51 relations: Block cipher, Booting, Comparison of disk encryption software, Computer file, Cryptmount, Crypto API (Linux), Cryptoloop, Device file, Device mapper, Disk encryption, Disk encryption theory, Disk image, Disk partitioning, Dm-crypt, DragonFly BSD, Ext2, Ext2Fsd, Ext3, File Allocation Table, File system, FreeOTFE, Front and back ends, Hash function, Initial ramdisk, Initialization vector, Key (cryptography), Key management, Key stretching, Linux distribution, Linux kernel, Linux Unified Key Setup, Logical volume management, Logical Volume Manager (Linux), Loop device, Mount (computing), NTFS, Operating system, Paging, Passphrase, PBKDF2, RAID, Removable media, Salt (cryptography), Smart card, Superuser, Symmetric-key algorithm, TrueCrypt, TU Wien, User space, Watermarking attack, ..., Write barrier. Expand index (1 more) »
Block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.
New!!: Dm-crypt and Block cipher · See more »
Booting
In computing, booting is starting up a computer or computer appliance until it can be used.
New!!: Dm-crypt and Booting · See more »
Comparison of disk encryption software
This is a technical feature comparison of different disk encryption software.
New!!: Dm-crypt and Comparison of disk encryption software · See more »
Computer file
A computer file is a computer resource for recording data discretely in a computer storage device.
New!!: Dm-crypt and Computer file · See more »
Cryptmount
cryptmount is a software tool for managing encrypted file systems under the Linux family of operating systems.
New!!: Dm-crypt and Cryptmount · See more »
Crypto API (Linux)
Crypto API is a cryptography framework in the Linux kernel, for various parts of the kernel that deal with cryptography, such as IPsec and dm-crypt.
New!!: Dm-crypt and Crypto API (Linux) · See more »
Cryptoloop
Cryptoloop is a Linux kernel's disk encryption module that relies on the Crypto API, which is a cryptography framework introduced in version 2.5.45 of the Linux kernel mainline.
New!!: Dm-crypt and Cryptoloop · See more »
Device file
In Unix-like operating systems, a device file or special file is an interface to a device driver that appears in a file system as if it were an ordinary file.
New!!: Dm-crypt and Device file · See more »
Device mapper
The device mapper is a framework provided by the Linux kernel for mapping physical block devices onto higher-level virtual block devices.
New!!: Dm-crypt and Device mapper · See more »
Disk encryption
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.
New!!: Dm-crypt and Disk encryption · See more »
Disk encryption theory
Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk).
New!!: Dm-crypt and Disk encryption theory · See more »
Disk image
A disk image, in computing, is a computer file containing the contents and structure of a disk volume or of an entire data storage device, such as a hard disk drive, tape drive, floppy disk, optical disc or USB flash drive.
New!!: Dm-crypt and Disk image · See more »
Disk partitioning
Disk partitioning or disk slicing is the creation of one or more regions on a hard disk or other secondary storage, so that an operating system can manage information in each region separately.
New!!: Dm-crypt and Disk partitioning · See more »
Dm-crypt
dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD.
New!!: Dm-crypt and Dm-crypt · See more »
DragonFly BSD
DragonFly BSD is a free and open source Unix-like operating system created as a fork of FreeBSD 4.8.
New!!: Dm-crypt and DragonFly BSD · See more »
Ext2
The ext2 or second extended file system is a file system for the Linux kernel.
New!!: Dm-crypt and Ext2 · See more »
Ext2Fsd
Ext2Fsd (short for Ext2 File System Driver) is a free Installable File System driver written in C for the Microsoft Windows operating system family.
New!!: Dm-crypt and Ext2Fsd · See more »
Ext3
ext3, or third extended filesystem, is a journaled file system that is commonly used by the Linux kernel.
New!!: Dm-crypt and Ext3 · See more »
File Allocation Table
File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it.
New!!: Dm-crypt and File Allocation Table · See more »
File system
In computing, a file system or filesystem controls how data is stored and retrieved.
New!!: Dm-crypt and File system · See more »
FreeOTFE
FreeOTFE is a discontinued open source computer program for on-the-fly disk encryption (OTFE).
New!!: Dm-crypt and FreeOTFE · See more »
Front and back ends
In software engineering, the terms front end and back end refer to the separation of concerns between the presentation layer (front end), and the data access layer (back end) of a piece of software, or the physical infrastructure or hardware.
New!!: Dm-crypt and Front and back ends · See more »
Hash function
A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.
New!!: Dm-crypt and Hash function · See more »
Initial ramdisk
In computing (specifically in regards to Linux computing), initrd (initial ramdisk) is a scheme for loading a temporary root file system into memory, which may be used as part of the Linux startup process.
