Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Dm-crypt

Index Dm-crypt

dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD. [1]

51 relations: Block cipher, Booting, Comparison of disk encryption software, Computer file, Cryptmount, Crypto API (Linux), Cryptoloop, Device file, Device mapper, Disk encryption, Disk encryption theory, Disk image, Disk partitioning, Dm-crypt, DragonFly BSD, Ext2, Ext2Fsd, Ext3, File Allocation Table, File system, FreeOTFE, Front and back ends, Hash function, Initial ramdisk, Initialization vector, Key (cryptography), Key management, Key stretching, Linux distribution, Linux kernel, Linux Unified Key Setup, Logical volume management, Logical Volume Manager (Linux), Loop device, Mount (computing), NTFS, Operating system, Paging, Passphrase, PBKDF2, RAID, Removable media, Salt (cryptography), Smart card, Superuser, Symmetric-key algorithm, TrueCrypt, TU Wien, User space, Watermarking attack, ..., Write barrier. Expand index (1 more) »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Dm-crypt and Block cipher · See more »

Booting

In computing, booting is starting up a computer or computer appliance until it can be used.

New!!: Dm-crypt and Booting · See more »

Comparison of disk encryption software

This is a technical feature comparison of different disk encryption software.

New!!: Dm-crypt and Comparison of disk encryption software · See more »

Computer file

A computer file is a computer resource for recording data discretely in a computer storage device.

New!!: Dm-crypt and Computer file · See more »

Cryptmount

cryptmount is a software tool for managing encrypted file systems under the Linux family of operating systems.

New!!: Dm-crypt and Cryptmount · See more »

Crypto API (Linux)

Crypto API is a cryptography framework in the Linux kernel, for various parts of the kernel that deal with cryptography, such as IPsec and dm-crypt.

New!!: Dm-crypt and Crypto API (Linux) · See more »

Cryptoloop

Cryptoloop is a Linux kernel's disk encryption module that relies on the Crypto API, which is a cryptography framework introduced in version 2.5.45 of the Linux kernel mainline.

New!!: Dm-crypt and Cryptoloop · See more »

Device file

In Unix-like operating systems, a device file or special file is an interface to a device driver that appears in a file system as if it were an ordinary file.

New!!: Dm-crypt and Device file · See more »

Device mapper

The device mapper is a framework provided by the Linux kernel for mapping physical block devices onto higher-level virtual block devices.

New!!: Dm-crypt and Device mapper · See more »

Disk encryption

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

New!!: Dm-crypt and Disk encryption · See more »

Disk encryption theory

Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk).

New!!: Dm-crypt and Disk encryption theory · See more »

Disk image

A disk image, in computing, is a computer file containing the contents and structure of a disk volume or of an entire data storage device, such as a hard disk drive, tape drive, floppy disk, optical disc or USB flash drive.

New!!: Dm-crypt and Disk image · See more »

Disk partitioning

Disk partitioning or disk slicing is the creation of one or more regions on a hard disk or other secondary storage, so that an operating system can manage information in each region separately.

New!!: Dm-crypt and Disk partitioning · See more »

Dm-crypt

dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD.

New!!: Dm-crypt and Dm-crypt · See more »

DragonFly BSD

DragonFly BSD is a free and open source Unix-like operating system created as a fork of FreeBSD 4.8.

New!!: Dm-crypt and DragonFly BSD · See more »

Ext2

The ext2 or second extended file system is a file system for the Linux kernel.

New!!: Dm-crypt and Ext2 · See more »

Ext2Fsd

Ext2Fsd (short for Ext2 File System Driver) is a free Installable File System driver written in C for the Microsoft Windows operating system family.

New!!: Dm-crypt and Ext2Fsd · See more »

Ext3

ext3, or third extended filesystem, is a journaled file system that is commonly used by the Linux kernel.

New!!: Dm-crypt and Ext3 · See more »

File Allocation Table

File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it.

New!!: Dm-crypt and File Allocation Table · See more »

File system

In computing, a file system or filesystem controls how data is stored and retrieved.

New!!: Dm-crypt and File system · See more »

FreeOTFE

FreeOTFE is a discontinued open source computer program for on-the-fly disk encryption (OTFE).

New!!: Dm-crypt and FreeOTFE · See more »

Front and back ends

In software engineering, the terms front end and back end refer to the separation of concerns between the presentation layer (front end), and the data access layer (back end) of a piece of software, or the physical infrastructure or hardware.

New!!: Dm-crypt and Front and back ends · See more »

Hash function

A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.

New!!: Dm-crypt and Hash function · See more »

Initial ramdisk

In computing (specifically in regards to Linux computing), initrd (initial ramdisk) is a scheme for loading a temporary root file system into memory, which may be used as part of the Linux startup process.

