BestCrypt
Encyclopedia
BestCrypt is a commercial disk encryption
Disk encryption software
To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses software that is used to implement the technique...

 program for Windows and Linux, developed by Jetico.

Features

  • BestCrypt can create and mount an encrypted virtual drive
    Virtual drive
    A virtual drive in computing is a device that to the operating system appears to be an ordinary physical disk drive, with disc images substituted for disc reading hardware through the use of software called a disk emulator...

     using AES
    Advanced Encryption Standard
    Advanced Encryption Standard is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. It supersedes DES...

    , Blowfish
    Blowfish (cipher)
    Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. Blowfish provides a good encryption rate in software and no effective cryptanalysis of it has been found to date...

    , Twofish
    Twofish
    In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but was not selected for standardisation...

    , CAST
    CAST
    -Organizations:* CAST, the maker of CAST Application Intelligence Platform* Center for Advanced Spatial Technologies at the University of Arkansas, Fayetteville...

    , and various other encryption methods. BestCrypt v.8 alternatively mount a subfolder on a NTFS
    NTFS
    NTFS is the standard file system of Windows NT, including its later versions Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008, Windows Vista, and Windows 7....

     disk instead of a drive.
  • BestCrypt can also encrypt a set of files into a single, self-extracting archive.
  • BestCrypt can transparently encrypt entire partitions or volumes. Files are still accessible.

See also

  • Full disk encryption
    Full disk encryption
    Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term "full disk encryption" is often used to signify that everything on a disk is encrypted, including the...

  • Disk encryption software
    Disk encryption software
    To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses software that is used to implement the technique...

  • Comparison of disk encryption software
    Comparison of disk encryption software
    -Background information:-Operating systems:-Features:* Hidden containers: Whether hidden containers can be created for deniable encryption...

  • OTFE
    OTFE
    On-the-fly encryption , also known as Real-time Encryption, is a method used by some encryption programs, for example, disk encryption software...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK