Alternatives to TrueCrypt. Programs for encrypting okremikh files or whole disks

Antipyretic remedies for children are prescribed by a pediatrician. But there are situations of indispensable help for fevers, if the child needs to give faces negligently. Then the fathers take on themselves the resuscitation and stop the antipyretic preparations. What can be given to infants? How can you lower the temperature in older children? What are the most safe faces?

With a closed code, the bula is popular for 10 years after its independence from the main vendors. The authors of the programs are not publicly known. Among the most famous programs you can see Edward Snowden and security expert Bruce Schneier. The utility allows you to convert flash storage or hard drive the treasure is encrypted in a protected place, in which confidential information is attached to third-party eyes.

Hidden utility retailers announced that the project was closed on Wednesday, May 28, explaining that TrueCrypt was not safe. “UVAGA: TrueCrypt vikoristovut is not safe. the program can avenge unsustainable quirks” - such an information can be supported on the side of the product on the SourceForge portal. They gave the following message: "You are responsible to transfer all data encrypted in TrueCrypt to encrypted disks or create virtual disks that are supported on your platform."

An independent security expert, Graham Cluly, logically commented on the situation that had developed: “The time has come to come up with an alternative solution for encrypting files and hard disks.”

Tse is not hot!

On the back of the head, it was supposed that the site of the program was hacking cyber-malware, but now it becomes clear that this is not a hoax. The SourceForge website immediately promotes an updated version of TrueCrypt (which may have a digital signature of the retailers), at the time of installation it prompts you to switch to BitLocker or another alternative tool.

Johns Hopkins University professor of cryptography Matthew Green said: "It's even more unlikely that an unknown hacker could identify TrueCrypt retailers, steal their digital signature and hack their site."

What's up now?

The site and the merging alert in the program itself should remove instructions for transferring TrueCrypt-encrypted files to the Microsoft BitLocker service, which is delivered simultaneously from Microsoft Vista Ultimate/Enterprise, Windows 7 Ultimate/Enterprise and Windows 8 Pro/Enterprise. TrueCrypt 7.2 allows you to decrypt files, but does not allow you to create new encrypted partitions.

The most obvious alternative to the program is BitLocker, but there are other options. Schneier shared how to turn to the PGPDisk version of Symantec. Symantec Drive Encrpytion ($110 for one koristuvach license) wins over the PGP encryption method.

Establish other cost-free alternatives for Windows, such as DiskCryptor. A legacy of computer security, published by The Grugq, which has recently compiled a whole list of TrueCrypt alternatives, which is up-to-date and donin.

Johannes Ulrich, Scientist at the SANS Institute of Technology recommends Mac OS X learners to upgrade to FileVault 2, which is the same as OS X 10.7 (Lion) and the other OS of this family. FileVault uses a 128-bit XTS-AES encryption that is certified by the US National Security Agency (NSA). In Ulrich's opinion, Linux is responsible for getting involved in the Linux Unified Key Setup (LUKS) system tool. If you win Ubuntu, then the OS installer already allows you to enable full disk encryption from the very beginning.

Tim is no less, koristuvachami need other programs for encrypting portable noses, like vikoristovuyutsya on computers with different operating systems. Ulrich said that PGP/GnuPG falls into the wrong place.

The German company Steganos encourages speed old version own encryption utility Steganos Safe ( current version at the moment - 15, but it is proposed to speed up the 14th version), as it expands without cost.

Unseen inconsistencies

The fact that TrueCrypt can cause conflicts with security, indicates a serious fight, especially when auditing programs without revealing such problems. The coders have saved up $70,000 for an audit, after a little bit about how the US National Security Agency can decode significant amounts of encrypted data. The first stage of the investigation, in which the TrueCrypt venture was analyzed, was carried out for the past month. The audit did not reveal any backdoors, or any other quibbles. The follow-up phase is coming, in which case cryptography methods will be reversed, it was planned for the whole.

Green bv one of the experts, yakі take part in the audit. Vіn rozpovіv, sho not mav any previous information about those, scho retailers plan to close the project. Green of research: “Stop, I feel like a TrueCrypt retailer: “We are impatiently checking on the results of the 2nd phase of testing. Thank you for your efforts!”. The next step is that the audit will continue as planned, regardless of the TrueCrypt project.

