumes
  52. [10] Third party app allows a user to open LibreCrypt compatible LUKS containers
  53. "Endpoint Encryption Datasheet". McAfee. http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html. Retrieved 2010-06-14.
  54. "Endpoint Encryption Powered by PGP Technology - Symantec". http://www.symantec.com/endpoint-encryption/system-requirements/.
  55. [11] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used
  56. [12] Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
  57. [13] Hidden containers description from Jetico (BestCrypt)
  58. 58.0 58.1 58.2 Secret-containers and Camouflage files ArchiCrypt Live Description
  59. Supports "Guest" keys
  60. Using "Archicrypt Card"
  61. Supported by the BestCrypt container format; see BestCrypt SDK
  62. Supported by the BestCrypt Volume Encryption software
  63. With PIN or USB key)
  64. BitLocker Drive Encryption: Value Add Extensibility Options
  65. 65.0 65.1 "BitLocker Drive Encryption Technical Overview". Microsoft. http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true. Retrieved 2008-03-13.
  66. Recovery keys only.
  67. 67.0 67.1 67.2 67.3 Template:Cite journal
  68. Federico Biancuzzi (2005-12-21). "Inside NetBSD's CGD". interview with Roland Dowdeswell. ONLamp.com. http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1. Retrieved 2006-12-24.
  69. "Operating Systems Supported for System Encryption". CipherShed Documentation. CipherShed Project. https://github.com/CipherShed/CipherShed/blob/v0.7.3.0-dev/doc/userdocs/guide/CipherShed-User-Guide-0.7.3.0.pdf. Retrieved 2014-12-27.
  70. Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
  71. 71.0 71.1 "Keyfiles". TrueCrypt Documentation. TrueCrypt Foundation. http://www.truecrypt.org/docs/keyfiles. Retrieved 2014-05-28.
  72. 72.0 72.1 "Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?". TrueCrypt FAQ. TrueCrypt Foundation. http://www.truecrypt.org/faq#tpm. Retrieved 2014-05-28.
  73. 73.0 73.1 "Future". TrueCrypt Foundation. http://www.truecrypt.org/future.php. Retrieved 2014-05-24.Template:Dead link
  74. "CryFS: How it works". https://www.cryfs.org/howitworks. Retrieved 2016-09-23.
  75. 75.0 75.1 75.2 dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted
  76. 76.0 76.1 "DiskCryptor Features". http://diskcryptor.net/wiki/Main_Page/en. Retrieved 2010-05-25.
  77. 77.0 77.1 "DISK Protect 4.2 Data Sheet" (PDF). http://www.becrypt.com/us/downloads/DISK%20Protect%204.2_US.pdf. Retrieved 2008-02-27.
  78. "cryptsetup Frequently Asked Questions". https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions. Retrieved 2016-01-07.
  79. 79.0 79.1 79.2 "DriveCrypt features". SecurStar GmbH. http://www.securstar.com/products_drivecrypt.php. Retrieved 2007-01-03.
  80. 80.0 80.1 "Multi level access with separate access credentials, each enabling a different set of functional or logical operations". EISST Ltd.. http://www.eisst.com/products/private_safe/compare/. Retrieved 2007-07-25.
  81. uses the lower filesystem (stacking)
  82. 82.0 82.1 "Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3". Intel. http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-aes-instructions-set/. Retrieved 2012-07-26.
  83. 83.0 83.1 83.2 83.3 83.4 Template:Cite journal
  84. 84.0 84.1 "Mac OS X 10.7 Lion: the Ars Technica review". Ars Technica. 2011-07-20. https://arstechnica.com/apple/reviews/2011/07/mac-os-x-10-7.ars/13. Retrieved 2012-01-03.
  85. FreeOTFE has a modular architecture and set of components to allow 3rd party integration
  86. FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
  87. 87.0 87.1 87.2 87.3 "FreeBSD Handbook: Encrypting Disk Partitions". http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.html. Retrieved 2006-12-24.
  88. 88.0 88.1 88.2 Template:Cite journal
  89. 89.0 89.1 "geli(8) man page in FreeBSD-current". GELI manual page in current FreeBSD. http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+7-current&format=html. Retrieved 2006-12-24.
  90. 90.00 90.01 90.02 90.03 90.04 90.05 90.06 90.07 90.08 90.09 90.10 Jari Ruusu. "loop-AES README file". http://loop-aes.sourceforge.net/loop-AES.README. Retrieved 2007-04-23.
