Comparison of disk encryption software
This is a technical feature comparison of different disk encryption software.
Contents
Background information
Encryption | Developer | First released | Licensing | Maintained? |
---|---|---|---|---|
Aloaha Secure Stick | Aloaha | 2008 | Proprietary | No |
ArchiCrypt Live | Softwaredevelopment Remus ArchiCrypt | 1998 | Proprietary | Yes |
BestCrypt | Jetico | 1993[1] | Proprietary | Yes |
BitArmor DataControl | BitArmor Systems Inc. | 2008-05 | Proprietary | Yes |
BitLocker | Microsoft | 2006 | Proprietary | Yes |
Bloombase Keyparc | Bloombase | 2007 | Proprietary | No[2] |
CGD | Roland C. Dowdeswell | 2002-10-04[3] | BSD | Yes |
CenterTools DriveLock | CenterTools | 2008 | Proprietary | Yes |
Check Point Full Disk Encryption | Check Point Software Technologies Ltd | 1999[4][5][6] | Proprietary | Yes |
CipherShed | CipherShed Project | 2014[7] | TrueCrypt License Version 3.0[8] | Yes |
CrossCrypt | Steven Scherrer | 2004-02-10[9] | GPL | No |
Cryhod | Prim'X Technologies | 2010 | Proprietary | Yes |
Cryptainer | Cypherix Software | 1999 | Proprietary | Yes |
CryptArchiver | WinEncrypt | ? | Proprietary | Yes |
cryptoloop | ? | 2003-07-02[10] | GPL | No |
Discryptor | Cosect Ltd. | 2008 | Proprietary | No |
DiskCryptor | ntldr | 2007 | GPL | Yes |
DISK Protect | Becrypt Ltd | 2001 | Proprietary | Yes |
cryptsetup/dmsetup | Christophe Saout | 2004-03-11[11] | GPL | Yes |
dm-crypt/LUKS | Clemens Fruhwirth (LUKS) | 2005-02-05[12] | GPL | Yes |
DriveCrypt | SecurStar GmbH | 2001 | Proprietary | Yes[13] |
DriveSentry GoAnywhere 2 | DriveSentry | 2008 | Proprietary | No |
E4M | Paul Le Roux | 1998-12-18[14] | Open source | No |
e-Capsule Private Safe | EISST Ltd. | 2005 | Proprietary | Yes |
eCryptfs | Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) | 2005[15] | GPL | Yes |
EgoSecure HDD Encryption | EgoSecure GmbH | 2006 | Proprietary | Yes |
EncFS | Valient Gough | 2003[16] | LGPLv3 | Yes |
EncryptStick | ENC Security Systems | 2009 | Proprietary | Yes |
FileVault | Apple Inc. | 2003-10-24 | Proprietary | Yes |
FileVault 2 | Apple Inc. | 2011-07-20 | Proprietary | Yes |
FREE CompuSec | CE-Infosys | 2002 | Proprietary | Yes |
FreeOTFE | Sarah Dean | 2004-10-10[17] | Open source | No |
GBDE | Poul-Henning Kamp | 2002-10-19[18] | BSD | Yes |
GELI | Pawel Jakub Dawidek | 2005-04-11[19] | BSD | Yes |
Knox | AgileBits | 2010 | Proprietary | Yes |
KryptOS | The MorphOS Development Team | 2010 | Proprietary | Yes |
LibreCrypt | tdk | 2014-06-19[20] | Open source | Yes |
loop-AES | Jari Ruusu | 2001-04-11 | GPL | Yes |
McAfee Drive Encryption (SafeBoot) | McAfee, Inc. | 2007[21] | Proprietary | Yes |
n-Crypt Pro | n-Trance Security Ltd | 2005 | Proprietary | Yes |
PGPDisk | PGP Corporation (acquired by Symantec in 2010) | 1998-09-01[22] | Proprietary | Yes |
Private Disk | Dekart | 1993[23] | Proprietary | Yes |
ProxyCrypt | v77 | 2013 | Open source | Yes |
R-Crypto | R-Tools Technology Inc | 2008 | Proprietary | Yes |
SafeGuard Easy | Sophos (Utimaco) | 1993[24] | Proprietary | Yes |
SafeGuard Enterprise | Sophos (Utimaco) | 2007[25] | Proprietary | Yes |
SafeGuard PrivateDisk |
Sophos (Utimaco)[26] | 2000 | Proprietary | Yes |