Possibly, the creators of the programs have made a mistake to add a rozrobka, to that the utility is old-fashioned. Rozrobka stumbled on May 5, 2014, tobto. just after the official release of Windows XP. SoundForge reads: "Windows 8/7/Vista and other systems may have the tools to encrypt disks and virtual disk images." In this way, the data was encrypted into a rich OS, and the retailers could use the program no longer needed.

To add fire to the fire, it is significant that on 19 TrueCrypt was removed from the stolen Tails system (Snowden's favorite system). The reason was not fully understood, but to win the program was clearly not the next thing - having designated Cluly.

Cluly also wrote: "Whether it's cheating, evil, or the logical end of the life cycle of TrueCrypt, it's clear that spyware won't feel comfortable trusting their data after a fiasco."

  • Continue to test TrueCrypt, even if not for serious analysis, no one has had daily security problems. This is a good option, even TrueCrypt, having proven itself to be a miracle program that is amazing for all senses. So far, it's harmless. Possibly, with change operating systems in the future, the future may be blamed for the problems of consistency with TrueCrypt.
  • Become one of the forks of TrueCrypt. It is also good as the first option, with which there is hope for updating the program and adding new functions and algorithms. The main problem is that they save all the functionality of TrueCrypt.
  • Select a third party product. There are a lot of such products, we can look at them from the world.
Software for TrueCrypt

Received type of guests

VeraCrypt is a cost-free program for encryption in IDRIX (

Received type of guests

), the program is based on TrueCrypt.

There is a greater security of algorithms that are used for encryption of systems and distributions, which are unacceptable to new developments in attacks on the attack. For example, if the system partition is encrypted, TrueCrypt will win PBKDF2-RIPEMD160 for 1000 iterations, then VeraCrypt will win 327661! І for standard containers and other distributions, TrueCrypt has no more than 2000 iterations, and VeraCrypt has 655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.

The increase in security will add more than a day's work at the time of splitting without wasting productivity at the stage of victoria. This is acceptable for the right authorities, but it also makes it harder for attackers to gain access to encrypted data.

Received type of guests

This program can encrypt system partitions and non-system partitions that cover everything other versions Windows OS, third-party boot loaders and more. DiskCryptor supports some encryption algorithms and their combinations, hardware accelerated AES, as it is supported by the system and completely supports external disks. For functionality, the program is closer to TrueCrypt.

Received type of guests

(commercial)

Allows the creation of encrypted containers. Tsya program is officially deafening, so as not to avenge backdoors, bookmarks, to those who are in the country, the legislature can’t stimu zrobititse. Z kavih functions - file manager(Disk Firewall), which protects data from illegal copying, viruses. Vin allows unwanted programs to make changes to the data on the encrypted disk.

Received type of guests

This program cannot encrypt the files, it is better to open the files. Let's not be a true alternative to TrueCrypt, you can use vikoristan to encrypt important files in the system. The program wins the encryption algorithm AES 128-bit and supports file-keys.

Received type of guests

Available for Windows, Mac, Linux and mobile operating systems. It will only support file encryption, but only means that you can right-click on a file and encrypt or decrypt it.

Received type of guests

Bitlocker is only part of Windows only in Enterprise and Ultimate and Pro versions on Windows 8. It has been confirmed that Bitlocker may introduce a backdoor for law enforcement agencies and other services, but it has not been brought to light, but it may have functionality behind the key, which can be used for decryption disks that have been stolen by the program, they can be on Microsoft servers, and not locally.

Received type of guests

(as well as Boxcryptor, CryptSync and Viivo from PKWare)

Specially created for zahistu data, as if you synchronized with gloomy services, such as Google drive, OneDrive or Dropbox. It won't win 256bit and will automatically select providers after installation. Not available for Linux.

Service pinning your work (Sophie Hunt- thanks for the info). On the site, there is a written attack on the mischief:

Cloudfogger project habe stopped, Cloudfogger is not available anymore.
Since Cloudfogger users are responsible for re-encrypting their files due to new releases, the stench will be taken from our keyservers in the coming weeks.
Looking for an alternative? How about

Received type of guests

Possibly, varto marvel at

Received type of guests

Like an alternative to Cloudfogger.

