FreeOTFE
Encyclopedia
FreeOTFE is an open source
on-the-fly disk encryption
(OTFE) computer program for PCs running Microsoft Windows
, and personal digital assistant
s (PDAs) running Windows Mobile
(use FreeOTFE4PDA). It creates virtual drive
s, or disks, to which anything written is automatically encrypted before being stored on a computer's hard or USB
drive. It is similar in function to other disk encryption programs including Microsoft's BitLocker.
This software is compatible with Linux encrypted volumes (e.g. LUKS, cryptoloop
, dm-crypt
), allowing data encrypted under Linux to be read (and written) freely. It was the first open source transparent disk encryption system to support Windows Vista
and PDAs.
Optional two-factor authentication
using smart card
s and/or hardware security module
s (HSMs, also termed security tokens) was introduced in v4.0, using the PKCS#11
(Cryptoki) standard developed by RSA Laboratories.
FreeOTFE also allows any number of "hidden volumes" to be created, giving plausible deniability
and deniable encryption
, and also has the option of encrypting full partitions or disks (but not the system partition).
without installation of the complete program to "mount" and access the encrypted data through a virtual disk.
In common with other disk encryption systems which offer a "portable" (or "traveller") mode, the use of this mode requires installing device drivers (at least temporarily) to create virtual disks, and as a consequence administrator rights are needed to start this traveller mode. Like most open source software which uses device drivers the user must enable test signing when ran under Windows Vista x64 and Windows 7 x64 systems.
This allows FreeOTFE encrypted data to be used on (for example) public computers found in libraries or computer kiosks (interactive kiosk
s), where administrator rights are unavailable.
Unlike FreeOTFE, FreeOTFE Explorer does not provide on-the-fly encryption through a virtual drive. Instead it works in a similar manner as some archiving software in that it lets files be stored and extracted from encrypted disk images, in a similar manner as ZIP
and RAR archives, by using a Windows Explorer interface.
It includes all National Institute of Standards and Technology
(NIST) Advanced Encryption Standard
(AES) finalists, and all ciphers can be used with multiple different keylengths.
standard for disk encryption.
Open-source software
Open-source software is computer software that is available in source code form: the source code and certain other rights normally reserved for copyright holders are provided under a software license that permits users to study, change, improve and at times also to distribute the software.Open...
on-the-fly disk encryption
Disk encryption
Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device . This article presents cryptographic aspects of the problem...
(OTFE) computer program for PCs running Microsoft Windows
Microsoft Windows
Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...
, and personal digital assistant
Personal digital assistant
A personal digital assistant , also known as a palmtop computer, or personal data assistant, is a mobile device that functions as a personal information manager. Current PDAs often have the ability to connect to the Internet...
s (PDAs) running Windows Mobile
Windows Mobile
Windows Mobile is a mobile operating system developed by Microsoft that was used in smartphones and Pocket PCs, but by 2011 was rarely supplied on new phones. The last version is "Windows Mobile 6.5.5"; it is superseded by Windows Phone, which does not run Windows Mobile software.Windows Mobile is...
(use FreeOTFE4PDA). It creates virtual drive
Virtual drive
A virtual drive in computing is a device that to the operating system appears to be an ordinary physical disk drive, with disc images substituted for disc reading hardware through the use of software called a disk emulator...
s, or disks, to which anything written is automatically encrypted before being stored on a computer's hard or USB
USB flash drive
A flash drive is a data storage device that consists of flash memory with an integrated Universal Serial Bus interface. flash drives are typically removable and rewritable, and physically much smaller than a floppy disk. Most weigh less than 30 g...
drive. It is similar in function to other disk encryption programs including Microsoft's BitLocker.
Overview
FreeOTFE was initially released by Sarah Dean in 2004, and was the first open source code disk encryption system that provided a modular architecture allowing 3rd parties to implement additional algorithms if needed. Older FreeOTFE licensing required that any modification to the program be placed in the public domain. This does not conform technically to section 3 of the Open Source definition. Newer program licensing omits this condition.This software is compatible with Linux encrypted volumes (e.g. LUKS, cryptoloop
Cryptoloop
Cryptoloop is a disk encryption module for Linux which relies on the Crypto API in the 2.6 Linux kernel series. It was first introduced in the 2.5.x kernel series...
, dm-crypt
Dm-crypt
dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD. It is part of the device mapper infrastructure, and uses cryptographic routines from the kernel's Crypto API...
), allowing data encrypted under Linux to be read (and written) freely. It was the first open source transparent disk encryption system to support Windows Vista
Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...
and PDAs.
