Comparison of disk encryption software: Difference between revisions

Content deleted Content added
Bender the Bot (talk | contribs)
m HTTP to HTTPS for SourceForge
 
(48 intermediate revisions by 25 users not shown)
Line 1:
{{short description|None}}
 
This is a technical feature '''comparison of different [[disk encryption software]]'''.
<!-- NB! Please do ''not'' add a table comparing support for different encryption algorithms, as almost all encryption software supports all popular algorithms, and such a table would be useless for practical information. If you disagree, you are welcome to discuss on the talk page. -->
Line 30 ⟶ 32:
|-
!{{Rh}}| BitArmor DataControl
| [[BitArmor|BitArmor Systems Inc.]]
| 2008-05
| {{Proprietary}}
Line 42 ⟶ 44:
|-
!{{Rh}}| Bloombase StoreSafe
| [https://www.bloombase.com/ Bloombase]
| 2012
| {{Proprietary}}
Line 51 ⟶ 53:
| 2011
| {{Proprietary}}
| {{yesno}}
|-
!{{Rh}}| CGD
Line 77 ⟶ 79:
| {{no}}
|-
!{{Rh}}| [[CrossCrypt]]
| Steven Scherrer
| 2004-02-10<ref>{{cite web |author=Sarah Dean |date=2004-02-10 |title=OTFEDB entry |url=http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |access-date=2008-08-10 |url-status=dead |archive-url=https://web.archive.org/web/20081211101509/http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |archive-date=2008-12-11 }}</ref>
Line 97 ⟶ 99:
!{{Rh}}| Cryptainer
| Cypherix Software
| 19991998
| {{Proprietary}}
| {{yes}}
Line 119 ⟶ 121:
| {{no}}
|-
!{{Rh}}| [[Cryptomator]]
| Skymatic UG (haftungsbeschränkt)
| 2016-03-09<ref>{{cite web |url=http://www.cryptomator.org/ |title=Home |website=cryptomator.org}}</ref>
| {{free|[[GPLv3]]}}
| {{yes}}
Line 140 ⟶ 142:
| Stefan Küng
| 2012
| {{free|[[GplGPL v2]]}}
| {{yes}}
|-
Line 153 ⟶ 155:
| 2007
| {{free|[[GNU General Public License|GPL]]}}
| {{yesno}}<ref>{{Cite web|url=https://github.com/DavidXanatos/DiskCryptor/releases|title = Releases · DavidXanatos/DiskCryptor|website = [[GitHub]]}}</ref>
|-
!{{Rh}}| DISK Protect
Line 172 ⟶ 174:
| {{free|[[GNU General Public License|GPL]]}}
| {{yes}}
|-
!{{Rh}}| [http://www.securstar.biz/ DriveCrypt]
| SecurStar GmbH
| 2001
| {{Proprietary}}
| {{yes}}<ref>{{cite web |author=SecurStar GmbH |title=DriveCrypt v5.8 Released |url=http://www.securstar.biz/news/drivecrypt-v5-8-released-win-10-compatible.html |access-date=2015-10-26 |archive-url=https://web.archive.org/web/20151027223747/http://www.securstar.biz/news/drivecrypt-v5-8-released-win-10-compatible.html |archive-date=2015-10-27 |url-status=dead }}</ref>
|-
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
Line 213 ⟶ 209:
| 2003<ref>{{cite web |author=Valient Gough |date=2003 |title= EncFS - an Encrypted Filesystem |work=README.md file |url=https://github.com/vgough/encfs |access-date=2007-01-14 }}</ref>
| {{free|[[GNU Lesser General Public License|LGPLv3]]}}
| {{yesno}}
|-
!{{Rh}}| EncryptStick
| ENC Security Systems
| 2009
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| EncryptUSB
| ClevX
| 2016
| {{Proprietary}}
| {{yes}}
Line 271 ⟶ 261:
!{{Rh}}| gocryptfs
| Jakob Unterwurzacher
| 2015-10-07<ref>{{cite web |title=gocryptfs changelog on github |website=[[GitHub]] |url=https://github.com/rfjakob/gocryptfs#changelog |access-date=2018-01-16 }}</ref>
| {{free|[[MIT License|MIT / X Consortium License]]}}
| {{yes}}
Line 289 ⟶ 279:
!{{Rh}}| LibreCrypt
| tdk
| 2014-06-19<ref>{{cite web |title=as received from FreeOTFE version v5.21 with small changes |website=[[GitHub]] |url=https://github.com/t-d-k/LibreCrypt/commit/a395620545beff7736427dfc3b508b4f67609396 |date=2014-06-20 |access-date=2015-09-14 }}</ref>
| {{free|[[Open source software|Open source]]}}
| {{no}}
Line 308 ⟶ 298:
| n-Trance Security Ltd
| 2005
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| [https://netlibsecurity.com/ NetLib Encryptionizer (directory encryption)]
| NetLib Security
| 1987
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| [https://www.nodrive.cloud/ Nodrive (Virtual Encrypted Disk)]
| Hidden Solutions
| 2018
| {{Proprietary}}
| {{yes}}
Line 360 ⟶ 338:
|-
!{{Rh}}| SafeGuard PrivateDisk
| [[Sophos]] (Utimaco)<ref name="LenovoPrivateDisk">Rebranded as ThinkVantage Client Security {{citeCite FTP web|url=ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|server=[[Lenovo]]|url-status=dead|title=ThinkVantage Technologies Deployment Guide|publisher=[[Lenovo]]|access-date=2008-03-05}}{{dead link|date=August 2017 |bot=InternetArchiveBot |fix-attempted=yes }}</ref>
| 2000
| {{Proprietary}}
Line 379 ⟶ 357:
!{{Rh}}| [[Scramdisk]] 4 Linux
| Hans-Ulrich Juettner
| 2005-08-06<ref>{{cite web |title=ScramDisk 4 Linux Releases |url=httphttps://sourceforge.net/project/showfiles.php?group_id=101952&package_id=109447}}</ref>
| {{free|[[GNU General Public License|GPL]]}}
| {{no}}
Line 392 ⟶ 370:
| SECUDE
| 2003
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| SecureDoc
| [https://www.winmagic.com WinMagic Inc.]
| 1997
| {{Proprietary}}
| {{yes}}
Line 439 ⟶ 411:
!{{Rh}}| Tcplay
| Alex Hornung
| 2012-01-28<ref>{{cite web|url=https://github.com/bwalex/tc-play/releases|title=bwalex/tc-play|website=[[GitHub]]|date=2019-08-27}}</ref>
| {{free|[[BSD licenses|BSD]]}}
| {{no}}<ref>Last update: 2020-03-02 {{cite web|publisher = Github | title = bwalex/tc-play | url=https://github.com/bwalex/tc-play|date=2023-04-03}}</ref>
| {{yes}}
|-
!{{Rh}}| [[Trend Micro]] Endpoint Encryption (Mobile Armor)
Line 464 ⟶ 436:
| IDRIX
| 2013-06-22<ref>{{cite web|url=https://veracrypt.codeplex.com/SourceControl/list/changesets?page=8|title=VeraCrypt}}</ref>
| {{free|Apache License 2.0}}<ref>{{cite web | title =Apache License 2.0 | publisher =IDRIX | date =2015-06-28 | url =https://veracrypt.codeplex.com/license | access-date = 2015-08-08 | archive-date =2015-07-09 | archive-url =https://web.archive.org/web/20150709234209/https://veracrypt.codeplex.com/license | url-status =dead }}</ref>
TrueCrypt License Version 3.0 (legacy code only)
| {{yes}}
Line 479 ⟶ 451:
!{{Rh}}| Licensing
!{{Rh}}| Maintained?
|-
!ZzEnc
![https://imdtech.ru/ru/technologies/fde/ IMDTech]
!2013
!Commercial
!
|}
 
Line 485 ⟶ 463:
|-
! Name
! [[Android (operating system)|Android]]
! [[Windows NT]]
! [[iOS]]
! [[Windows Mobile]] (incl.[[Pocket PC]])
! [[Mac OS X]]
! [[Linux]]
! [[FreeBSD]]
! [[LinuxOpenBSD]]
! [[Mac OS X]]
! [[NetBSD]]
! [[OpenBSD]]
! [[DragonFly BSD]]
! [[Android (operating system)|Android]]
! [[iOS]]
|-
!{{Rh}}| Aloaha Crypt Disk
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 503 ⟶ 481:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[BestCrypt]] Volume Encryption
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}<ref>{{cite web|url=http://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption|title=Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy}}</ref>
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| BitArmor DataControl
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 527 ⟶ 501:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[BitLocker]]
| {{no}}
| {{yes}}
| {{nodunno}}
| {{no}}
| {{Partial}}<ref name=dislocker>[https://github.com/Aorimn/dislocker] FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX</ref>
| {{Partial}}<ref name=dislocker />
| {{Partial}}<ref name=dislocker>https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| Bloombase StoreSafe
| {{dunno}}
| {{yes}}
| {{nodunno}}
| {{yes}}
| {{yes}}
Line 552 ⟶ 521:
| {{yes}}
| {{yes}}
| {{yes}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| Boxcryptor
| {{yes}}
| {{noyes}}
| {{noyes}}
| {{yes}}
| {{yes}}
Line 565 ⟶ 531:
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
|-
!{{Rh}}| CenterTools DriveLock
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 575 ⟶ 541:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| CGD
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
Line 587 ⟶ 551:
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| Check Point Full Disk Encryption
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{yes}}<ref>{{cite web |url=http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |title=Archived copy |access-date=2014-12-14 |url-status=dead |archive-url=https://web.archive.org/web/20150923202446/http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |archive-date=2015-09-23 }}</ref>
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[CipherShed]]
| {{yes}}<ref name="play.google.com">https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system</ref>
| {{yes}}
| {{nodunno}}
| {{no}}<ref>[http://www.truecrypt.org/misc/freebsd] Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used</ref>
| {{yes}}
| {{yes}}
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used</ref>
| {{no}}
| {{no}}
|-
!{{Rh}}| CrossCrypt
| {{no}}
| {{yes}}<ref>CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems</ref>
| {{yes}}<ref name="play.google.com">[https://play.google.com/store/apps/details?id=com.sovworks.edslite] Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system</ref>
| {{dunno}}
|-
!{{Rh}}| [[CrossCrypt]]
| {{yes}}<ref>[[CrossCrypt]] - Only for the Microsoft Windows XP/2000 operating systems</ref>
| {{no}}
| {{no}}
Line 623 ⟶ 581:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| CryFS
| {{yes}}
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
Line 637 ⟶ 591:
| {{no}}
| {{yes}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| Cryhod
| {{dunno}}
| {{yes}}
| {{nodunno}}
| {{no}}
| {{yes}}
Line 648 ⟶ 601:
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| Cryptainer
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{Yes}}<ref>[http://cypherix.com/downloads.htm] PocketPC freeware release- SmartPhone beta available</ref>
| {{no}}
| {{no}}
Line 660 ⟶ 611:
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| CryptArchiver
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 671 ⟶ 621:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| Cryptic Disk
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 689 ⟶ 633:
|-
!{{Rh}}| [[Cryptoloop]]
| {{dunno}}
| {{yes}}<ref name="freeotfe.org">[http://www.freeotfe.org/docs/Main/Linux_volumes.htm] FreeOTFE supports cryptoloop, dm-crypt/[[cryptsetup]]/[[dmsetup]], and dm-crypt/LUKS volumes</ref>
| {{yes}}<ref name="freeotfe.org">http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/[[cryptsetup]]/[[dmsetup]], and dm-crypt/LUKS volumes</ref>
| {{no}}
| {{dunno}}
| {{no}}
| {{yes}}
Line 696 ⟶ 641:
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [http://www.Cryptomator.org [Cryptomator]]
| {{yes}}
| {{yes}}<ref name="cryptomator.org">{{Cite web | url=http://www.cryptomator.org |title = Cryptomator - Free Cloud Encryption}}</ref>
| {{noyes}}
| {{no}}
| {{yes}}
| {{yes}}
Line 709 ⟶ 651:
| {{no}}
| {{no}}
| {{yes}}
| {{yes}}
|-
!{{Rh}}| CryptoPro Secure Disk Enterprise
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 719 ⟶ 661:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| CryptoPro Secure Disk for BitLocker
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 731 ⟶ 671:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| [[Cryptsetup]] / [[Dmsetup]]
| {{dunno}}
| {{yes}}<ref name="freeotfe.org"/>
| {{nodunno}}
| {{no}}
| {{yes}}
Line 744 ⟶ 681:
| {{no}}
| {{no}}
| {{yes}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| CryptSync
| {{yes}}
| {{no}}
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
Line 757 ⟶ 691:
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| Discryptor
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
Line 767 ⟶ 701:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[DiskCryptor]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 779 ⟶ 711:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| DISK Protect
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 791 ⟶ 721:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[Dm-crypt]] / [[LUKS]]
| {{dunno}}
| {{yes}}<ref name="freeotfe.org"/>
| {{dunno}}
| {{yes}}<ref>[http://www.freeotfe.org/docs/Main/Linux_volumes.htm] FreeOTFE4PDA supports dm-crypt/LUKS volumes</ref>
| {{no}}
| {{yes}}
Line 804 ⟶ 731:
| {{no}}
| {{no}}
|-
| {{yes}}
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [http://www.securstar.biz/ DriveCrypt]
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
| {{yes}}
| {{no}}
| {{no}}
Line 827 ⟶ 741:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[E4M]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 839 ⟶ 751:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| e-Capsule Private Safe
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 851 ⟶ 761:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[eCryptfs]]
| {{dunno}}
| {{no}}
| {{nodunno}}
| {{no}}
| {{yes}}
Line 864 ⟶ 771:
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| EgoSecure HDD Encryption
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 875 ⟶ 781:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[EncFS]]
| {{yes}}<ref name="boxcryptor">{{cite web|url=https://www.boxcryptor.com/|title=Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS}}</ref>
| {{yes}}<ref name="save">{{cite web|url=http://www.getsafe.org/|title=Safe - Protect Your Files|access-date=2016-03-29|archive-url=https://web.archive.org/web/20160421064348/http://www.getsafe.org/|archive-date=2016-04-21|url-status=dead}}</ref>
| {{dunno}}
| {{yes}}<ref name="boxcryptor">{{cite web|url=https://www.boxcryptor.com/|title=Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS}}</ref>
| {{yes}} ([[Filesystem in Userspace|FUSE]])
| {{yes}} (FUSE)
| {{yes}}<ref name="save" />
| {{yes}} (FUSE)
| {{yes}} ([[Filesystem in Userspace|FUSE]])
| {{yes}} (FUSE)
| {{yes}} (FUSE)
| {{yes}}<ref name="boxcryptor" />
| {{dunno}}
|-
!{{Rh}}| EncryptStick
| {{dunno}}
| {{Yes}}
| {{dunno}}
| {{Yes}}
| {{no}}
| {{no}}
| {{yes}}
| {{Yes}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| EncryptUSB
| {{dunno}}
| {{Yes}}
| {{dunno}}
|-
!{{Rh}}| EncryptUSB
| {{Yes}}
| {{no}}
| {{no}}
| {{no}}
| {{Yes}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[FileVault]]
| {{dunno}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[FileVault|FileVault 2]]
| {{dunno}}
| {{no}}
| {{nodunno}}
| {{no}}
| {{partial}}<ref>[https://code.google.com/p/libfvde/] libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes</ref>
| {{yes}}
| {{partial}}<ref>https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes</ref>
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| FREE CompuSec
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 947 ⟶ 841:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[FreeOTFE]]
| {{no}}
| {{yes}}
| {{Yesdunno}}
| {{no}}
| {{partial}}<ref>[http://www.freeotfe.org/docs/Main/Linux_volumes.htm] Supports Linux volumes</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| [[GBDE]]
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
Line 970 ⟶ 861:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[Geli (software)|GELI]]
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
Line 982 ⟶ 871:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| Knox
| {{dunno}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| LibreCrypt
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB Third party app allows a user to open LibreCrypt compatible LUKS containers</ref>
| {{yes}}
| {{dunno}}
| {{no}}
| {{partial}}<ref>https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes</ref>
| {{no}}
| {{partial}}<ref>[https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md] Supports Linux volumes</ref>
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}<ref>[https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB] Third party app allows a user to open LibreCrypt compatible LUKS containers</ref>
| {{dunno}}
|-
!{{Rh}}| Loop-AES
| {{dunno}}
| {{no}}
| {{nodunno}}
| {{no}}
| {{yes}}
Line 1,020 ⟶ 901:
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| McAfee Drive Encryption (SafeBoot)
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}<ref name="Endpoint Encryption for Mobile">{{cite web|url=http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html|title=Endpoint Encryption Datasheet|publisher=[[McAfee]]|access-date=2010-06-14}}</ref>
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| n-Crypt Pro
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}|[https://netlibsecurity.com/ NetLib Encryptionizer (directory encryption)]
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,061 ⟶ 923:
|-
!{{Rh}}| [[PGPDisk]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[PGP Whole Disk Encryption]]
| {{dunno}}
| {{yes}}
| {{yesdunno}}
| {{no}}
| {{yes}}
| {{yes}}
Line 1,081 ⟶ 941:
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[Private Disk]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,091 ⟶ 951:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| ProxyCrypt
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,103 ⟶ 961:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| R-Crypto
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,115 ⟶ 971:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| SafeGuard Easy
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,127 ⟶ 981:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| SafeGuard Enterprise
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| SafeGuard PrivateDisk
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,151 ⟶ 1,001:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| SafeHouse Professional
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,163 ⟶ 1,011:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[Scramdisk]]
| {{dunno}}
| {{yes}}
| {{nodunno}}
| {{no}}
| {{yes}}
Line 1,176 ⟶ 1,021:
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[Scramdisk]] 4 Linux
| {{dunno}}
| {{no}}
| {{nodunno}}
| {{no}}
| {{yes}}
Line 1,188 ⟶ 1,031:
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| SecuBox
| {{dunno}}
| {{no}}
| {{yesdunno}}
| {{no}}
| {{no}}
Line 1,200 ⟶ 1,041:
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| SecureDoc
| {{dunno}}
| {{yes}}
| {{nodunno}}
| {{no}}
| {{yes}}
| {{yes}}
Line 1,213 ⟶ 1,051:
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[Sentry 2020]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,223 ⟶ 1,061:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[Seqrite]] Volume Encryption
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,241 ⟶ 1,073:
|-
!{{Rh}}| Softraid / RAID C
| {{dunno}}
| {{no}}
| {{nodunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,249 ⟶ 1,081:
| {{yes}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| SpyProof!