Received type of guests

You can hack to synchronize encrypted copies of files on a hacky service.

Received type of guests

Another program, if you want to encrypt in dark.

Received type of guests

(Non-stitched for a special vikoristannya)

This program can be used to encrypt several files, directories or disks on Windows. The website of the project does not contain information about the ciphers and encryption algorithms.

Received type of guests

Available only for Linux. Support TrueCrypt disks and others. Exit code available.

data encryption software

Obviously, in one article, all the programs can't see it. However, if you want to continue doing this in a straight line, then you have a list of programs for the protection of data. Try it, subscribe about your results in the comments.

  • Encrypt4all
  • Exlade Cryptic Disk
  • Folder Encryption Dog
  • GiliSoft Private Disk
  • G-Soft Easy Crypter
  • HiTek Software AutoCrypt
  • idoo Full Disk Encryption
  • Jetico BCArchive
  • Jetico BestCrypt
  • KakaSoft Kaka Private Disk
  • Kruptos 2
  • NCH ​​MEO Encryption Software
  • Odin HDD Encryption
  • Odin U Disk Encrypt Creator
  • PC-Safety Advanced File Vault
  • Rohos Disk Encryption
  • SafeEnterprise Protect Drive
  • SafeHouse Professional
  • SecurStar DriveCrypt
  • Steganos Safe Professional
  • Symantec Encryption Desktop Professional
  • Utimaco SafeGuard Easy
  • Utimaco Safeware AG PrivateDisk
  • ZardsSoftware SafeKeeping
  • AbelsSoft CryptBox Pro
  • Comodo Disk Encryption
And now you: what are the other alternatives, do not guess here? Share them with us in the comments. Tell me, why do you think the program is better?


The first five articles in our blog are dedicated to VeraCrypt, in which VeraCrypt's details are looked at from its TrueCrypt ancestor, devantaging VeraCrypt, portable installation and Russification.

If you are looking for instructions for encryption, read:

Since the closing of the TrueCrypt project in 2014, VeraCrypt has become one of the most popular forks, which not only repeats the ability of the original, but corrects TrueCrypt's low level of silliness, and also brings additional functionality, which has not been seen before.

VeraCrypt Features and TrueCrypt Validity

  1. TrueCrypt changed the lack of number of iterations for PBKDF2 (password-based encryption key generation standard), in VeraCrypt the number of iterations for the system partition was increased from 1000 to 327661, and for other distributions and file containers from 2000 to 65531,
  2. VeraCrypt has corrected the pardon and optimized the capture code, which allowed the SHA-256 algorithm to be used as a hash function when ciphering the system partition hard drive, at that time, TrueCrypt hacked with a smaller algorithm RIPEMD-160.
  3. VeraCrypt drivers signed digital signature Microsoft, which is necessary for a correct installation in Windows 10.
  4. Versions 1.18 and older allow encryption Windows computers with EFI instead of the BIOS, they have also corrected the inconsistency, as it allowed to show attachment to the distribution.
  5. Starting from version 1.0f, VeraCrypt adds the ability to convert encrypted TrueCrypt containers and non-system hard disk partitions to the VeraCrypt format.
  6. A lot of program pardons have been fixed: memory loop, buffer overflow and dll capture infl uence.
  7. A new analysis and refactoring of the code was carried out
  8. Available versions for MACOS and Linux
VeraCrypt is being developed, new versions are coming out, fixes and improvements. Three years after the closure of TrueCrypt, the remaining hour has come when the new instrument is used to begin victorious more and more current theft tool.

De zavantazhiti VeraCrypt

The official side of the attraction is on the VeraCrypt website, available versions for Windows, Linux, MacOSX, so the PGP signature of the installer is a helper of the English translation.

VeraCrypt Portable (portable) version or traditional installed

If you choose to encrypt your Windows system partition, you need to install VeraCrypt, for which you choose Install during the installation process, in order to solve the problems, simply select the files of the program in the designated folder - Extract(Tse i є portable version).

Russifier VeraCrypt

Russian language medium is available in the main menu of the program. wrap Settings -> Languages, at the vіknі know Russian and press OK. All instructions and recommendations in the following articles will be provided for the English and Russian versions of the interface.

