61 relations: Advanced Encryption Standard, Attribution (copyright), BitLocker, Block cipher mode of operation, Blowfish (cipher), C (programming language), CAST-128, CAST-256, Comparison of disk encryption software, Cryptoloop, Cybersquatting, Data Encryption Standard, Deniable encryption, Device driver, Disk encryption, Disk encryption software, Disk encryption theory, Disk partitioning, Dm-crypt, End-of-life (product), File Explorer, Fork (software development), Free and open-source software, GitHub, Hard disk drive, Hardware security module, IEEE P1619, Interactive kiosk, Linux Unified Key Setup, MARS (cryptography), MD2 (cryptography), MD4, MD5, Microsoft Windows, Multi-factor authentication, National Institute of Standards and Technology, Object Pascal, Open-source software, PKCS 11, Plausible deniability, Public domain, RAM drive, RAR (file format), RC6, RIPEMD, RSA Security, Security token, Serpent (cipher), SHA-1, SHA-2, ..., Smart card, The Open Source Definition, Tiger (cryptography), Triple DES, TrueCrypt, Twofish, USB flash drive, Whirlpool (cryptography), Windows Mobile, Windows Vista, Zip (file format). Expand index (11 more) » « Shrink index
The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
Attribution in copyright law, is acknowledgement as credit to the copyright holder or author of a work.
BitLocker is a full disk encryption feature included with Windows Vista and later.
In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.
Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.
C (as in the letter ''c'') is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.
In cryptography, CAST-128 (alternatively CAST5) is a symmetric-key block cipher used in a number of products, notably as the default cipher in some versions of GPG and PGP.
In cryptography, CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998.
This is a technical feature comparison of different disk encryption software.
Cryptoloop is a Linux kernel's disk encryption module that relies on the Crypto API, which is a cryptography framework introduced in version 2.5.45 of the Linux kernel mainline.
Cybersquatting (also known as domain squatting), according to the United States federal law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.
The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer.
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.
Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption.
Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk).
Disk partitioning or disk slicing is the creation of one or more regions on a hard disk or other secondary storage, so that an operating system can manage information in each region separately.
dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD.
"End-of-life" (EOL) is a term used with respect to a product supplied to customers, indicating that the product is in the end of its useful life (from the vendor's point of view), and a vendor stops marketing, selling, or rework sustaining it.
File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards.
In software engineering, a project fork happens when developers take a copy of source code from one software package and start independent development on it, creating a distinct and separate piece of software.
Free and open-source software (FOSS) is software that can be classified as both free software and open-source software.
GitHub Inc. is a web-based hosting service for version control using Git.
A hard disk drive (HDD), hard disk, hard drive or fixed disk is an electromechanical data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.
Institute of Electrical and Electronics Engineers (IEEE) standardization project for encryption of stored data, but more generically refers to the Security in Storage Working Group (SISWG), which includes a family of standards for protection of stored data and for the corresponding cryptographic key management.
An interactive kiosk is a computer terminal featuring specialized hardware and software that provides access to information and applications for communication, commerce, entertainment, or education.
In computing, the Linux Unified Key Setup or LUKS is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux.
MARS is a block cipher that was IBM's submission to the Advanced Encryption Standard process.
The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.
The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990.
The MD5 algorithm is a widely used hash function producing a 128-bit hash value.
Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.
Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).
The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.
Object Pascal refers to a branch of object-oriented derivatives of Pascal, mostly known as the primary programming language of Delphi.
Open-source software (OSS) is a type of computer software whose source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose.
In cryptography, PKCS #11 is one of the Public-Key Cryptography Standards, and also refers to the programming interface to create and manipulate cryptographic tokens.
Plausible deniability is the ability of people (typically senior officials in a formal or informal chain of command) to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.
The public domain consists of all the creative works to which no exclusive intellectual property rights apply.
A RAM drive (also called a RAM disk) is a block of random-access memory (primary storage or volatile memory) that a computer's software is treating as if the memory were a disk drive (secondary storage).
RAR is a proprietary archive file format that supports data compression, error recovery and file spanning.
In cryptography, RC6 (Rivest cipher 6) is a symmetric key block cipher derived from RC5.
RIPEMD (RACE Integrity Primitives Evaluation Message Digest) is a family of cryptographic hash functions developed in Leuven, Belgium, by Hans Dobbertin, Antoon Bosselaers and Bart Preneel at the COSIC research group at the Katholieke Universiteit Leuven, and first published in 1996.
RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and network security company.
Security tokens are physical devices used to gain access to an electronically restricted resource.
Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard (AES) contest, where it was ranked second to Rijndael.
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.
The Open Source Definition is a document published by the Open Source Initiative, to determine whether a software license can be labeled with the open-source certification mark.
In cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms.
In cryptography, Triple DES (3DES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.
TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE).
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.
A USB flash drive, also variously known as a thumb drive, pen drive, gig stick, flash stick, jump drive, disk key, disk on key (after the original M-Systems DiskOnKey drive from 2000), flash-drive, memory stick (not to be confused with the Sony Memory Stick), USB stick or USB memory, is a data storage device that includes flash memory with an integrated USB interface.
In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function.
Windows Mobile is a discontinued family of mobile operating systems developed by Microsoft for smartphones and Pocket PCs.
Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
ZIP is an archive file format that supports lossless data compression.