Optional two-factor authentication
Two-factor authentication
Two-factor authentication is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi-factor authentication, which is a defense in depth approach to security...
using smart card
Smart card
A smart card, chip card, or integrated circuit card , is any pocket-sized card with embedded integrated circuits. A smart card or microprocessor cards contain volatile memory and microprocessor components. The card is made of plastic, generally polyvinyl chloride, but sometimes acrylonitrile...
s and/or hardware security module
Hardware Security Module
A hardware security module is a type of secure cryptoprocessor targeted at managing digital keys, accelerating cryptoprocesses in terms of digital signings/second and for providing strong authentication to access critical keys for server applications...
s (HSMs, also termed security tokens) was introduced in v4.0, using the PKCS#11
PKCS11
In cryptography, PKCS #11 is one of the family of standards called Public-Key Cryptography Standards , published by RSA Laboratories, that defines a platform-independent API to cryptographic tokens, such as Hardware Security Modules and smart cards...
(Cryptoki) standard developed by RSA Laboratories.
FreeOTFE also allows any number of "hidden volumes" to be created, giving plausible deniability
Plausible deniability
Plausible deniability is, at root, credible ability to deny a fact or allegation, or to deny previous knowledge of a fact. The term most often refers to the denial of blame in chains of command, where upper rungs quarantine the blame to the lower rungs, and the lower rungs are often inaccessible,...
and deniable encryption
Deniable encryption
In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny that the data is encrypted, or that they are able to decrypt it. Such convincing denials may or may not be genuine. For example, although suspicions might exist that the data is...
, and also has the option of encrypting full partitions or disks (but not the system partition).
Portable use
Unlike most disk encryption systems, FreeOTFE can be used in "portable mode", which allows it to be kept on a USB drive or other portable media, together with its encrypted data, and carried around. This allows it to be used under Microsoft WindowsMicrosoft Windows
Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...
without installation of the complete program to "mount" and access the encrypted data through a virtual disk.
In common with other disk encryption systems which offer a "portable" (or "traveller") mode, the use of this mode requires installing device drivers (at least temporarily) to create virtual disks, and as a consequence administrator rights are needed to start this traveller mode. Like most open source software which uses device drivers the user must enable test signing when ran under Windows Vista x64 and Windows 7 x64 systems.
Driverless operation
The author of FreeOTFE also offers another program called "FreeOTFE Explorer" which provides a driverless system that allows encrypted disks to be used without administrator rights.This allows FreeOTFE encrypted data to be used on (for example) public computers found in libraries or computer kiosks (interactive kiosk
Interactive kiosk
An Interactive kiosk is a computer terminal featuring specialized hardware and software designed within a public exhibit that provides access to information and applications for communication, commerce, entertainment, and education....
s), where administrator rights are unavailable.
Unlike FreeOTFE, FreeOTFE Explorer does not provide on-the-fly encryption through a virtual drive. Instead it works in a similar manner as some archiving software in that it lets files be stored and extracted from encrypted disk images, in a similar manner as ZIP
ZIP (file format)
Zip is a file format used for data compression and archiving. A zip file contains one or more files that have been compressed, to reduce file size, or stored as is...
and RAR archives, by using a Windows Explorer interface.
Algorithms implemented
Due to its architecture, FreeOTFE provides great flexibility to the user with its encryption options.Ciphers
FreeOTFE implements several ciphers, including:
|
|
It includes all National Institute of Standards and Technology
National Institute of Standards and Technology
The National Institute of Standards and Technology , known between 1901 and 1988 as the National Bureau of Standards , is a measurement standards laboratory, otherwise known as a National Metrological Institute , which is a non-regulatory agency of the United States Department of Commerce...
(NIST) Advanced Encryption Standard
Advanced Encryption Standard
Advanced Encryption Standard is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. It supersedes DES...
(AES) finalists, and all ciphers can be used with multiple different keylengths.
Cipher modes
FreeOTFE originally offered encryption using cipher-block chaining (CBC) with encrypted salt-sector initialization vector (ESSIV), though from v3.00 introduced LRW and also the more secure XTS mode, which supersedes LRW in the IEEE P1619IEEE P1619
IEEE P1619 is an Institute of Electrical and Electronics Engineers standardization project for encryption of stored data, but more generically refers to the work of the IEEE P1619 Security in Storage Working Group , which includes a family of standards for protection of stored data and for the...
standard for disk encryption.
Hashes
As with its cipher options, FreeOTFE offers many different hash algorithms:
|
|
|
|
See also
- Disk encryptionDisk encryptionDisk encryption is a special case of data at rest protection when the storage media is a sector-addressable device . This article presents cryptographic aspects of the problem...
- Disk encryption softwareDisk encryption softwareTo protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses software that is used to implement the technique...
- Comparison of disk encryption softwareComparison of disk encryption software-Background information:-Operating systems:-Features:* Hidden containers: Whether hidden containers can be created for deniable encryption...