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,259 ⟶ 1,091:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| Svnd / Vnconfig
| {{dunno}}
| {{no}}
| {{nodunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,273 ⟶ 1,101:
| {{yes}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| [[NortonLifeLock|Symantec]] Endpoint Encryption
| {{dunno}}
| {{yes}}
| {{nodunno}}
| {{no}}
| {{no}}<ref>{{cite web|url=http://www.symantec.com/endpoint-encryption/system-requirements/|title=Endpoint Encryption Powered by PGP Technology - Symantec}}</ref>
| {{yes}}
| {{no}}<ref>{{cite web|url=https://www.broadcom.com/products/cybersecurity|title=Endpoint Encryption Powered by PGP Technology - Symantec}}</ref>
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
| {{dunno}}
|-
!{{Rh}}| Tcplay
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{yes}}
Line 1,296 ⟶ 1,121:
| {{no}}
| {{no}}
| {{yes}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| [[Trend Micro]] Endpoint Encryption
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
Line 1,310 ⟶ 1,131:
| {{no}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| [[TrueCrypt]]
| {{yes}}<ref name="play.google.com"/>
| {{yes}}
| {{yes}}
| {{no}}
| {{no}}<ref>[http://www.truecrypt.org/misc/freebsd] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used</ref>
| {{yes}}
| {{yes}}
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used</ref>
| {{no}}
| {{no}}
| {{no}}
| {{yes}}<ref name="play.google.com"/>
| {{yes}}
|-
!{{Rh}}| USBCrypt
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,331 ⟶ 1,151:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{dunno}}
|-
!{{Rh}}| [[VeraCrypt]]
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.sovworks.eds.android Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{yes}}
| {{yes}}<ref>https://apps.apple.com/de/app/disk-decipher/id516538625 Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{no}}
| {{yes}}
| {{yes}}
Line 1,344 ⟶ 1,161:
| {{no}}
| {{no}}
| {{no}}
| {{yes}}<ref>[https://play.google.com/store/apps/details?id=com.sovworks.eds.android] Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{yes}}<ref>[https://apps.apple.com/de/app/disk-decipher/id516538625] Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
|-
!{{Rh}}| CyberSafe Top Secret
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,355 ⟶ 1,171:
| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{yes}}
| {{dunno}}
|-class="sortbottom"
! Name
! [[Android (operating system)|Android]]
! [[Windows NT]]
! [[iOS]]
! [[Windows Mobile]] (incl. [[Pocket PC]])
! [[Mac OS X]]
! [[Linux]]
! [[FreeBSD]]
! [[LinuxOpenBSD]]
! [[Mac OS X]]
! [[NetBSD]]
! [[OpenBSD]]
! [[DragonFly BSD]]
! [[Android (operating system)|Android]]
! [[iOS]]
|}
 
==Features==
* '''Hidden containers''': Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)<ref>[http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm] Hidden containers description from Jetico (BestCrypt)</ref> can be created for [[deniable encryption]]. Note that some [[Block cipher modes of operation|modes of operation]] like CBC with a plain IV can be more prone to [[watermarking attack]]s than others.