SafeHouse Professional | PC Dynamics, Inc. | 1992 | Proprietary | Yes |
Scramdisk | Shaun Hollingworth | 1997-07-01 | Open source | No |
Scramdisk 4 Linux | Hans-Ulrich Juettner | 2005-08-06[27] | GPL | No |
SecuBox | Aiko Solutions | 2007-02-19 | Proprietary | Yes |
SECUDE Secure Notebook | SECUDE | 2003 | Proprietary | Yes |
SecureDoc | WinMagic Inc. | 1997 | Proprietary | Yes |
Sentry 2020 | SoftWinter | 1998[28] | Proprietary | Yes |
softraid / RAID C | OpenBSD | 2007-11-01[29] | BSD | Yes |
SpyProof! | Information Security Corp. | 2002 | Proprietary | Yes |
svnd / vnconfig | OpenBSD | 2000-12-01[30] | BSD | Yes |
Symantec Endpoint Encryption | Symantec Corporation | 2008 | Proprietary | Yes |
tcplay | Alex Hornung | 2012-01-28[31] | BSD | Yes |
Trend Micro Endpoint Encryption (Mobile Armor) | Trend Micro[32] | 2004[33] | Proprietary | Yes |
TrueCrypt | TrueCrypt Foundation | 2004-02-02[34] | TrueCrypt License 3.1[35] | No |
USBCrypt | WinAbility Software Corp. | 2010 | Proprietary | Yes |
VeraCrypt | IDRIX | 2013-06-22[36] | Apache License 2.0[37]
TrueCrypt License Version 3.0 (legacy code only) |
Yes |
CyberSafe Top Secret | CyberSoft | 2013 | Proprietary | Yes |
Name | Developer | First released | Licensing | Maintained? |
Operating systems
Name | Windows NT-based | Pre-Windows NT | Windows Mobile/Pocket PC | FreeBSD | Linux | Mac OS X | NetBSD | OpenBSD | DragonFly BSD | Android |
---|---|---|---|---|---|---|---|---|---|---|
Aloaha Secure Stick | Yes | No | No | No | No | No | No | No | No | |
BestCrypt Volume Encryption | Yes | Yes | No | No | No[38] | Yes | No | No | No | |
BitArmor DataControl | Yes | No | No | No | No | No | No | No | No | |
BitLocker Drive Encryption | Yes | No | No | No | Partial[39] | Partial[39] | No | No | No | No |
Bloombase Keyparc | Yes | Yes | No | No | Yes | Yes | No | No | No | |
CenterTools DriveLock | Yes | No | No | No | No | No | No | No | No | |
CGD | No | No | No | No | No | No | Yes | No | No | |
Check Point Full Disk Encryption | Yes | No | Yes | No | Yes[40] | Yes | No | No | No | |
CipherShed | Yes | No | No | No[41] | Yes | Yes | No | No | No | Yes[42] |
CrossCrypt | No | No | No | No | No | No | No | No | No | |
Cryhod | Yes | No | No | No | Yes | No | No | No | No | |
Cryptainer | Yes | No | Yes[43] | No | No | No | No | No | No | |
CryptArchiver | Yes | No | No | No | No | No | No | No | No | |
cryptoloop | Yes[44] | No | No | No | Yes | No | No | No | No | |
cryptsetup/ dmsetup | Yes[44] | No | No | No | Yes | No | No | No | Yes | |
Discryptor | No | No | No | No | No | No | No | No | No | |
DiskCryptor | Yes | No | No | No | No | No | No | No | No | |
DISK Protect | Yes | No | No | No | No | No | No | No | No | |
dm-crypt/LUKS | Yes[44] | No | Yes[45] | No | Yes | No | No | No | Yes | |
DriveCrypt | Yes | Yes | No | No | No | No | No | No | No | |
DriveSentry GoAnywhere 2 | Yes | No | No | No | No | No | No | No | No | |
E4M | Yes | Yes | No | No | No | No | No | No | No | |
e-Capsule Private Safe | Yes | No | No | No | No | No | No | No | No | |
eCryptfs | No | No | No | No | Yes | No | No | No | No | |
EgoSecure HDD Encryption | Yes | No | No | No | No | No | No | No | No | |
