Filesystems: What filesystems are supported.Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.Multiple keys: Whether an encrypted volume can have more than one active key.Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others. Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption.TrueCrypt License Version 3.0 (legacy code only) Trend Micro Endpoint Encryption (Mobile Armor) PGP Corporation (acquired by Symantec in 2010) Create a virtual disk and add extra protection to it with VeraCrypt’s encryption. NetLib Encryptionizer (directory encryption) VeraCrypt enhances security to your data by performing real time encryption. Source Auditable for Commercial CustomersÄustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) This is a technical feature comparison of different disk encryption software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |