:Comparison of disk encryption software
{{short description|None}}
This is a technical feature comparison of different disk encryption software.
Background information
class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
Name
! Developer ! First released ! Licensing ! Maintained? |
---|
{{Rh}}| Aloaha Crypt Disk
| Aloaha | 2008 | {{free|Source Auditable for Commercial Customers}} | {{yes}} |
{{Rh}}| ArchiCrypt Live
| Softwaredevelopment Remus ArchiCrypt | 1998 | {{Proprietary}} | {{yes}} |
{{Rh}}| BestCrypt
| Jetico | {{Proprietary}} | {{yes}} |
{{Rh}}| BitArmor DataControl
| BitArmor Systems Inc. | 2008-05 | {{Proprietary}} | {{yes}} |
{{Rh}}| BitLocker
| 2006 | {{Proprietary}} | {{yes}} |
{{Rh}}| Bloombase StoreSafe
| [https://www.bloombase.com/ Bloombase] | 2012 | {{Proprietary}} |
{{Rh}}| Boxcryptor
| Secomba GmbH | 2011 | {{Proprietary}} | {{no}} |
{{Rh}}| CGD
| Roland C. Dowdeswell | {{free|BSD}} | {{yes}} |
{{Rh}}| CenterTools DriveLock
| CenterTools | 2008 | {{Proprietary}} | {{yes}} |
{{Rh}}| Check Point Full Disk Encryption
| Check Point Software Technologies Ltd | 1999{{cite web |title=Protect guards laptop and desktop data |url=http://www.infoworld.com/cgi-bin/displayArchive.pl?/99/25/c05-25.48.htm |access-date=2008-09-03 |url-status=dead |archive-url=https://web.archive.org/web/20050302202315/http://www.infoworld.com/cgi-bin/displayArchive.pl?%2F99%2F25%2Fc05-25.48.htm |archive-date=March 2, 2005 }}Company and product name change to Pointsec {{cite web |title=Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc.|url=http://www.pointsec.com/news/news.asp?newsid=85 |access-date=2008-09-03 |archive-url=https://web.archive.org/web/20040820174918/http://www.pointsec.com/news/news.asp?newsid=85 |archive-date=2004-08-20}}{{cite web |title=Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent |url=http://www.checkpoint.com/press/2007/protectdataacquisition011107.html |access-date=2008-09-03 |url-status=dead |archive-url=https://web.archive.org/web/20080820034450/http://www.checkpoint.com/press/2007/protectdataacquisition011107.html |archive-date=2008-08-20 }} | {{Proprietary}} | {{yes}} |
{{Rh}}| CipherShed
| CipherShed Project | {{nonfree|TrueCrypt License Version 3.0}}{{cite web | title =TrueCrypt License Version 3.0 | publisher =TrueCrypt Foundation | date =2012-02-07 | url =https://github.com/CipherShed/CipherShed/blob/master/src/License.txt | access-date = 2014-12-24 }} | {{no}} |
{{Rh}}| CrossCrypt
| Steven Scherrer | {{free|GPL}} | {{no}} |
{{Rh}}| CryFS
|Sebastian Messmer |2015 | {{free|LGPLv3}} | {{yes}} |
{{Rh}}| Cryhod
|Prim'X Technologies |2010 | {{Proprietary}} | {{yes}} |
{{Rh}}| Cryptainer
| Cypherix Software | 1998 | {{Proprietary}} | {{yes}} |
{{Rh}}| Cryptic Disk
| Exlade | 2003 | {{Proprietary}} | {{yes}} |
{{Rh}}| CryptArchiver
| WinEncrypt | {{dunno}} | {{Proprietary}} | {{yes}} |
{{Rh}}| Cryptoloop
| {{dunno}} | {{free|GPL}} | {{no}} |
{{Rh}}| Cryptomator
| Skymatic UG (haftungsbeschränkt) | 2016-03-09{{cite web |url=http://www.cryptomator.org/ |title=Home |website=cryptomator.org}} | {{free|GPLv3}} | {{yes}} |
{{Rh}}| CryptoPro Secure Disk Enterprise
| cpsd it-services GmbH | 2010 | {{Proprietary}} | {{yes}} |
{{Rh}}| CryptoPro Secure Disk for BitLocker
| cpsd it-services GmbH | 2012 | {{Proprietary}} | {{yes}} |
{{Rh}}| CryptSync
| Stefan Küng | 2012 | {{free|GPL v2}} | {{yes}} |
{{Rh}}| Discryptor
| Cosect Ltd. | 2008 | {{Proprietary}} | {{no}} |
{{Rh}}| DiskCryptor
| ntldr, David Xanatos | 2007 | {{free|GPL}} | {{no}}{{Cite web|url=https://github.com/DavidXanatos/DiskCryptor/releases|title = Releases · DavidXanatos/DiskCryptor|website = GitHub}} |
{{Rh}}| DISK Protect
| Becrypt Ltd | 2001 | {{Proprietary}} | {{yes}} |
{{Rh}}| Cryptsetup / Dmsetup