P.S

Hopefully, our article turned out to be koris, and you nadily encrypted your data, but don’t forget to take care of the security of the link - try our

The idea of ​​this article was born, if the EFSOL facsimiles were given the task of analyzing the risks of information security in the restaurant business and rozrobki zahodіv protidії їm. One of the main risks was the possibility of obtaining managerial information, and one of the counter-approaches was the encryption of accounting databases.

I would like to point out that a review of the most possible crypto-products or a decision on the basis of specific systems should not be included in the form until the point of statistical significance. We are less likely to be called by the analysis of personal encryption tools, for which we have chosen the most popular cost-free solution with a valid exit code and a couple of the largest commercial analogues that are available. Do not let the shortcomings of the coristuvachiv not lakaє the phrase "vodkritiy exit code"- out means only those who are engaged in a group of enthusiasts, who are ready to accept anyone who can help them.

Why did we take such a pidkhid? Motivation is quite simple.

  1. Different companies win their own system of appearance, so you can choose to encrypt without being tied to a specific platform - universal.
  2. A personal cryptologist is smarter to win in small enterprises, where 1-5 koristuvachivs work out of the program. For great companies, it is much more expensive to incur more financial expenses for the knowledge of management information.
  3. Analysis of impersonal commercial products and encryption of information to relieve the senses: assess the cost of them, in order to formulate your own reasonable value and functionality.

Let's move on to the ordering of products, as if manually creating the items from the star table. I navmisno did not include before the analysis of impersonal technical details (such as the support of hardware acceleration or richness of flow, how many logical physical processors), such as those that make a sizable coristuvach start to have a headache. We only mention the functionalities, the ugliness of what we can really see.

Zveda table

TrueCrypt Secret Disc Zecurion Zdisk
The rest of the version at the time of looking back 7.1a 4 No data
Vartist No cost Від 4240 rub. for 1 computer Від 5250 rub. for 1 computer
Operating system Windows 7, Windows Vista, Windows XP, Windows Server 2003, Windows Server 2008: (32-bit and 64-bit versions);
Windows Server 2008 R2;
Windows 2000 SP4;

Mac OS X 10.7 Lion (32-bit and 64-bit versions);
Mac OS X 10.6 Snow Leopard; Mac OS X 10.5 Leopard;
Mac OS X 10.4 Tiger;

Linux (32-bit and 64-bit versions, kernel 2.6 or less)

Windows 7, Windows Vista, Windows XP: (32-bit and 64-bit versions) Windows 98;
Windows Me;
Windows NT Workstation;
Windows 2000 Professional;
Windows XP;
Windows Vista
Implemented encryption algorithms AES
Serpent
Twofish
Hi Hi
Winner of post-masters in cryptography (crypto-providers in CSP) Hi Microsoft Enhanced CSP: Triple DES and RC2;
Secret Disk NG Crypto Pack: AES and Twofish;
CryptoPro CSP, Signal-COM CSP or Vipnet CSP: GOST 28147-89
rc5,
AES,
KRYPTON CSP: GOST 28147-89
XTS encryption mode So Hi Hi
Cascading encryption AES-Twofish-Serpent;
Serpent-AES;
Serpent-Twofish-AES;
Twofish Serpent
Hi Hi
Clear encryption So So So
Encryption of the system partition So So Hi
Authentication before OS capture Password Pin + token Hi
Encryption of disk partitions So So Hi
Creation of file-containers So So So
fold attached distributions So Hi Hi
The creation of the attached OS So Hi Hi
Encryption of portable storage devices So So So
Work with portable storage devices So Hi Hi
Work according to measure So Hi So
Loans for rich coristuvachіv mode Zasoby NTFS So So
Authentication only behind a password So Hi Hi
Authentication behind a key file So Hi Hi
Support for tokens and smart cards Support PKCS #11 2.0 protocol or else eToken PRO/32K USB key (64K);
eToken PRO/72K USB dongle (Java);
Smart card eToken PRO/32K (64K);
Smart card eToken PRO/72K (Java);
Combination key eToken NG-FLASH
Combination key eToken NG-OTP
eToken PRO Anywhere
Rainbow iKey 10xx/20xx/30xx;
ruToken;
eToken R2/Pro
Emergency enabling of encrypted disks Hot keys Hot keys Hot keys
Protection from entering the password under the Primus stove Hi So So
Possibility of using the "Trustworthy List of Accountability" So Hi Hi
Contents of delivery No boxed version - the distribution kit is available from the retailers website eToken PRO Anywhere USB key with a license for a different product;
A short help from a friend of a friend;
CD-ROM (distribution kit, report documentation, interesting part of MBR;
Packing DVD box
License;
USB key and USB holder;
Disk from the distribution kit; Documentation at the friend's sight;
ACS-30S smart card reader/writer