encryptstick | Yes | No | No | No | Yes | Yes | No | No | No | |
FileVault | No | No | No | No | No | Yes | No | No | No | |
FileVault 2 | No | No | No | No | Partial[46] | Yes | No | No | No | |
FREE CompuSec | Yes | No | No | No | No | No | No | No | No | |
FreeOTFE | Yes | No | Yes | No | Partial[47] | No | No | No | No | No |
GBDE | No | No | No | Yes | No | No | No | No | No | |
GELI | No | No | No | Yes | No | No | No | No | No | |
Knox | No | No | No | No | No | Yes | No | No | No | |
LibreCrypt | Yes | No | No | No | Partial[48] | No | No | No | No | Yes[49] |
loop-AES | No | No | No | No | Yes | No | No | No | No | |
McAfee Drive Encryption (SafeBoot) | Yes | Yes | Yes[50] | No | No | Yes | No | No | No | |
n-Crypt Pro | Yes | No | No | No | No | No | No | No | No | |
PGPDisk | Yes | No | No | No | No | Yes | No | No | No | |
PGP Whole Disk Encryption | Yes | No | Yes | No | Yes | Yes | No | No | No | |
Private Disk | Yes | Yes | No | No | No | No | No | No | No | |
ProxyCrypt | Yes | No | No | No | No | No | No | No | No | |
R-Crypto | Yes | No | No | No | No | No | No | No | No | |
SafeGuard Easy | Yes | No | No | No | No | No | No | No | No | |
SafeGuard Enterprise | Yes | No | No | No | No | Yes | No | No | No | |
SafeGuard PrivateDisk | Yes | No | No | No | No | No | No | No | No | |
SafeHouse Professional | Yes | Yes | No | No | No | No | No | No | No | |
Scramdisk | Yes | Yes | No | No | Yes | No | No | No | No | |
Scramdisk 4 Linux | No | No | No | No | Yes | No | No | No | No | |
SecuBox | No | No | Yes | No | No | No | No | No | No | |
SecureDoc | Yes | No | No | No | Yes | Yes | No | No | No | |
Sentry 2020 | Yes | No | No | No | No | No | No | No | No | |
softraid / RAID C | No | No | No | No | No | No | No | Yes | No | |
SpyProof! | Yes | No | No | No | No | No | No | No | No | |
svnd / vnconfig | No | No | No | No | No | No | No | Yes | No | |
Symantec Endpoint Encryption | Partial[51] | No | No | No | No[52] | Yes | No | No | No | |
tcplay | No | No | No | No | Yes | No | No | No | Yes | No |
Trend Micro Endpoint Encryption | Yes | No | No | No | No | Yes | No | No | No | No |
TrueCrypt | Yes | No | No | No[53] | Yes | Yes | No | No | No | Yes[54] |
USBCrypt | Yes | No | No | No | No | No | No | No | No | No |
VeraCrypt | Yes | No | No | No | Yes | Yes | No | No | No | Yes[55] |
CyberSafe Top Secret | Yes | No | No | No | No | No | No | No | No | Yes |
Name | Windows NT-based | Pre-Windows NT | Windows Mobile/Pocket PC | FreeBSD | Linux | Mac OS X | NetBSD | OpenBSD | DragonFly BSD | Android |
Features
- Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)[56] can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others.
- Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
- Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.
- Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.[clarification needed]
- Multiple keys: Whether an encrypted volume can have more than one active key.
- Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.
- Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.
- Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.
- Filesystems: what filesystems are supported.
- Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11)
Name | Hidden containers | Pre-boot authentication | Single sign-on | Custom authentication | Multiple keys | Passphrase strengthening | Hardware acceleration | TPM | Filesystems | Two-factor authentication |
---|---|---|---|---|---|---|---|---|---|---|
Aloaha Secure Stick | Yes | No | N/A | Yes | Yes | No | No | No | NTFS, FAT32 | Yes |
ArchiCrypt Live | Yes[57] | No | N/A | No | Yes[57][58] | No | No | No | ? | Yes[57][59] |
BestCrypt | Yes | Yes | ? | No | Yes[60] | Yes | Yes | Yes | Any supported by OS | Yes[61] |
BitArmor DataControl | No | Yes | ? | No | Yes | Yes | No | No | NTFS, FAT32 on non-system volumes | No |
BitLocker Drive Encryption | No | Yes[62] | No | Yes[63] | Yes[64] | Yes[65] | Yes | Yes[64] | Chiefly NTFS [Note 1]:{{{3}}} | Yes [Note 2]:{{{3}}} |
Bloombase Keyparc | No | No | N/A | Yes | Yes | Yes | Yes | No | ? | ? |
CGD | No | No | N/A | Yes[66] | Yes[67] | Yes[66] | No | No | Any supported by OS | Yes[66] |
CenterTools DriveLock | No | Yes | Yes | No | No | Yes | No | No | Any supported by OS | Yes |
Check Point Full Disk Encryption | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | NTFS, FAT32 | Yes |
CipherShed | Yes (limited to one per "outer" container) |
only on Windows[68] | ? | No | yes with multiple keyfiles[69][70] | Yes | Yes | No[71] | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[72] | Yes |
CrossCrypt | No | No | N/A | No | No | No | No | No | ? | No |
CryptArchiver | No | No | N/A | No | No | ? | No | No | ? | ? |
Cryhod | No | Yes | Yes | No | Yes | Yes | Yes | No | Any supported by OS | No |
cryptoloop | No | Yes[73] | ? | Yes | No | No | Yes[citation needed] | No | Any supported by OS | ? |
cryptsetup/ dmsetup | No | Yes[73] | ? | Yes | No | No | Yes | No | Any supported by OS | No |
DiskCryptor | No | Yes | ? | No | No | No | Yes[74] | No | Only Windows MBR volumes; no UEFI GPT drives | Yes[74] |
DISK Protect | ? | Yes[75] | ? | ? | Yes[75] | ? | ? | No | ? | ? |
dm-crypt/LUKS | No | Yes[73] | ? | Yes | Yes | Yes | Yes | Partial[76] [Note 3]:{{{3}}} | Any supported by OS | Yes |
DriveCrypt | Yes[77] | Yes | ? | No | Yes | Yes | No | No | Any supported by OS | Yes |
DriveSentry GoAnywhere 2 | No | No | N/A | Yes | No | Yes | No | ? | Any supported by OS | Yes |
E4M | No | No | N/A | No | No | ? | No | No | ? | No |
e-Capsule Private Safe | Yes[78] | No | N/A | No | Yes[78] | No | Yes | No | ? | ? |
eCryptfs | No | No | N/A | Yes | Yes | Yes | Yes | Yes | Yes[79] | Yes |
EgoSecure HDD Encryption | No | Yes | Yes | Yes | Yes | Yes | Yes[80] | Yes | NTFS, FAT32 | Yes |
FileVault | No | No | N/A | No | Two passwords[81] | Yes[81] | ? | No | HFS+, possibly others | No |
FileVault 2 | No | Yes | Yes | No | Yes | Yes | Yes[82] | No | HFS+, possibly others | No |
FREE CompuSec | No | Yes | ? | No | No | No | No | No | Any supported by OS | No |
FreeOTFE | Yes | No | N/A | Yes[83] | Yes[84] | Yes | Yes | No | Any supported by OS | Yes |
GBDE | No | No[85] | N/A | Yes | Yes[86] | No[86] | No[85] | No | Any supported by OS | Yes |
GELI | No | Yes[85] | ? | Yes | Yes[87] | Yes[87] | Yes[85] | No | Any supported by OS | Yes |