| Christophe Saout | 2004-03-11dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/ | {{free|GPL}} | {{yes}} |
{{Rh}}| Dm-crypt / LUKS
| Clemens Fruhwirth (LUKS) | {{free|GPL}} | {{yes}} |
{{Rh}}| DriveSentry GoAnywhere 2
| DriveSentry | 2008 | {{Proprietary}} | {{No}} |
{{Rh}}| E4M
| {{free|Open source}} | {{no}} |
{{Rh}}| e-Capsule Private Safe
| EISST Ltd. | 2005 | {{Proprietary}} | {{yes}} |
{{Rh}}| eCryptfs
| Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) | 2005{{cite web |title=eCryptfs |url=http://ecryptfs.sourceforge.net |access-date=2008-04-29 }} | {{free|GPL}} | {{yes}} |
{{Rh}}| EgoSecure HDD Encryption
| EgoSecure GmbH | 2006 | {{Proprietary}} | {{yes}} |
{{Rh}}| EncFS
| Valient Gough | {{free|LGPLv3}} | {{no}} |
{{Rh}}| EncryptStick
| ENC Security Systems | 2009 | {{Proprietary}} | {{yes}} |
{{Rh}}| FileVault
| 2003-10-24 | {{Proprietary}} | {{yes}} |
{{Rh}}| FileVault 2
| 2011-07-20 | {{Proprietary}} | {{yes}} |
{{Rh}}| FREE CompuSec
| CE-Infosys | 2002 | {{Proprietary}} | {{yes}} |
{{Rh}}| FreeOTFE
| Sarah Dean | {{free|Open source}} | {{no}} |
{{Rh}}| GBDE
| {{free|BSD}} | {{no}} |
{{Rh}}| GELI
| Pawel Jakub Dawidek | {{free|BSD}} | {{yes}} |
{{Rh}}| GnuPG
| 1999-09-07[https://gnupg.org/download/release_notes.html Release Notes. GnuPG] | {{free|GPL}} | {{yes}} |
{{Rh}}| gocryptfs
| Jakob Unterwurzacher | 2015-10-07{{cite web |title=gocryptfs changelog on github |website=GitHub |url=https://github.com/rfjakob/gocryptfs#changelog |access-date=2018-01-16 }} | {{free|MIT / X Consortium License}} | {{yes}} |
{{Rh}}| Knox
| AgileBits | 2010 | {{Proprietary}} | {{yes}} |
{{Rh}}| KryptOS
| The MorphOS Development Team | 2010 | {{Proprietary}} | {{yes}} |
{{Rh}}| LibreCrypt
| tdk | 2014-06-19{{cite web |title=as received from FreeOTFE version v5.21 with small changes |website=GitHub |url=https://github.com/t-d-k/LibreCrypt/commit/a395620545beff7736427dfc3b508b4f67609396 |date=2014-06-20 |access-date=2015-09-14 }} | {{free|Open source}} | {{no}} |
{{Rh}}| Loop-AES
| Jari Ruusu | 2001-04-11 | {{free|GPL}} | {{yes}} |
{{Rh}}| McAfee Drive Encryption (SafeBoot)
| {{Proprietary}} | {{yes}} |
{{Rh}}| n-Crypt Pro
| n-Trance Security Ltd | 2005 | {{Proprietary}} | {{yes}} |
{{Rh}}| PGPDisk
| PGP Corporation (acquired by Symantec in 2010) | {{Proprietary}} | {{yes}} |
{{Rh}}| Private Disk
| Dekart | {{Proprietary}} | {{yes}} |
{{Rh}}| ProxyCrypt
| v77 | 2013 | {{free|Open source}} | {{yes}} |
{{Rh}}| R-Crypto
| R-Tools Technology Inc | 2008 | {{Proprietary}} | {{yes}} |
{{Rh}}| SafeGuard Easy
| Sophos (Utimaco) | {{Proprietary}} | {{yes}} |
{{Rh}}| SafeGuard Enterprise
| Sophos (Utimaco) | {{Proprietary}} | {{yes}} |
{{Rh}}| SafeGuard PrivateDisk
| Sophos (Utimaco)Rebranded as ThinkVantage Client Security {{Cite FTP |url=ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|server=Lenovo|url-status=dead|title=ThinkVantage Technologies Deployment Guide|access-date=2008-03-05}} | 2000 | {{Proprietary}} | {{yes}} |
{{Rh}}| SafeHouse Professional
| PC Dynamics, Inc. | 1992 | {{Proprietary}} | {{yes}} |
{{Rh}}| Scramdisk
| Shaun Hollingworth | 1997-07-01 | {{free|Open source}} | {{no}} |
{{Rh}}| Scramdisk 4 Linux
| Hans-Ulrich Juettner | {{free|GPL}} | {{no}} |
{{Rh}}| SecuBox
| Aiko Solutions | 2007-02-19 | {{Proprietary}} | {{yes}} |
{{Rh}}| SECUDE Secure Notebook
| SECUDE | 2003 | {{Proprietary}} | {{yes}} |
{{Rh}}| Seqrite Encryption Manager
| Quick Heal Technologies Ltd. | 2017 | {{Proprietary}} | {{yes}} |
{{Rh}}| Sentry 2020
| SoftWinter | 1998{{cite web |title=Sentry 2020 news |url=http://www.softwinter.com/ |access-date=2007-01-02 }} | {{Proprietary}} | {{no}} |
{{Rh}}| Softraid / RAID C
| OpenBSD | 2007-11-01{{cite web|url=http://www.openbsd.org/plus42.html|title=OpenBSD 4.2 Changelog}} | {{free|BSD}} | {{yes}} |
{{Rh}}| SpyProof!