  91. Using customization
  92. "McAfee Endpoint Encryption". McAfee. http://www.mcafee.com/us/resources/data-sheets/ds-endpoint-encryption.pdf. Retrieved 2012-07-26.
  93. n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
  94. "PGP Whole Disk Encryption FAQ". PGP Corporation. http://www.pgp.com/products/wholediskencryption/faq.html. Retrieved 2006-12-24.
  95. PGP private keys are always protected by strengthened passphrases
  96. 96.0 96.1 "Embedded Security: Trusted Platform Module Technology Comes of Age". Utimaco. http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.html. Retrieved 2008-03-04.
  97. "ThinkVantage Technologies Deployment Guide". Lenovo. http://download.lenovo.com/ibmdl/pub/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf. Retrieved 2008-03-05.
  98. 98.0 98.1 For Truecrypt containers
  99. 99.0 99.1 "SecureDoc Product Information". WinMagic Inc.. http://www.winmagic.com/solutions/securedoc.html. Retrieved 2008-03-05.
  100. optional by using -K OpenBSD Manual Pages: vnconfig(8)
  101. "Endpoint Encryption". http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx.
  102. "Solutions for Solid-State Drives (SSD) - Endpoint Encryption". http://esupport.trendmicro.com/solution/en-US/1058686.aspx.
  103. "Support for smart card readers - Endpoint Encryption". http://esupport.trendmicro.com/solution/en-US/1059884.aspx.
  104. 104.0 104.1 104.2 "Operating Systems Supported for System Encryption". TrueCrypt Documentation. TrueCrypt Foundation. http://www.truecrypt.org/docs/?s=sys-encryption-supported-os. Retrieved 2014-05-28.
  105. Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
  106. "Operating Systems Supported for System Encryption". VeraCrypt Documentation. IDRIX. https://veracrypt.codeplex.com/documentation. Retrieved 2015-01-04.
  107. "Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy". http://www.jetico.com/data-protection-encryption-bestcrypt-volume-encryption-enterprise/.
  108. Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/
  109. dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
  110. yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
  111. Uses proprietary e-Capsule file system not exposed to the OS.
  112. 112.0 112.1 not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
  113. http://macmarshal.com/images/Documents/mm_wp_102.pdf
  114. "Use FileVault to encrypt the startup disk on your Mac". http://support.apple.com/kb/HT4790?viewlocale=en_US&locale=en_US.
  115. 115.0 115.1 File-based volume encryption is possible when used with mdconfig(8) utility.
  116. "Control Break International Debuts SafeBoot Version 4.27". September 2004. http://connection.ebscohost.com/c/articles/14197489/control-break-international-debuts-safeboot-version-4-27. Retrieved 2015-03-05.
  117. http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
  118. however, not Windows UEFI-based computers with a GUID partition table (GPT)
  119. LRW_issue
  120. Containers created with ArchiCrypt Live version 5 use LRW
  121. "New features in BestCrypt version 8". Jetico. http://www.jetico.com/bc8_web_help/html/03_new_features/01_new_features.htm. Retrieved 2007-03-02.
  122. "New features in version 2". Jetico. http://www.jetico.com/bcve_web_help/html/01_introduction/04_new_in_version.htm. Retrieved 2009-03-01.
  123. 123.0 123.1 Template:Cite journal
  124. "man 4 cgd in NetBSD-current". NetBSD current manual page on CGD. 2006-03-11. http://netbsd.gw.com/cgi-bin/man-cgi?cgd+4+NetBSD-current. Retrieved 2006-12-24.
  125. 125.0 125.1 Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
  126. 126.0 126.1 Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
  127. Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.
  128. Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/
  129. "OS X Lion: About FileVault 2". http://support.apple.com/kb/HT4790. Retrieved 2011-01-03.
  130. "Linux/BSD disk encryption comparison". http://mareichelt.de/pub/notmine/linuxbsd-comparison.html. Retrieved 2006-12-24.
  131. For Scramdisk containers
  132. For Truecrypt 4 containers
  133. For Truecrypt 5 and 6 containers
  134. "'CVS: cvs.openbsd.org: src' - MARC". http://marc.info/?l=openbsd-cvs&m=121302798322835&w=2.
  135. Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.