loop-AES | No | Yes[88] | ? | Yes[88] | Yes[88] | Yes[88] | Yes[88] | No | Any supported by OS | Yes[89] |
McAfee Drive Encryption (SafeBoot) | Yes | Yes | Yes | Yes | Yes | Yes | Yes[90] | Yes | Any supported by OS | Yes |
n-Crypt Pro | No | No | N/A | No | No | N/A[92] | No | No | ? | ? |
PGPDisk | No | Yes[93] | Yes | ? | Yes | Yes[94] | ? | Yes | ? | Yes |
Private Disk | No | No | N/A | No | Yes | Yes | No | No | Any supported by OS | Yes |
ProxyCrypt | Yes | No | N/A | No | No | Yes | Yes | No | Any supported by OS | No |
R-Crypto | ? | No | N/A | ? | ? | ? | ? | ? | Any supported by OS | ? |
SafeGuard Easy | No | Yes | ? | No | Yes | Yes | No | Yes[95] | Any supported by OS | Yes |
SafeGuard Enterprise | No | Yes | Yes | No | Yes | Yes | No | Yes[95] | Any supported by OS | Yes |
SafeGuard PrivateDisk | No | No | N/A | No | Yes | Yes | No | Yes[96] | Any supported by OS | Yes |
SafeHouse Professional | No | No | N/A | Yes | Yes | Yes | No | No | Any supported by OS | Yes |
Scramdisk | Yes | No | N/A | No | No | No | No | No | ? | Last update to web site 2009-07-02 |
Scramdisk 4 Linux | Yes[97] | No | N/A | No | No | Yes[97] | No | No | ext2, ext3, reiserfs, minix, ntfs, vfat/msdos | No |
SecuBox | No | No | N/A | No | No | Yes | No | No | ? | No |
SecureDoc | No | Yes[98] | ? | Yes | Yes | Yes | Yes | Yes | ? | Yes |
Sentry 2020 | No | No | ? | No | No | No | No | No | ? | No |
softraid / RAID C | No | No | ? | ? | ? | ? | Yes | ? | Any supported by OS | ? |
svnd / vnconfig | No | No | N/A | No | No | Yes[99] | Yes | ? | Any supported by OS | ? |
Symantec Endpoint Encryption | No | Yes | Yes | Yes | Yes | Yes | No | No | NTFS, FAT32 | Yes |
Trend Micro Endpoint Encryption | No | Yes | Yes | Yes | Yes | Yes[100] | Yes [101] | No | Any supported by OS | Yes [102] |
TrueCrypt [Note 4]:{{{3}}} | Yes (limited to one per "outer" container) |
only on Windows[103] | ? | No | yes with multiple keyfiles[104][105] | Yes | Yes | No[106] | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[72] | Yes |
VeraCrypt | Yes (limited to one per "outer" container) |
only on Windows[107] | No | No | yes with multiple keyfiles | Yes | Yes | No | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged | Yes |
CyberSafe Top Secret | Yes | No | No | No | Yes | Yes | Yes | No | Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged | Yes |
Name | Hidden containers | Pre-boot authentication | Single sign-on | Custom authentication | Multiple keys | Passphrase strengthening | Hardware acceleration | TPM | Filesystems | Two-factor authentication |
<templatestyles src="Reflist/styles.css" />
Cite error: Invalid <references>
tag; parameter "group" is allowed only.
<references />
, or <references group="..." />
Layering
Lua error in Module:Details at line 30: attempt to call field '_formatLink' (a nil value).
- Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to "pre-boot authentication" in the features comparison table.
- Partition: Whether individual disk partitions can be encrypted.
- File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
- Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.
- Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
Name | Whole disk | Partition | File | Swap space | Hibernation file |
---|---|---|---|---|---|
Aloaha Secure Stick | No | No | Yes | No | No |
ArchiCrypt Live | Yes (except for the boot volume) |
Yes | Yes | No | No |
BestCrypt | Yes | Yes | Yes | Yes | Yes[112] |
BitArmor DataControl | No | Yes | No | Yes | Yes |
BitLocker Drive Encryption | Yes (except for the boot volume) |
Yes | Yes[113] | Yes (parent volume is encrypted) |
Yes (parent volume is encrypted) |
Bloombase Keyparc | Yes | Yes | Yes | Yes | No |
CenterTools DriveLock | Yes | Yes | Yes | Yes | Yes |
CGD | Yes | Yes | Yes[66] | Yes | No |
Check Point Full Disk Encryption | Yes | Yes | Yes | Yes | Yes |
CipherShed | Yes | Yes | Yes | Yes | only on Windows |
CrossCrypt | No | No | Yes | No | No |
CryptArchiver | No | No | Yes | No | No |
Cryhod | No | Yes | No | Yes | Yes (parent volume is encrypted) |
cryptoloop | Yes | Yes | Yes | Yes | No |
Cryptomill | Yes | N/A | Yes | N/A | N/A |
DiskCryptor | Yes | Yes | No | Yes | Yes |
dm-crypt | Yes | Yes | Yes[114] | Yes | Yes[115] |
DriveCrypt | Yes | Yes[77] | Yes[77] | No | No |
DriveSentry GoAnywhere 2 | No | Yes | Yes | No | No |
E4M | No | Yes | Yes | No | No |
e-Capsule Private Safe | No | No | Yes[116] | No | No |
eCryptfs | No | No | Yes | No | No |
EgoSecure HDD Encryption | Yes | Yes | Yes | Yes | Yes |
FileVault | No | No | Yes[81] | Yes[117][81] | Yes[117][118] |
FileVault 2 | Yes[119] | Yes[82] | No | Yes | Yes |
FREE CompuSec | Yes | No | Yes | Yes | Yes |
FreeOTFE | Yes (except for the boot volume) |
Yes | Yes | No | No |
GBDE | Yes | Yes | Yes[120] | Yes | No |
GELI | Yes | Yes | Yes[120] | Yes | No |
loop-AES | Yes | Yes[88] | Yes[88] | Yes[88] | Yes[88] |
McAfee Drive Encryption (SafeBoot) | Yes | Yes | Yes | Yes | Yes[121] |
n-Crypt Pro | Yes | Yes | Yes | No | No |
PGPDisk | Yes | Yes | Yes | Yes | only on Windows |
Private Disk | No | No | Yes | No | No |
ProxyCrypt | Yes | Yes | Yes | No | No |
R-Crypto | No | No | Yes | No | No |
SafeGuard Easy | Yes | Yes | extra module | Yes | Each sector on disk is encrypted |
SafeGuard Enterprise | Yes | Yes | Yes | Yes | Each sector on disk is encrypted |
SafeGuard PrivateDisk | No | No | Yes | No | No |
SafeHouse Professional | No | No | Yes | No | No |
Scramdisk | No | Yes | Yes | No | No |
Scramdisk 4 Linux | Yes | Yes | Yes | Yes | No |
SecuBox | No | No | Yes | N/A | No |
SecureDoc | Yes[98] | Yes | Yes | Yes | Yes |
Sentry 2020 | No | No | Yes | No | No |
softraid / RAID C | Yes | Yes | No | Yes (encrypted by default in OpenBSD)[122] | No |
svnd / vnconfig | ? | Yes | Yes | Yes (encrypted by default in OpenBSD) | ? |
SpyProof! | No | Yes | Yes | No | No |
Symantec Endpoint Encryption | Yes | Yes | Yes | Yes | Yes |
Trend Micro Endpoint Encryption | Yes | Yes | Yes | Yes | Yes |
TrueCrypt | Yes[123] | Yes | Yes | Yes | only on Windows[124] |
VeraCrypt | Yes | Yes | Yes | Yes | only on Windows[125] |
CyberSafe Top Secret | No | Yes | Yes | No | No |
Name | Whole disk | Partition | File | Swap space | Hibernation file |
Modes of operation
Lua error in Module:Details at line 30: attempt to call field '_formatLink' (a nil value).
Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
- CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
- CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
- CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
- LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[126]
- XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
Name | CBC w/ predictable IVs | CBC w/ secret IVs | CBC w/ random per-sector keys | LRW | XTS |
---|---|---|---|---|---|
Aloaha Secure Stick | No | No | No | Yes | Yes |
ArchiCrypt Live | No | No | No | Legacy support[127] | Yes |
BestCrypt | No | Yes | No | Yes[128] | Yes[129] |
BitArmor DataControl | No | Yes | Plumb-IV | No | No |
BitLocker Drive Encryption | No[130] | Yes[130] | No | No | Yes, Windows 10 10547+ |
Bloombase Keyparc | ? | Yes | ? | ? | ? |
CGD | No | Yes[131] | No | No | No |
CenterTools DriveLock | ? | ? | ? | ? | ? |
Check Point Full Disk Encryption | No | No | Yes | Yes | Yes |
CipherShed | Legacy support[132] | No | No | Legacy support[133] | Yes[134] |
CrossCrypt | Yes | No | No | No | No |
CryptArchiver | ? | ? | ? | ? | ? |
Cryhod | Yes | No | No | No | No |
cryptoloop | Yes | No | No | No | No |
DiskCryptor | No | No | No | No | Yes |
dm-crypt | Yes | Yes | No | Yes, using *-lrw-benbi[135] | Yes, using *-xts-plain |
DriveCrypt | ? | ? | ? | ? | ? |
DriveSentry GoAnywhere 2 | ? | ? | ? | ? | ? |
E4M | ? | ? | ? | No | No |
e-Capsule Private Safe | ? | ? | ? | ? | ? |
eCryptfs | No | Yes | ? | No | No |
EgoSecure HDD Encryption | No | Yes | No | No | No |
FileVault | Yes[81] | No | No | No | No |
FileVault 2 | No | No | No | No | Yes[136] |
FREE CompuSec | Yes | No | No | No | No |
FreeOTFE | Yes | Yes | No | Yes | Yes |
GBDE | No | No | Yes[86] | No | No |
GELI | No | Yes[137] | No | No | Yes |
loop-AES | single-key, multi-key-v2 modes[88] | multi-key-v3 mode[88] | No | No | No |
McAfee Drive Encryption (SafeBoot) | No | Yes | No | No | No |
n-Crypt Pro | ? | ? | No | No | No |
PGPDisk | ? | ? | ? | ? | ? |
Private Disk | No | Yes | No | No | No |
ProxyCrypt | No | No | No | No | Yes |
R-Crypto | ? | ? | ? | ? | ? |
SafeGuard Easy | ? | ? | ? | ? | ? |
SafeGuard Enterprise | ? | ? | ? | ? | ? |
SafeGuard PrivateDisk | ? | ? | ? | ? | ? |
SafeHouse Professional | Yes | No | No | No | No |
Scramdisk | No | Yes | No | No | No |
Scramdisk 4 Linux | No | Yes[138] | No | Yes[139] | Yes[140] |
SecuBox | Yes | No | No | No | No |
SecureDoc | ? | ? | ? | ? | ? |
Sentry 2020 | ? | ? | ? | ? | ? |
softraid / RAID C | ? | ? | ? | ? | Yes[141] |
svnd / vnconfig | ? | ? | ? | ? | ? |
Symantec Endpoint Encryption | No | No | Yes | No | No |
TrueCrypt | Legacy support[142] | No | No | Legacy support[143] | Yes[144] |
USBCrypt | No | Yes | No | No | Yes |
VeraCrypt | No | No | No | No | Yes |
CyberSafe Top Secret | No | No | No | No | Yes |
Name | CBC w/ predictable IVs | CBC w/ secret IVs | CBC w/ random per-sector keys | LRW | XTS |
See also
- Cold boot attack
- Comparison of encrypted external drives
- Disk encryption software
- Disk encryption theory
- List of cryptographic file systems
Notes and references
<templatestyles src="Reflist/styles.css" />
Cite error: Invalid <references>
tag; parameter "group" is allowed only.
<references />
, or <references group="..." />
External links
- DiskCryptor vs Truecrypt - Comparison in between DiskCryptor and Truecrypt
- Buyer's Guide to Full Disk Encryption - Overview of full-disk encryption, how it works, and how it differs from file-level encryption—plus an overview of leading full-disk encryption software.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Original release as Protect Data Security Inc.'s "Protect!style="background: #ececec; color: black; font-weight: bold; vertical-align: middle; text-align: left; " class="table-rh"|"Lua error in package.lua at line 80: module 'strict' not found.[dead link]
- ↑ Company and product name change to Pointsec Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Initial cryptoloop patches for the Linux 2.5 development kernel: http://uwsg.iu.edu/hypermail/linux/kernel/0307.0/0348.html
- ↑ dm-crypt was first included in Linux kernel version 2.6.4: http://lwn.net/Articles/75404/
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.).