| Information Security Corp. | 2002 | {{Proprietary}} | {{yes}} |
{{Rh}}| Svnd / Vnconfig
| OpenBSD | 2000-12-01{{cite web|url=http://www.openbsd.org/plus28.html|title=OpenBSD 2.8 Changelog}} | {{free|BSD}} | {{yes}} |
{{Rh}}| Symantec Endpoint Encryption
| 2008 | {{Proprietary}} | {{yes}} |
{{Rh}}| Tcplay
| Alex Hornung | 2012-01-28{{cite web|url=https://github.com/bwalex/tc-play/releases|title=bwalex/tc-play|website=GitHub|date=2019-08-27}} | {{free|BSD}} |
{{Rh}}| Trend Micro Endpoint Encryption (Mobile Armor)
| {{Proprietary}} | {{yes}} |
{{Rh}}| TrueCrypt
| TrueCrypt Foundation | 2004-02-02{{cite web|url=http://www.truecrypt.org/docs/?s=version-history2|title=TrueCrypt}} | {{nonfree|TrueCrypt License 3.1}}{{cite web | title =TrueCrypt License Version 3.1 | publisher =TrueCrypt Foundation | date =2014-05-28 | url =https://github.com/warewolf/truecrypt/compare/master...7.2#diff-dc5cde275269b574b34b1204b9221cb2L1 | access-date = 2014-05-29 }} | {{no}} |
{{Rh}}| USBCrypt
| WinAbility Software Corp. | 2010 | {{Proprietary}} | {{yes}} |
{{Rh}}| VeraCrypt
| IDRIX | 2013-06-22{{cite web|url=https://veracrypt.codeplex.com/SourceControl/list/changesets?page=8|title=VeraCrypt}} TrueCrypt License Version 3.0 (legacy code only) | {{yes}} |
{{Rh}}| CyberSafe Top Secret
| CyberSoft | 2013 | {{Proprietary}} | {{yes}} |
class="sortbottom"
!{{Rh}}| Name !{{Rh}}| Developer !{{Rh}}| First released !{{Rh}}| Licensing !{{Rh}}| Maintained? |
ZzEnc
![https://imdtech.ru/ru/technologies/fde/ IMDTech] !2013 !Commercial ! |
Operating systems
class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
Name
! Android ! iOS ! Mac OS X ! Linux ! FreeBSD ! OpenBSD ! NetBSD |
---|
{{Rh}}| Aloaha Crypt Disk
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| BestCrypt Volume Encryption
| {{dunno}} | {{yes}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| BitArmor DataControl
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| BitLocker
| {{no}} | {{yes}} | {{dunno}} | {{Partial}}https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX | {{no}} | {{no}} | {{no}} |
{{Rh}}| Bloombase StoreSafe
| {{dunno}} | {{yes}} | {{dunno}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} |
{{Rh}}| Boxcryptor
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| CenterTools DriveLock
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| CGD
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{yes}} |
{{Rh}}| Check Point Full Disk Encryption
| {{dunno}} | {{yes}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| CipherShed
| {{yes}} | {{dunno}} | {{yes}} | {{yes}} | {{no}} | {{no}} |
{{Rh}}| CrossCrypt
| {{no}} | {{yes}}CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| CryFS
| {{no}} | {{yes}} | {{dunno}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{yes}} |
{{Rh}}| Cryhod
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Cryptainer
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| CryptArchiver
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Cryptic Disk
| {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Cryptoloop
| {{dunno}} | {{yes}}http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes | {{dunno}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Cryptomator
| {{yes}} | {{yes}}{{Cite web | url=http://www.cryptomator.org |title = Cryptomator - Free Cloud Encryption}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| CryptoPro Secure Disk Enterprise
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| CryptoPro Secure Disk for BitLocker
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Cryptsetup / Dmsetup
| {{dunno}} | {{dunno}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| CryptSync
| {{no}} | {{yes}} | {{dunno}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Discryptor
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| DiskCryptor
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| DISK Protect
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Dm-crypt / LUKS
| {{dunno}} | {{dunno}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| DriveSentry GoAnywhere 2
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| E4M
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| e-Capsule Private Safe
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| eCryptfs
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| EgoSecure HDD Encryption
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| EncFS
| {{dunno}} | {{yes}} (FUSE) | {{yes}} (FUSE) | {{yes}} (FUSE) | {{yes}} (FUSE) |
{{Rh}}| EncryptStick
| {{dunno}} | {{Yes}} | {{dunno}} | {{Yes}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| EncryptUSB
| {{dunno}} | {{Yes}} | {{dunno}} | {{Yes}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| FileVault
| {{dunno}} | {{no}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| FileVault 2
| {{dunno}} | {{no}} | {{dunno}} | {{yes}} | {{partial}}https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes | {{no}} | {{no}} | {{no}} |