New!!: Dm-crypt and Initial ramdisk · See more »
Initialization vector
In cryptography, an initialization vector (IV) or starting variable (SV) is a fixed-size input to a cryptographic primitive that is typically required to be random or pseudorandom.
New!!: Dm-crypt and Initialization vector · See more »
Key (cryptography)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
New!!: Dm-crypt and Key (cryptography) · See more »
Key management
Key management refers to management of cryptographic keys in a cryptosystem.
New!!: Dm-crypt and Key management · See more »
Key stretching
In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the time it takes to test each possible key.
New!!: Dm-crypt and Key stretching · See more »
Linux distribution
A Linux distribution (often abbreviated as distro) is an operating system made from a software collection, which is based upon the Linux kernel and, often, a package management system.
New!!: Dm-crypt and Linux distribution · See more »
Linux kernel
The Linux kernel is an open-source monolithic Unix-like computer operating system kernel.
New!!: Dm-crypt and Linux kernel · See more »
Linux Unified Key Setup
In computing, the Linux Unified Key Setup or LUKS is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux.
New!!: Dm-crypt and Linux Unified Key Setup · See more »
Logical volume management
In computer storage, logical volume management or LVM provides a method of allocating space on mass-storage devices that is more flexible than conventional partitioning schemes to store volumes.
New!!: Dm-crypt and Logical volume management · See more »
Logical Volume Manager (Linux)
In Linux, Logical Volume Manager (LVM) is a device mapper target that provides logical volume management for the Linux kernel.
New!!: Dm-crypt and Logical Volume Manager (Linux) · See more »
Loop device
In Unix-like operating systems, a loop device, vnd (vnode disk), or lofi (loop file interface) is a pseudo-device that makes a file accessible as a block device.
New!!: Dm-crypt and Loop device · See more »
Mount (computing)
Mounting is a process by which the operating system makes files and directories on a storage device (such as hard drive, CD-ROM, or network share) available for user to access via the computer's file system.
New!!: Dm-crypt and Mount (computing) · See more »
NTFS
NTFS (New Technology File System) is a proprietary file system developed by Microsoft.
New!!: Dm-crypt and NTFS · See more »
Operating system
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
New!!: Dm-crypt and Operating system · See more »
Paging
In computer operating systems, paging is a memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory.
New!!: Dm-crypt and Paging · See more »
Passphrase
A passphrase is a sequence of words or other text used to control access to a computer system, program or data.
New!!: Dm-crypt and Passphrase · See more »
PBKDF2
In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 2) are key derivation functions with a sliding computational cost, aimed to reduce the vulnerability of encrypted keys to brute force attacks.
New!!: Dm-crypt and PBKDF2 · See more »
RAID
RAID (Redundant Array of Independent Disks, originally Redundant Array of Inexpensive Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
New!!: Dm-crypt and RAID · See more »
Removable media
In computer storage, some types of removable media are designed to be read to or written to by removable readers, writers and drives.
New!!: Dm-crypt and Removable media · See more »
Salt (cryptography)
In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.
New!!: Dm-crypt and Salt (cryptography) · See more »
Smart card
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.
New!!: Dm-crypt and Smart card · See more »
Superuser
In computing, the superuser is a special user account used for system administration.
New!!: Dm-crypt and Superuser · See more »
Symmetric-key algorithm
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
New!!: Dm-crypt and Symmetric-key algorithm · See more »
TrueCrypt
TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE).
New!!: Dm-crypt and TrueCrypt · See more »
TU Wien
TU Wien (Technische Universität Wien; formerly: k.k. Polytechnisches Institut, Imperial and Royal Polytechnic Institute from 1815–1872; Technische Hochschule (TH Wien), College of Technology from 1872–1975; Vienna University of Technology from 1975–2014) is one of the major universities in Vienna, the capital of Austria.
New!!: Dm-crypt and TU Wien · See more »
User space
A modern computer operating system usually segregates virtual memory into kernel space and user space.
New!!: Dm-crypt and User space · See more »
Watermarking attack
In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryption key.
New!!: Dm-crypt and Watermarking attack · See more »
Write barrier
In operating systems, write barrier is a mechanism for enforcing a particular ordering in a sequence of writes to a storage system in a computer system.
New!!: Dm-crypt and Write barrier · See more »
Redirects here:
CryptSetup, CryptSetup LUKS, Cryptsetup, Cryptsetup LUKS, Cryptsetup luks, Cryptsetup-LUKS, Cryptsetup-Luks, Cryptsetup-luks, DM Crypt, DM crypt, DM-Crypt, DM-crypt, Device mapper crypt, Device mapper crypto, Device-mapper crypt, Device-mapper crypto, Dm Crypt, Dm crypt, Dm-Crypt.
References
[1] https://en.wikipedia.org/wiki/Dm-crypt