FACTOID # 23: Wisconsin has more metal fabricators per capita than any other state.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Disk encryption software

To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses software which is used to implement the technique (for cryptographic aspects of the problem see disk encryption). Compared to access restrictions commonly enforced by an OS this technique allows to protect data even when the OS is not active, for example, if data is read directly from the hardware. Computer security is the current computer science collaboration of the week! Please help improve it to featured article standard. ... Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e. ... Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e. ... An operating system (OS) is a computer program that manages the hardware and software resources of a computer. ...


Such software encrypts data stored on a computer's mass storage and transparently decrypts the information when an authorized user requests it: no special action by the user (except supplying a password or passphrase at the beginning of a session) is required. Some also provide plausible deniability with deniable encryption techniques. // In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge. ... In computing, mass storage is the use of devices specifically designed for the storage of large amounts of data which may, or may not, be needed immediately. ... A password is a form of secret authentication data that is used to control access to a resource. ... A passphrase is a sequence of words or other text used to control access to a computer system, program or data. ... Plausible deniability also Deniability is the term given to the creation of loose and informal chains of command in government, which allow controversial instructions given by high-ranking officials to be denied if they become public. ... In cryptography, deniable encryption allows an encrypted message to be decrypted to different sensible plaintexts, depending on the key used. ...


The volume-level encryption is particularly suited to portable devices such as laptop computers and thumb drives. If used properly, someone finding a lost device will have access only to meaningless encrypted files. A strong passphrase (e.g. five or more diceware words) is essential for full security. Laptop with touchpad. ... A USB keydrive, shown with a US quarter coin for scale. ... Diceware is a method for creating passphrases, passwords and other cryptographic variables using ordinary dice as a hardware random number generator. ...


Although disk encryption software can transparently operate on an entire disk volume, a directory, or even a single file, it is important to differentiate it with (non-transparent) file encryption software which encrypts or decrypts only individual files and always the whole file (the decrypted file is stored in a temporary file in an unencrypted form). Examples of software which can be used for file encryption are special-purpose software (e.g., GNU Privacy Guard), file archivers, or even text editors (e.g., emacs or vi) The GNU Privacy Guard (GnuPG or GPG) is a free software replacement for the PGP suite of cryptographic software, released under the GNU General Public License. ... A file archiver combines a number of files together into one archive file, or a series of archive files, for easier transportation or storage. ... Notepad is the standard text editor for Microsoft Windows A text editor is a piece of computer software for editing plain text. ... This article is about the text editor. ... The correct title of this article is vi. ...

Contents

Notable disk encryption software

Cross-Platform

Windows/Linux

TrueCrypt is a free open source on-the-fly encryption (OTFE) program for Microsoft Windows XP/2000/2003 and Linux. ... Plausible deniability also Deniability is the term given to the creation of loose and informal chains of command in government, which allow controversial instructions given by high-ranking officials to be denied if they become public. ... BestCrypt is a commercial full disk encryption suite from Jetico for Windows and Linux. ...

Linux

  • aespipe, program to encrypt a file stream with the AES algorithm with key lengths 128, 192 and 256 bit.
  • dm-crypt, included in the mainline kernel starting from kernel version 2.6.4. Is, however, unstable and can cause major data corruption when used together with software RAID5.[citation needed]
    • cryptmount allows mounting dm-crypt volumes without superuser privileges.
    • LUKS (Linux Unified Key Setup) aims to improve dm-crypt key management.
  • Cryptoloop, a "loopback" encryption method, is included in the mainline kernel but is insecure and has been deprecated in favor of dm-crypt.
  • eCryptfs, a stacked filesystem in the kernel version 2.6.19.
  • EncFS uses FUSE, provides an encrypted filesystem in user space.
  • loop-AES supports kernel 2.0.x onward; no kernel patch required, but requires loading of a kernel module. Is one of the most mature methods.
  • Phonebook is another encrypted filesystem in userspace using FUSE, providing deniable encryption through chaff and layers. No longer maintained.
  • rubberhose, last version (alpha) released in 2000. Never released a Beta version. Not maintained. For the Linux 2.2 kernel which is also no longer supported by Linus Torvalds.
  • StegFS, the current successor to the ideas embodied by the rubberhose and PhoneBookFS filesystems and in need of developers.

It is not clear, which of the encrypted files of the above software are compatible to each other, even though most support the AES algorithm. In cryptography, the Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government. ... To meet Wikipedias quality standards, this article or section can be improved by converting lengthy lists to text. ... In computing, the acronym RAID (originally redundant array of inexpensive disks, now also known as redundant array of independent disks) refers to a data storage scheme using multiple hard drives to share or replicate data among the drives. ... The Linux Unified Key Setup or LUKS is a hard disk encryption standard for Linux created by Clemens Fruhwirth. ... This article or section is in need of attention from an expert on the subject. ... In Unix-like operating systems, a loop device, loopback device, vnd (vnode disk), or lofi (loopback file interface) is a device node that represents a regular file. ... To meet Wikipedias quality standards, this article or section can be improved by converting lengthy lists to text. ... EncFS is a Free (GPLed) FUSE-based filesystem that transparently encrypts files, using an arbitrary folder as storage for the encrypted files. ... Filesystem in Userspace (FUSE) is a Free (GPL and LGPLed) Unix kernel module that allows non-privileged users to create their own file systems without the need to write any kernel code. ... An operating system usually segregates the available system memory into kernel space and user space. ... To meet Wikipedias quality standards, this article or section may require cleanup. ... Filesystem in Userspace (FUSE) is a Free (GPL and LGPLed) Unix kernel module that allows non-privileged users to create their own file systems without the need to write any kernel code. ... In cryptography, deniable encryption allows an encrypted message to be decrypted to different sensible plaintexts, depending on the key used. ... In cryptography, the Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government. ...


BSD

NetBSD is a freely redistributable, open source version of the Unix-like BSD computer operating system. ... FreeBSD is a Unix-like free operating system descended from AT&T UNIX via the Berkeley Software Distribution (BSD) branch through the 386BSD and 4. ... OpenBSD is a freely available Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Unix derivative developed at the University of California, Berkeley. ...

Mac OS X

  • Disk image support includes optional AES-128 encryption.
    • Since 10.3, FileVault uses this capability to provide an encrypted home directory.
  • "Secure virtual memory" support since 10.4.

FileVault is a system that protects files on a computer. ...

Windows

BitLockerâ„¢ Drive Encryption is a data protection feature integrated into Windows Vistaâ„¢ that provides encryption for the entire O/S volume. ... Windows Vista is the name of the latest release of Microsoft Windows, a line of graphical operating systems used on personal computers, including home and business desktops, notebook computers, and media centers. ... CrossCrypt is an open-source on-the-fly encryption program that is compatible with Microsoft Windows XP and Linux computer operating systems. ... http://www. ... Scramdisk is a free OTFE (On-The-Fly Encryption) program for Windows 95, Windows 98 and Windows ME. Scramdisk isn’t available for Windows 2000/Windows XP and is currently unmaintained and has therefore been superseded by the commercial DriveCrypt program as well as the open source TrueCrypt. ...

See also

Portal:Cryptography
Cryptography Portal

Image File history File links Key-crypto-sideways. ... Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e. ... Full disk encryption (or whole disk encryption) is a kind of disk encryption software or hardware which encrypts every bit of data that goes on a disk. ... On-the-fly encryption (OTFE) is a term often used when referring to disk encryption software. ...

External links


 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m