{{Rh}}| FREE CompuSec
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| FreeOTFE
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{partial}}http://www.freeotfe.org/docs/Main/Linux_volumes.htm Supports Linux volumes | {{no}} | {{no}} | {{no}} |
{{Rh}}| GBDE
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} |
{{Rh}}| GELI
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} |
{{Rh}}| Knox
| {{dunno}} | {{no}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| LibreCrypt
| {{yes}} | {{dunno}} | {{no}} | {{partial}}https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes | {{no}} | {{no}} | {{no}} |
{{Rh}}| Loop-AES
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| McAfee Drive Encryption (SafeBoot)
| {{dunno}} | {{yes}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| n-Crypt Pro
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| PGPDisk
| {{dunno}} | {{yes}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| PGP Whole Disk Encryption
| {{dunno}} | {{yes}} | {{dunno}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Private Disk
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| ProxyCrypt
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| R-Crypto
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| SafeGuard Easy
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| SafeGuard Enterprise
| {{dunno}} | {{yes}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| SafeGuard PrivateDisk
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| SafeHouse Professional
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Scramdisk
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Scramdisk 4 Linux
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| SecuBox
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| SecureDoc
| {{dunno}} | {{yes}} | {{dunno}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Sentry 2020
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Seqrite Volume Encryption
| {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Softraid / RAID C
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{no}} |
{{Rh}}| SpyProof!
| {{dunno}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Svnd / Vnconfig
| {{dunno}} | {{no}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{no}} |
{{Rh}}| Symantec Endpoint Encryption
| {{dunno}} | {{yes}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Tcplay
| {{no}} | {{no}} | {{dunno}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| Trend Micro Endpoint Encryption
| {{no}} | {{yes}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| TrueCrypt
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} |
{{Rh}}| USBCrypt
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
{{Rh}}| VeraCrypt
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} |
{{Rh}}| CyberSafe Top Secret
| {{yes}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
class="sortbottom"
! Name ! Android ! iOS ! Mac OS X ! Linux ! FreeBSD ! OpenBSD ! NetBSD |
Features
- Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm Hidden containers description from Jetico (BestCrypt) can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others.
- Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
- Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.
- Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.{{clarify|e.g. perhaps link to WP's article re: 1-time password (OTP) tokens? See Talk Page: someone else also was confused about exactly what this includes; pls give some examples & links.|date=January 2011}}
- Multiple keys: Whether an encrypted volume can have more than one active key.
- Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2 or Argon2.
- Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.
- Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.
- Filesystems: What filesystems are supported.
- Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11)
class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
Name
! Hidden containers ! Pre-boot authentication ! Single sign-on ! Custom authentication ! Multiple keys ! Passphrase strengthening ! Hardware acceleration ! TPM ! Filesystems ! Two-factor authentication |
---|
Aloaha Secure Stick
| {{yes}} | {{no}} | {{n/a}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{yes|NTFS, FAT32}} | {{yes}} |
ArchiCrypt Live
| {{no}} | {{n/a}} | {{no}} | {{yes}}Supports "Guest" keys | {{no}} | {{no}} | {{no}} | {{dunno}} | {{yes}}Using "Archicrypt Card" |
BestCrypt
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}}Supported by the BestCrypt container format; see BestCrypt SDK | {{yes}} | {{yes}} | {{yes}} | {{yes|Any supported by OS}} | {{yes}}Supported by the BestCrypt Volume Encryption software |
BitArmor DataControl
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{yes|NTFS, FAT32 on non-system volumes}} | {{no}} |
BitLocker