Dorimuyuchis laws of the genre, it was no longer enough to comment on other points and see the importance of that other decision. With prices for products, everything was clear, like with operating systems that are supported. I don’t mean the fact that the versions of TrueCrypt for MacOS and Linux have their own nuances of victoriousness, and the installation of yoga on the server platform like Microsoft even gives a few pluses, but we can’t replace the great functionality of commercial systems and protect data from corporate enterprises. I guess what we are looking at is still a personal cryptologist.

Implementation of algorithms, crypto providers, XTS and cascade encryption

Cryptoproviders, on the basis of the introduction of encryption algorithms, are the modules that can be connected, as well as select the coding method (rozkoduvannya), which is victorious by the program. Why do commercial solutions win packages of crypto providers? Vіdpovіdі nevigadlіvі, ale financially lined.

  1. There is no need to make changes to the program to add quieter algorithms (pay for the work of programmers) - it’s enough to create a new module or connect solutions to third-party retailers.
  2. In the whole world, international standards are being tested, tested, and tested, and for Russian state structures, it is necessary for the authorities of the FSTEC and the FSB to have confidence. Tsі vimogi mayut on uvazі licenzuvannya dvorennya and rozpovsyudzhennya zaobіv zahistu іnformatsiї.
  3. The encryption of data is carried out by crypto providers, and the programs do not require certification of distribution and distribution.

Cascading encryption - the ability to encode information with one algorithm, if it was already encoded with another. Such a pidhid, although it helps the robot, allows you to increase the security of data being stolen against evil - the more the “opponent” knows about encryption methods (for example, the algorithm or the typing of key symbols), the easier it is for you to reveal information.

The XTS encryption technology is a logical development of the forward block encryption methods XEX and LRW, which have shown inconsistencies. Oskolki opraktsi ї chitannya/zapis on data carriers virobljayutsya sector-by-sector blocks, the use of streaming methods of coding is unacceptable. Thus, on December 19, 2007, the XTS-AES encryption method for the AES algorithm was described and recommended by the international standard for information protection IEEE P1619, which should be taken.

This mode has two keys, the first of which is used to generate the initialization vector, and the data is encrypted with the other. The method follows the next algorithm:

  1. generate a vector by encrypting the sector number with the first key;
  2. composes a vector from output information;
  3. encrypt the result with another key;
  4. add a vector from the result of encryption;
  5. multiply the vector by the multiple term, which generates the terminal field.

The National Institute of Standards and Technology recommends using the XTS mode for encrypting these devices with a block internal structure, shards of wines:

  • descriptions by the international standard;
  • maє high productivity for the account of the previous payment and the parallelization;
  • allows you to process a certain block of the sector for the calculation of the calculation of the initialization of the vector.

Also, since IEEE P1619 recommends victorizing the XTS method with the AES encryption algorithm, the protearchitecture allows the mode to victorize it in its entirety with any other block cipher. In this rank, at the time of the need for certification, I will add that the implementation of encryption is clear, it is possible to sleeping room XTS and GOST 28147-89.

Emergency inclusion of disks, entering the password "under primus", locking accountability

Emergency enablement of encrypted disks is an absolutely necessary function in situations that require a mitt response for the protection of information. But what do you see farther away? "Opponent" to check the system, for which the crypto-protectionist is installed, it is inaccessible for reading system problems disk. Visnovok about the acquisition of information is obvious.