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Rebranded as ThinkVantage Client Security Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ OpenBSD 4.2 change notes
- ↑ OpenBSD 2.8 change notes
- ↑ [1]
- ↑ Trend Micro
- ↑ [2]
- ↑ TrueCrypt version history
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ VeraCrypt version history
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ http://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption
- ↑ 39.0 39.1 [3] FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
- ↑ http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf
- ↑ [4] Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used
- ↑ [5] Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system
- ↑ [6] PocketPC freeware release- SmartPhone beta available
- ↑ 44.0 44.1 44.2 [7] FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes
- ↑ [8] FreeOTFE4PDA supports dm-crypt/LUKS volumes
- ↑ [9] libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes
- ↑ [10] Supports Linux volumes
- ↑ [11] Supports Linux volumes
- ↑ [12] Third party app allows a user to open LibreCrypt compatible LUKS containers
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ [13] The current version of SEE (8.2.1) does not support Windows 8.
- ↑ http://www.symantec.com/endpoint-encryption/system-requirements/
- ↑ [14] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used
- ↑ [15] Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system
- ↑ [16] Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
- ↑ [17] Hidden containers description from Jetico (BestCrypt)
- ↑ 57.0 57.1 57.2 Secret-containers and Camouflage files ArchiCrypt Live Description
- ↑ Supports "Guest" keys
- ↑ Using "Archicrypt Card"
- ↑ Supported by the BestCrypt container format; see BestCrypt SDK
- ↑ Supported by the BestCrypt Volume Encryption software
- ↑ With PIN or USB key)
- ↑ BitLocker Drive Encryption: Value Add Extensibility Options
- ↑ 64.0 64.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Recovery keys only.
- ↑ 66.0 66.1 66.2 66.3 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 72.0 72.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 73.0 73.1 73.2 dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted
- ↑ 74.0 74.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 75.0 75.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 77.0 77.1 77.2 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 78.0 78.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ uses the lower filesystem (stacking)
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 81.0 81.1 81.2 81.3 81.4 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 82.0 82.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ FreeOTFE has a modular architecture and set of components to allow 3rd party integration
- ↑ FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
- ↑ 85.0 85.1 85.2 85.3 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 86.0 86.1 86.2 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 87.0 87.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 88.00 88.01 88.02 88.03 88.04 88.05 88.06 88.07 88.08 88.09 88.10 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Using customization
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ PGP private keys are always protected by strengthened passphrases
- ↑ 95.0 95.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 97.0 97.1 For Truecrypt containers
- ↑ 98.0 98.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ optional by using -K OpenBSD Manual Pages: vnconfig(8)
- ↑ http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx
- ↑ http://esupport.trendmicro.com/solution/en-US/1058686.aspx
- ↑ http://esupport.trendmicro.com/solution/en-US/1059884.aspx
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ http://www.jetico.com/data-protection-encryption-bestcrypt-volume-encryption-enterprise/
- ↑ Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/
- ↑ dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
- ↑ yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
- ↑ Uses proprietary e-Capsule file system not exposed to the OS.
- ↑ 117.0 117.1 not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
- ↑ http://macmarshal.com/images/Documents/mm_wp_102.pdf
- ↑ http://support.apple.com/kb/HT4790?viewlocale=en_US&locale=en_US
- ↑ 120.0 120.1 File-based volume encryption is possible when used with mdconfig(8) utility.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
- ↑ however, not Windows UEFI-based computers with a GUID partition table (GPT)
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ LRW_issue
- ↑ Containers created with ArchiCrypt Live version 5 use LRW
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 130.0 130.1 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
- ↑ Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
- ↑ Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.
- ↑ Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: http://lwn.net/Articles/213650/
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ For Scramdisk containers
- ↑ For Truecrypt 4 containers
- ↑ For Truecrypt 5 and 6 containers
- ↑ Commit enabling AES XTS
- ↑ Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
- ↑ Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
- ↑ Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.
Cite error: <ref>
tags exist for a group named "Note", but no corresponding <references group="Note"/>
tag was found, or a closing </ref>
is missing