| {{no}} | {{yes}}With PIN or USB key | {{no}} | {{yes}}Recovery keys only. | {{yes}} | {{yes}}{{Cite web|url=http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true|title=BitLocker Drive Encryption Technical Overview|publisher=Microsoft|access-date=2008-03-13|url-status=dead|archive-url=https://web.archive.org/web/20080224023214/http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true|archive-date=2008-02-24}} | {{yes|Chiefly NTFS}} {{r|group=Note|BitLockerFS}} | {{yes}} {{r|group=Note|BitLocker2F}} |
Bloombase StoreSafe
| {{no}} | {{no}} | {{n/a}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
CGD
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{no}} | {{yes|Any supported by OS}} |
CenterTools DriveLock
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
Check Point Full Disk Encryption
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes|NTFS, FAT32}} | {{yes}} |
CipherShed
| {{yes}} | {{dunno}} | {{no}} | {{yes|yes with multiple keyfiles}}Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: [http://www.truecrypt.org/faq Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?]){{cite web | title =Keyfiles | work =TrueCrypt Documentation | publisher =TrueCrypt Foundation | url =http://www.truecrypt.org/docs/keyfiles | access-date =2014-05-28 }} | {{yes}} | {{yes}} | {{yes|Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged{{cite web|title=Future |publisher=TrueCrypt Foundation |url=http://www.truecrypt.org/future.php |access-date=2014-05-24 }}{{dead link|date=November 2016 |bot=InternetArchiveBot |fix-attempted=yes }} }} | {{yes}} |
CryFS
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{no}} | {{yes}}{{cite web|title=CryFS: How it works|url=https://www.cryfs.org/howitworks|access-date=2016-09-23}} | {{no}} | {{no}} | {{yes|Any supported by OS}} | {{no}} |
CrossCrypt
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} | {{no}} |
CryptArchiver
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{no}} | {{dunno}} | {{no}} | {{no}} | {{dunno}} | {{dunno}} |
Cryptic Disk
| {{yes}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
Cryhod
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
Cryptoloop
| {{no}} | {{yes}}dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{yes}}{{Citation needed|date=January 2008}} | {{no}} | {{yes|Any supported by OS}} | {{dunno}} |
Cryptomator
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{no}} |
CryptoPro Secure Disk Enterprise
| {{yes|Yes with add-on Secure Device}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes|Any supported by OS}} | {{yes}} |
CryptoPro Secure Disk for BitLocker
| {{yes|Yes with add-on Secure Device}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes|Any supported by OS}} | {{yes}} |
Cryptsetup / Dmsetup
| {{no}} | {{dunno}} | {{yes}} | {{no}} | {{no}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
DiskCryptor
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{yes|Windows volumes on MBR and UEFI GPT drives, ReFs any FS supported by OS{{Cite web|url=https://github.com/DavidXanatos/DiskCryptor|title = DiskCryptor|website = GitHub|date = 10 February 2022}}}} |
DISK Protect
| {{no}} | {{yes}} | {{no}} | {{no}} | {{yes}} | {{yes}} | {{yes |NTFS, FAT32}} | {{yes}} |
Dm-crypt / LUKS
| {{no}} | {{dunno}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{partial|Partial}}{{cite web |title=cryptsetup Frequently Asked Questions |url=https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions |access-date=2016-01-07 }} {{r|group=Note|dm-cryptTPM}} | {{yes|Any supported by OS}} | {{yes}} |
DriveSentry GoAnywhere 2
| {{no}} | {{no}} | {{n/a}} | {{yes}} | {{no}} | {{yes}} | {{no}} | {{dunno}} | {{yes|Any supported by OS}} | {{yes}} |
E4M
| {{No}} | {{No}} | {{n/a}} | {{No}} | {{No}} | {{dunno}} | {{No}} | {{no}} | {{dunno}} | {{no}} |
e-Capsule Private Safe
| {{no}} | {{n/a}} | {{no}} | {{no}} | {{yes}} | {{no}} | {{dunno}} | {{dunno}} |
eCryptfs
| {{no}} | {{no}} | {{n/a}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}}uses the lower filesystem (stacking) | {{yes}} |
EgoSecure HDD Encryption
| {{no}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes|NTFS, FAT32}} | {{yes}} |
EncryptUSB
| {{no}} | {{no}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{yes|NTFS, FAT32, exFAT}} | {{no}} |
FileVault
| {{no}} | {{no}} | {{n/a}} | {{no}} | ? | {{no}} | {{yes|HFS+, possibly others}} | {{no}} |
FileVault 2
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes|HFS+, possibly others}} | {{no}} |
FREE CompuSec
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} | {{yes|Any supported by OS}} | {{no}} |
FreeOTFE
| {{yes}} | {{no}} | {{n/a}} | {{yes}}FreeOTFE has a modular architecture and set of components to allow 3rd party integration | {{yes}}FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
GBDE
| {{no}} | {{n/a}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
GELI
| {{no}} | {{dunno}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
Loop-AES
| {{no}} | {{dunno}} | {{no}} | {{yes|Any supported by OS}} | {{yes}}Using customization |
McAfee Drive Encryption (SafeBoot)