Now comes the stage of "primus". "Opponent" will win physical or legal questions, come in, so that you can tell the clerk to reveal information. Vitchiznyane decision "introduction of the password under the primus stove" from the category "I'll die before I can see it" becomes irrelevant. It is impossible to see the information, like copying the opponent in front, but to break it down - do not hesitate. The appearance of the encryption key is less likely to confirm that the information is really important, and the spare key is obov'yazykovo here. That information without a key is still available for cryptanalysis and evil. I’m not going to expand, naskіlki tsі dії bring the sergeant of information closer to a legal fiasco, but let’s talk about the logical method of plausible imputation of accountability.

The choice of attached distributions and the attached OS does not allow the "opponent" to bring the reason for the stolen information. With such light, the ability to reveal information becomes absurd. TrueCrypt retailers recommend even more misleading traces: around the attachment of distributions or operating systems to create encrypted visible, as if to avenge fraudulent (fictitious) data. The "opponent", having revealed the visible ciphers divided, is similar to the cipher itself. Having revealed such information under the primus stove, the sergeant-major does not risk anything, but he suspects that the right secrets will be left invisible on the attachment of encrypted distributions.

Delivery of bags

The nuances of the protection of information are impersonal, but the lightened one can stand up for the battle of the intermediate bags - the rest of the solution is to take the skin yourself. Before the wins cost-free program TrueCrypt varto show її functionality; the possibility for all those who are born to take part in the testing and improvement; transcendental quantity of critical information about how to work with programs. The decision was made by people, as it is rich to know about the safe storage of information and constantly improve their product, for people who are important high rіven arrogance. Up to a short period of time, the number of hours of support, the height of folding for an ordinary coristuvach, the absence of courtyard authentication before the start of the OS, the impossibility of connecting modules of third-party crypto-providers.

Commercial products of spovneni turbotoy about koristuvach: technical support, miraculous equipment, low quality, availability of certified versions, the ability to win the algorithm of GOST 28147-89, insurance for a rich coristuvachіv mode with demarcated yard authentication. The functionality and simplicity of maintaining the secrecy of saving encrypted data is less confused.

Updated: Worm 2015 Roku.

Regardless of those, TrueCrypt 7.1a version was released on February 7, 2011, the remaining full functional version of the product is out of stock.

Tsikava is a mysterious story from the discovery of TrueCrypt. May 28, 2014 front versions This product has been updated with version 7.2. This version can only decrypt earlier encrypted disks and containers - the possibility of encryption was removed. For some time on the site, that program is calling the BitLocker hack, and the TrueCrypt hack is called unsafe.

This called out to the wind of gossip on the Internet: the authors of the programs were suspected of setting bookmarks in the code. Adding information from the big NSA practitioner Snowden about those that the special services are navmislyuyut cryptography security, koristuvachі rozpochali koshtіv for conducting an audit of the TrueCrypt code. Over 60,000 dollars were taken for re-verification of the programs.

The audit is fully completed by April 2015. Analysis of the code without revealing any bookmarks, critical shortcomings of the architecture or inconsistencies. It was brought to light that TrueCrypt is a well-designed cryptographic project, although it is not ideal.

Now, glad to be a retailer, go to Bitlocker, it looks like a bagatma like a "canary's wedding". The authors of TrueCrypt have always been using Bitlocker and yoga security software. Bitlocker's twist is also unreasonable through closeness program code the inaccessibility of yoga in the "younger" editions of Windows. Through all the above-said, the Internet-spilnota is smartly aware of what the secret services are pouring into retailers, and the stench of their movers is on the way of being important, inexplicably recommending Bitlocker.

Repeatedly pіdіb'єmo pіdbags

TrueCrypt continues to be the strongest, most advanced and functional way of cryptography. І audit, and the pressure of special services is less likely to confirm.

Zdisk and Secret Disk may have FSTEC certified versions. Otzhe, tsі produce maє sens vikoristovuvati for the viability of the legislature of the Russian Federation in the Galuzi zahistu іnformatsії, for example, zahistu personal data, thus vimagaє federal law 152-FZ and sub-ordering of the laws and regulations.



For those who are seriously turbulent about security information, there is a complex solution "Server in Israel", in which case complex pіdkhіd to zahistu danih undertakings.

System integration. Consulting

There are no obvious reasons to encrypt data on your hard disk, but the payment for the security of data will be a decrease in the security of the robotic system. Meta tsiєї statti - equalize productivity when working with a disk, encrypted in different ways.