New!!: Dm-crypt and Initial ramdisk · See more »

Initialization vector

In cryptography, an initialization vector (IV) or starting variable (SV) is a fixed-size input to a cryptographic primitive that is typically required to be random or pseudorandom.

New!!: Dm-crypt and Initialization vector · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Dm-crypt and Key (cryptography) · See more »

Key management

Key management refers to management of cryptographic keys in a cryptosystem.

New!!: Dm-crypt and Key management · See more »

Key stretching

In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the time it takes to test each possible key.

New!!: Dm-crypt and Key stretching · See more »

Linux distribution

A Linux distribution (often abbreviated as distro) is an operating system made from a software collection, which is based upon the Linux kernel and, often, a package management system.

New!!: Dm-crypt and Linux distribution · See more »

Linux kernel

The Linux kernel is an open-source monolithic Unix-like computer operating system kernel.

New!!: Dm-crypt and Linux kernel · See more »

Linux Unified Key Setup

In computing, the Linux Unified Key Setup or LUKS is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux.

New!!: Dm-crypt and Linux Unified Key Setup · See more »

Logical volume management

In computer storage, logical volume management or LVM provides a method of allocating space on mass-storage devices that is more flexible than conventional partitioning schemes to store volumes.

New!!: Dm-crypt and Logical volume management · See more »

Logical Volume Manager (Linux)

In Linux, Logical Volume Manager (LVM) is a device mapper target that provides logical volume management for the Linux kernel.

New!!: Dm-crypt and Logical Volume Manager (Linux) · See more »

Loop device

In Unix-like operating systems, a loop device, vnd (vnode disk), or lofi (loop file interface) is a pseudo-device that makes a file accessible as a block device.

New!!: Dm-crypt and Loop device · See more »

Mount (computing)

Mounting is a process by which the operating system makes files and directories on a storage device (such as hard drive, CD-ROM, or network share) available for user to access via the computer's file system.

New!!: Dm-crypt and Mount (computing) · See more »

NTFS

NTFS (New Technology File System) is a proprietary file system developed by Microsoft.

New!!: Dm-crypt and NTFS · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Dm-crypt and Operating system · See more »

Paging

In computer operating systems, paging is a memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory.

New!!: Dm-crypt and Paging · See more »

Passphrase

A passphrase is a sequence of words or other text used to control access to a computer system, program or data.

New!!: Dm-crypt and Passphrase · See more »

PBKDF2

In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 2) are key derivation functions with a sliding computational cost, aimed to reduce the vulnerability of encrypted keys to brute force attacks.

New!!: Dm-crypt and PBKDF2 · See more »

RAID

RAID (Redundant Array of Independent Disks, originally Redundant Array of Inexpensive Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

New!!: Dm-crypt and RAID · See more »

Removable media

In computer storage, some types of removable media are designed to be read to or written to by removable readers, writers and drives.

New!!: Dm-crypt and Removable media · See more »

Salt (cryptography)

In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.

New!!: Dm-crypt and Salt (cryptography) · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Dm-crypt and Smart card · See more »

Superuser

In computing, the superuser is a special user account used for system administration.

New!!: Dm-crypt and Superuser · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: Dm-crypt and Symmetric-key algorithm · See more »

TrueCrypt

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE).

New!!: Dm-crypt and TrueCrypt · See more »

TU Wien

TU Wien (Technische Universität Wien; formerly: k.k. Polytechnisches Institut, Imperial and Royal Polytechnic Institute from 1815–1872; Technische Hochschule (TH Wien), College of Technology from 1872–1975; Vienna University of Technology from 1975–2014) is one of the major universities in Vienna, the capital of Austria.

New!!: Dm-crypt and TU Wien · See more »

User space

A modern computer operating system usually segregates virtual memory into kernel space and user space.

New!!: Dm-crypt and User space · See more »

Watermarking attack

In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryption key.

New!!: Dm-crypt and Watermarking attack · See more »

Write barrier

In operating systems, write barrier is a mechanism for enforcing a particular ordering in a sequence of writes to a storage system in a computer system.

New!!: Dm-crypt and Write barrier · See more »

Redirects here:

CryptSetup, CryptSetup LUKS, Cryptsetup, Cryptsetup LUKS, Cryptsetup luks, Cryptsetup-LUKS, Cryptsetup-Luks, Cryptsetup-luks, DM Crypt, DM crypt, DM-Crypt, DM-crypt, Device mapper crypt, Device mapper crypto, Device-mapper crypt, Device-mapper crypto, Dm Crypt, Dm crypt, Dm-Crypt.

References

[1] https://en.wikipedia.org/wiki/Dm-crypt

OutgoingIncoming
Hey! We are on Facebook now! »