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}}{{cite web|url=http://www.mcafee.com/us/resources/data-sheets/ds-endpoint-encryption.pdf|title=McAfee Endpoint Encryption|publisher=McAfee|access-date=2012-07-26|url-status=dead|archive-url=https://web.archive.org/web/20101217175911/http://mcafee.com/us/resources/data-sheets/ds-endpoint-encryption.pdf|archive-date=2010-12-17}} | {{yes}} | {{yes|Any supported by OS}} | {{yes}} |
n-Crypt Pro
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{no}} | {{n/a}}n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only | {{no}} | {{no}} | {{dunno}} | {{dunno}} |
PGPDisk
| {{no}} | {{yes}} | {{dunno}} | {{yes}} | {{yes}}PGP private keys are always protected by strengthened passphrases | {{dunno}} | {{yes}} | {{dunno}} | {{yes}} |
Private Disk
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
ProxyCrypt
| {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
R-Crypto
| {{dunno}} | {{no}} | {{n/a}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{yes|Any supported by OS}} | {{dunno}} |
SafeGuard Easy
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
SafeGuard Enterprise
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
SafeGuard PrivateDisk
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes}}{{cite web|url=http://download.lenovo.com/ibmdl/pub/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|title=ThinkVantage Technologies Deployment Guide|publisher=Lenovo|access-date=2008-03-05}} | {{yes|Any supported by OS}} | {{yes}} |
SafeHouse Professional
| {{no}} | {{no}} | {{n/a}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{yes|Any supported by OS}} | {{yes}} |
Scramdisk
| {{yes}} | {{no}} | {{n/a}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} | {{yes|Last update to web site 2009-07-02}} |
Scramdisk 4 Linux
| {{yes}}For TrueCrypt containers | {{no}} | {{n/a}} | {{no}} | {{no}} | {{no}} | {{no}} | {{yes|ext2, ext3, reiserfs, minix, ntfs, vfat/msdos}} | {{no}} |
SecuBox
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} | {{no}} |
SecureDoc
| {{no}} | {{dunno}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} | {{yes}} |
Seqrite Encryption Manager
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} | {{no}} |
Sentry 2020
| {{no}} | {{no}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} | {{no}} |
Softraid / RAID C
| {{no}} | {{no}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{yes}} | {{dunno}} | {{yes|Any supported by OS}} | {{dunno}} |
Svnd / Vnconfig
| {{no}} | {{no}} | {{n/a}} | {{no}} | {{no}} | {{yes}}optional by using -K [https://man.openbsd.org/mount_vnd.8#K OpenBSD Manual Pages: vnconfig(8)] | {{yes}} | {{dunno}} | {{yes|Any supported by OS}} | {{dunno}} |
Symantec Endpoint Encryption
| {{no}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{yes|NTFS, FAT32}} | {{yes}} |
Trend Micro Endpoint Encryption
| {{no}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{yes|Any supported by OS}} |
TrueCrypt {{r|group=Note|TrueCryptMystery}}
| {{yes}} | {{dunno}} | {{no}} | {{yes|yes with multiple keyfiles}}Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: [http://www.truecrypt.org/faq Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?]) | {{yes}} | {{yes}} | {{yes|Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged{{cite web|title=Future |publisher=TrueCrypt Foundation |url=http://www.truecrypt.org/future.php |access-date=2014-05-24 }}{{dead link|date=November 2016 |bot=InternetArchiveBot |fix-attempted=yes }} }} | {{yes}} |
VeraCrypt
| {{yes}} | {{partial|only on Windows}}{{cite web |title=Operating Systems Supported for System Encryption |work=VeraCrypt Documentation |publisher =IDRIX |url=https://www.veracrypt.fr/en/Supported%20Systems%20for%20System%20Encryption.html |access-date=2017-10-11}} | {{no}} | {{no}} | {{yes|yes with multiple keyfiles}} | {{yes}} | {{yes}} | {{no}} | {{yes|Windows on both MBR and UEFI GPT drives; dynamic drives discouraged}} | {{yes}} |
CyberSafe Top Secret
| {{yes}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{yes|Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged}} | {{yes}} |
class="sortbottom"
! Name ! Hidden containers ! Pre-boot authentication ! Single sign-on ! Custom authentication ! Multiple keys ! Passphrase strengthening ! Hardware acceleration ! TPM ! Filesystems ! Two-factor authentication |
ZzEnc
!No !Yes !Yes !Yes !Yes !Yes !No !No !Windows, Legacy BIOS & UEFI !In UEFI with removable keys store on USB-flash |
{{Reflist|group=Note|refs=
BitLocker can be used with a TPM PIN + external USB key for two-factor authentication
Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes
An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the standard input
]}}
Layering
- Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table.
- Partition: Whether individual disk partitions can be encrypted.
- File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
- Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.
- Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
Name
! Whole disk ! Partition ! File ! Swap space ! Hibernation file ! RAID |
---|
Aloaha Secure Stick
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
ArchiCrypt Live
| {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
BestCrypt
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
BitArmor DataControl
| {{no}} | {{yes}} | {{no}} | {{yes}} | {{yes}} | {{dunno}} |
BitLocker
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
Bloombase StoreSafe
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{yes}} |
CenterTools DriveLock
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
CGD
| {{yes}} | {{yes}} | {{yes}} | {{no}} | {{dunno}} |
Check Point Full Disk Encryption
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
CipherShed
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{partial|only on Windows}} | {{dunno}} |
CrossCrypt
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
CryFS
| {{no}} | {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
CryptArchiver
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
Cryptic Disk
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
Cryhod
| {{no}} | {{yes}} | {{no}} | {{yes}} | {{yes}} | {{dunno}} |
Cryptoloop
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{dunno}} |
Cryptomill
| {{yes}} | {{n/a}} | {{yes}} | {{n/a}} | {{n/a}} | {{dunno}} |
CryptoPro Secure Disk Enterprise
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
CryptoPro Secure Disk for BitLocker
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
DiskCryptor
| {{no}} | {{yes}} | {{no}} | {{yes}} | {{yes}} | {{dunno}} |
Disk Protect
| {{yes}} | {{no}} | {{no}} | {{yes}} | {{yes}} | {{dunno}} |
Dm-crypt / LUKS
| {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
DriveSentry GoAnywhere 2
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
E4M
| {{No}} | {{Yes}} | {{Yes}} | {{No}} | {{no}} | {{dunno}} |
e-Capsule Private Safe
| {{no}} | {{no}} | {{yes}}Uses proprietary e-Capsule file system not exposed to the OS. | {{no}} | {{no}} | {{dunno}} |
eCryptfs
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
EgoSecure HDD Encryption
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
EncryptUSB
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
FileVault
| {{no}} | {{no}} | {{yes}}not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault | {{yes}}http://macmarshal.com/images/Documents/mm_wp_102.pdf{{dead link|date=August 2017 |bot=InternetArchiveBot |fix-attempted=yes }} |
FileVault 2
| {{no}} | {{yes}} | {{yes}} | {{dunno}} |
FREE CompuSec
| {{yes}} | {{no}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
FreeOTFE
| {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
GBDE
| {{yes}} | {{yes}} | {{yes}} | {{no}} | {{dunno}} |
GELI
| {{yes}} | {{yes}} | {{yes}} | {{no}} | {{dunno}} |
Loop-AES
| {{yes}} | {{dunno}} |
McAfee Drive Encryption (SafeBoot)
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
n-Crypt Pro
| {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
PGPDisk
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{partial|only on Windows}} | {{dunno}} |
Private Disk
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
ProxyCrypt
| {{yes}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
R-Crypto
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
SafeGuard Easy
| {{yes}} | {{yes}} | {{no|extra module}} | {{yes}} | {{yes|Each sector on disk is encrypted}} | {{dunno}} |
SafeGuard Enterprise
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes|Each sector on disk is encrypted}} | {{dunno}} |
SafeGuard PrivateDisk
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
SafeHouse Professional
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
Scramdisk
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
Scramdisk 4 Linux
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{no}} | {{dunno}} |
SecuBox
| {{no}} | {{no}} | {{yes}} | {{n/a}} | {{no}} | {{dunno}} |
Sentry 2020
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
Seqrite Encryption Manager
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes | RAID-5}} |
Softraid / RAID C
| {{yes}} | {{yes}} | {{no}} | {{yes}} (encrypted by default in OpenBSD)http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes | {{no}} | {{dunno}} |
Svnd / Vnconfig
| {{dunno}} | {{yes}} | {{yes}} | {{yes}} (encrypted by default in OpenBSD) | {{dunno}} | {{dunno}} |
SpyProof!
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
Symantec Endpoint Encryption
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
Trend Micro Endpoint Encryption
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
TrueCrypt
| {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
VeraCrypt
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
CyberSafe Top Secret
| {{no}} | {{yes}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
class="sortbottom"
! Name ! Whole disk ! Partition ! File ! Swap space ! Hibernation file ! RAID |
Modes of operation
{{further|Disk encryption theory}}
Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
- CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
- CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
- CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
- LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.LRW_issue
- XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
- Authenticated encryption: Protection against ciphertext modification by an attacker
class="wikitable sortable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;" |
Name
! CBC w/ predictable IVs ! CBC w/ secret IVs ! CBC w/ random per-sector keys ! LRW ! XTS ! Authenticated encryption |
---|
Aloaha Crypt Disk
| {{no}} | {{no}} | {{no}} | {{yes}} | {{yes}} | {{dunno}} |
ArchiCrypt Live
| {{no}} | {{no}} | {{no}} | {{partial|Legacy support}}Containers created with ArchiCrypt Live version 5 use LRW | {{yes}} | {{dunno}} |
BestCrypt
| {{no}} | {{yes}} | {{no}} | {{dunno}} |
BitArmor DataControl
| {{no}} | {{yes}} | {{yes|Plumb-IV}} | {{no}} | {{no}} | {{dunno}} |
BitLocker
| {{no}}{{Cite journal|author=Niels Fergusson|title=AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista|access-date=2008-02-22|publisher=Microsoft|date=August 2006|url=http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf}} | {{No}} | {{No}} | {{Yes|Yes, Windows 10 10547+}} | {{dunno}} |
Bloombase StoreSafe
| {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
CGD
| {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
CenterTools DriveLock
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
Check Point Full Disk Encryption
| {{no}} | {{no}} | {{yes}} | {{yes}} | {{yes}} | {{dunno}} |
CipherShed
| {{partial|Legacy support}}Containers created with TrueCrypt versions 1.0 through 4.0 use CBC. | {{no}} | {{no}} | {{partial|Legacy support}}Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only. | {{dunno}} |
CrossCrypt
| {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
CryFS
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
CryptArchiver
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
Cryptic Disk
| {{no}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{no}} |
Cryhod
| {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
Cryptoloop
| {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} | {{no}} |
DiskCryptor
| {{no}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{dunno}} |
Dm-crypt / LUKS
| {{yes}} | {{yes}} | {{no}} | {{yes|Yes, using *-lrw-benbi}}Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/ | {{yes|Yes, using *-xts-plain}} | {{yes|Yes, using | url = https://man.cx/?page=cryptsetup(8) | title = cryptsetup - manage plain dm-crypt and LUKS encrypted volumes | date = 2018-01-01 | access-date = 2018-05-08 }}}} |
DriveSentry GoAnywhere 2
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
E4M
| {{dunno}} | {{dunno}} | {{dunno}} | {{no}} | {{no}} | {{dunno}} |
e-Capsule Private Safe
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
eCryptfs
| {{no}} | {{yes}} | {{dunno}} | {{no}} | {{no}} | {{dunno}} |
EgoSecure HDD Encryption
| {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
FileVault
| {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
FileVault 2
| {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
FREE CompuSec
| {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
FreeOTFE
| {{yes}} | {{yes}} | {{no}} | {{yes}} | {{yes}} | {{no}} |
GBDE
| {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
GELI
| {{no}} | {{no}} | {{no}} | {{yes}} | {{yes|Yes, using | url = https://docs.freebsd.org/cgi/getmsg.cgi?fetch=326862+0+archive/2006/freebsd-current/20060611.freebsd-current | title = Data authentication for geli(8) committed to HEAD. | author = Pawel Jakub Dawidek | date = 2006-06-08 | access-date = 2021-11-22 }}}} |
Loop-AES
| {{yes|single-key, multi-key-v2 modes}} | {{no}} | {{no}} | {{no}} | {{no}} |
McAfee Drive Encryption (SafeBoot)
| {{no}} | {{Yes}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
n-Crypt Pro
| {{dunno}} | {{dunno}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
PGPDisk
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
Private Disk
| {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
ProxyCrypt
| {{no}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{dunno}} |
R-Crypto
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
SafeGuard Easy
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
SafeGuard Enterprise
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
SafeGuard PrivateDisk
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
SafeHouse Professional
| {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
Scramdisk
| {{no}} | {{yes}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
Scramdisk 4 Linux
| {{no}} | {{yes}}For Scramdisk containers | {{no}} | {{yes}}For TrueCrypt 4 containers | {{yes}}For TrueCrypt 5 and 6 containers | {{dunno}} |
SecuBox
| {{yes}} | {{no}} | {{no}} | {{no}} | {{no}} | {{dunno}} |
SecureDoc
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
Sentry 2020
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
Seqrite Encryption Manager
| {{no}} | {{yes}} | {{no}} | {{yes}} | {{yes}} | {{dunno}} |
Softraid / RAID C
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
Svnd / Vnconfig
| {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} | {{dunno}} |
Symantec Endpoint Encryption
| {{no}} | {{no}} | {{yes}} | {{no}} | {{no}} | {{dunno}} |
TrueCrypt
| {{no}} | {{no}} | {{no}} |
USBCrypt
| {{no}} | {{yes}} | {{no}} | {{no}} | {{yes}} | {{dunno}} |
VeraCrypt
| {{no}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{dunno}} |
CyberSafe Top Secret
| {{no}} | {{no}} | {{no}} | {{no}} | {{yes}} | {{dunno}} |
class="sortbottom"
! Name ! CBC w/ predictable IVs ! CBC w/ secret IVs ! CBC w/ random per-sector keys ! LRW ! XTS ! Authenticated encryption |
See also
Notes and references
{{Reflist|2}}
External links
- [http://www.hacker10.com/encryption-software-2/diskcryptor-vs-truecrypt-comparison/ DiskCryptor vs Truecrypt] – Comparison between DiskCryptor and TrueCrypt
- [http://www.esecurityplanet.com/mobile-security/buyers-guide-to-full-disk-encryption.html Buyer's Guide to Full Disk Encryption] – Overview of full-disk encryption, how it works, and how it differs from file-level encryption