In order for the retail to be dramatic, we chose not a super modern, but an average statistical car. 500 GB primary mechanical hard drive, 2.2 GHz dual-core AMD, 4 gigabytes of RAM, 64-bit Windows 7 SP 1. There will be no running antiviruses or other programs for an hour of testing, because nothing could interfere with the results.

To evaluate productivity, I chose CrystalDiskMark. While testing encryption tools, I looked at the following list: BitLocker, TrueCrypt, VeraCrypt, CipherShed, Symantec Endpoint Encryption and CyberSafe Top Secret.

bitlocker

Tse standard zasib encryption of disks, vbudovane in Microsoft Windows. Too many people just hack yoga without installing third-party programs. Really, now, how is everything in the system? From one side, right. On the other hand, the code is closed, and there is no reason why they didn’t block backdoors for the FBI or others.

Encryption of the disk is based on the AES algorithm from a double key of 128 or 256 bits. The key can be stored in the Trusted Platform Module, on the computer itself or on a flash drive.

As TPM wins, then when the computer is captured, the key can be removed from the new one or after authentication. You can log in for an additional key on the flash drive or by entering the PIN code from the keyboard. Combinations of these methods give impersonal options for sharing access: just TPM, TPM and USB, TPM and PIN, all three times.

BitLocker has two non-transverse advantages: in the first place, it can be reversed through group policies; in a different way, vin encrypts Tomy, not physical disks. This allows you to encrypt an array from a large number of disks, which cannot be done by other encryption methods. BitLocker also supports the GUID Partition Table (GPT), which can't boast of navigating the biggest TruCrypt fork of VeraCrypt. To encrypt the system GPT disk, you need to convert the MBR format. BitLocker doesn't need it.

Zagalom, short one - close the vents. As you keep secrets from your household, BitLocker is a miracle worker. As if your disk was full of documents of the sovereign vaga, it’s more likely to be told otherwise.

You can decrypt BitLocker and TrueCrypt

Ask Google to find out the Elcomsoft Forensic Disk Decryptor software tool for decrypting BitLocker, TrueCrypt and PGP disks. As part of this article, I will not test it, but I will share my opinion about another utility like Elcomsoft, and Advanced EFS Data Recovery itself. Vaughn miraculously decrypted EFS folders, but remember that the password of the koristuvach was not installed. If I set the password to 1234, the program was powerless. At every time, decrypt the encrypted EFS folder, I couldn’t get away with the password 111. I think that the situation will be the same with the Forensic Disk Decryptor product.

TrueCrypt

This is the legendary disk encryption program, which was released in 2012. History, trapilas s TrueCrypt, dosi vkrita gloom, and no one knows why the rozrobnik virishiv vіdmovitsya vіd pіdtrimki svoіdіdishcha.

There is no more information than that, which is not allowed to put the puzzle together. So, in 2013, the selection of funds for conducting an independent audit of TrueCrypt began. The reason was the removal of information from Edward Snowden about the weakening of TrueCrypt encryption. Over 60 thousand dollars were collected for the audit. At the beginning of April 2015, the work was completed, and yet there were no serious pardons, quibbles or other shortcomings in the architecture of the program.

Just as the audit ended, TrueCrypt once again leaned at the center of the scandal. Fahivtsі company ESET published a zvіt about those, scho Russian version of TrueCrypt 7.1a, taken from the site truecrypt.ru, mіstila malvar. Moreover, the truecrypt.ru site itself was treated like a command center - commands were issued to the infected computers. Zagalom, be drunk and don’t zavantazhuy programs squandered the stars.

Prior to TrueCrypt’s breakthroughs, you can see the findings of the dzherel, the validity of which is now supported by an independent audit, that support of dynamic Windows volumes. Shortcomings: the program is no longer developed and the retailers did not manage to implement the UEFI / GPT support. Ale, yakscho meta - encrypt one non-system disk, price is unimportant.

BitLocker is supported, only AES is supported, TrueCrypt also has Serpent and Twofish. To generate encryption keys, the header key salt, the program allows you to select one of three hash functions: HMAC-RIPEMD-160, HMAC-Whirlpool, HMAC-SHA-512. However, a lot of things have been written about TrueCrypt, so we won’t repeat it.

VeraCrypt

The largest current clone of TrueCrypt. New official format, if it is possible to work in TrueCrypt mode, in which case the encrypted virtual disks in the "Trucrypt" format. Viewed from CipherShed, VeraCrypt can be installed on the same computer at the same time as TrueCrypt.

INFO

Self-sustaining, TrueCrypt has left a lot of clutter: a new faceless fork, repairing VeraCrypt, CipherShed and DiskCryptor.

TrueCrypt has 1000 iterations when generating a key, which will be the encryption of the system partition, and VeraCrypt has 327661 iterations. For standard (non-system) distributions of VeraCrypt, 655331 iterations for the RIPEMD-160 hash function and 500000 iterations for SHA-2 and Whirlpool. In order to destroy the encrypted partitions with strong brute force before the attack by direct search, it also significantly reduces the productivity of robots with such a partition. Naskіlki znachno mi soon z'yasuєmo.

The middle part of VeraCrypt is the open code, as well as the most powerful hijacking of TrueCrypt virtual and encrypted disks. Nedoliki tі f, scho y in vpadku z great-father - vіdsutnіst pіdtrimki UEFI / GPT. It is not possible to encrypt the system GPT-disk, as before, but the rozrobnikov zapevnyayut how to work on this problem and soon such encryption will be available. The axis has only been practicing stench over the world for two years already (since 2014), and if there will be a release from the support of the GPT and chi will start, it will not be seen yet.

CipherShed

Another clone of TrueCrypt. On the view of VeraCrypt, in the victorian format of TrueCrypt, it is clear that your productivity will be close to that of TrueCrypt.

The advantages and shortcomings are all the same, although you can add to the shortcomings the impossibility of installing TrueCrypt and CipherShed on one computer. Not only that, if you try to install CipherShed on a machine with TrueCrypt installed, then the installer will tell you to remove the front program, but not cope with the tasks.

Symantec Endpoint Encryption

In 2010, the distribution company Symantec bought the rights to the PGPdisk program. As a result, such products as PGP Desktop and, eventually, Endpoint Encryption appeared. We can see for ourselves. The program is obviously proprietary, closed, and one license costs 64 euros. Prote here є podtrimka GPT, but only pochinayuchi z Windows 8.

In other words, as GPT support is required and it is necessary to encrypt the system partition, you will have to choose between two proprietary solutions: BitLocker and Endpoint Encryption. It is unlikely, obviously, that a home koristuvach will install Endpoint Encryption. The problem is which one needs Symantec Drive Encryption, which one needs a Symantec Endpoint Encryption (SEE) encryption server and agent to install, and the server you want to install is IIS 6.0. Chi is not zabagat be-any good for one program for encrypting a disk? We went through a lot of things just to slow down our productivity.

moment of truth

Otzhe, proceed to the next, itself to the test. We need to check the productivity of the disk without encryption. Our "victim" will be a partition of a hard drive (large, not SSD) with a size of 28 GB, formatted like NTFS.

Check CrystalDiskMark, choose the number of passes, size the time file (for all tests, it is 1 Gbps), and the disk itself. Varto signify that the number of passes practically does not affect the results. The first screenshot shows the performance results of a disk without encryption with the number of passes 5, on the other - with the number of passes 3. As a matter of fact, the results are practically identical, we can see this in three passes.



The results of CrystalDiskMark should be interpreted as follows:

  • Seq Q32T1 - sequential write/sequential read test, number of orders - 32, streams - 1;
  • 4K Q32T1 - test of drop-down writing / drop-down reading (size of a block is 4 KB, the number of blocks is 32, streams is 1);
  • Seq - sequential write/sequential read test;
  • 4K - test of vepad writing / vepad reading (the size of the block is 4 Kbytes);

Let's get started with BitLocker. 19 quilins were stained for encryption.

Promotion available only to members

Option 1. Come to the “site” to read all the materials on the site

Membership with a jointly assigned term grants you access to all materials of the Hacker, to increase the special accumulative discount and allow you to accumulate a professional Xakep Score rating!

Support the project - share your efforts, darling!
Read also
How to install avast free antivirus How to install avast free antivirus How to clean the computer'ютер від вірусів самостійно How to clean your computer from viruses on your own How to clean up the computer again'ютер від вірусів How to clear the computer again from viruses