* '''Pre-boot authentication''': Whether authentication can be required before booting the computer, thus allowing one to encrypt the [[boot disk]].
* '''[[Single sign-on]]''': Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing [[password fatigue]] and reducing the need to remember multiple passwords.
* '''Custom authentication''': Whether custom authentication mechanisms can be implemented with third-party applications.{{clarify|e.g. perhaps link to WP's article re: 1-time password (OTP) tokens? See Talk Page: someone else also was confused about exactly what this includes; pls give some examples & links.|date=January 2011}}
* '''Multiple keys''': Whether an encrypted volume can have more than one active [[Key (cryptography)|key]].
* '''Passphrase strengthening''': Whether [[key strengthening]] is used with plain text passwords to frustrate [[dictionary attack]]s, usually using [[PBKDF2]] or [[Argon2]].
* '''Hardware acceleration''': Whether dedicated [[cryptographic accelerator]] expansion cards can be taken advantage of.
* '''[[Trusted Platform Module]]''': Whether the implementation can use a TPM [[cryptoprocessor]].
Line 1,411 ⟶ 1,221:
|-
! ArchiCrypt Live
| {{yes}}<ref name="ArchiCrypt">Secret-containers and Camouflage files [http://www.archicrypt-shop.com/ArchiCrypt-Live.htm ArchiCrypt Live Description] {{Webarchive|url=https://web.archive.org/web/20110824163518/http://www.archicrypt-shop.com/ArchiCrypt-Live.htm |date=2011-08-24 }}</ref>
| {{no}}
| {{n/a}}
Line 1,434 ⟶ 1,244:
| {{yes}}<ref>Supported by the BestCrypt Volume Encryption software</ref>
|-
! [[BitArmor]] DataControl
| {{no}}
| {{yes}}
Line 1,475 ⟶ 1,285:
| {{n/a}}
| {{yes}}<ref name=cgd-paper>{{Cite journal |author=Roland C. Dowdeswell, John Ioannidis |title=The CryptoGraphic Disk Driver |journal=CGD Design Paper |url=http://www.imrryr.org/~elric/cgd/cgd.pdf |access-date=2006-12-24 }}</ref>
| {{yes}}<ref name=inside-cgd>{{cite web |author=Federico Biancuzzi |date=2005-12-21 |title=Inside NetBSD's CGD |work=interview with Roland Dowdeswell |url=http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 |publisher=ONLamp.com |access-date=2006-12-24 |archive-date=2007-09-29 |archive-url=https://web.archive.org/web/20070929091538/http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 |url-status=dead }}</ref>
| {{yes}}<ref name=cgd-paper/>
| {{no}}
Line 1,530 ⟶ 1,340:
| {{no}}
|-
! [[CrossCrypt]]
| {{no}}
| {{no}}
Line 1,590 ⟶ 1,400:
| {{dunno}}
|-
! [[Cryptomator]]
| {{no}}
| {{no}}
Line 1,647 ⟶ 1,457:
| {{yes}}<ref name=DiskCryptor>{{cite web |title=DiskCryptor Features |url=http://diskcryptor.net/wiki/Main_Page/en |access-date=2010-05-25 |url-status=dead |archive-url=https://web.archive.org/web/20100529120057/http://diskcryptor.net/wiki/Main_Page/en |archive-date=2010-05-29 }}</ref>
| {{no}}
| {{yes|Windows volumes on MBR and UEFI GPT drives, ReFs any FS supported by OS<ref>{{Cite web|url=https://github.com/DavidXanatos/DiskCryptor|title = DiskCryptor|website = [[GitHub]]|date = 10 February 2022}}</ref>}}
| {{yes}}<ref name=DiskCryptor/>
|-
Line 1,659 ⟶ 1,469:
| {{yes}}
| {{yes}}
| {{yes |NTFS, FAT32}}
| {{yes}}
|-
Line 1,671 ⟶ 1,481:
| {{yes}}
| {{partial|Partial}}<ref name=dm-crypt_tpm>{{cite web |title=cryptsetup Frequently Asked Questions |url=https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions |access-date=2016-01-07 }}</ref> {{r|group=Note|dm-cryptTPM}}
| {{yes|Any supported by OS}}
| {{yes}}
|-
! [http://www.securstar.biz DriveCrypt]
| {{yes}}<ref name=drivecrypt>{{cite web |title=DriveCrypt features |publisher=SecurStar GmbH |url=http://www.securstar.com/products_drivecrypt.php |access-date=2007-01-03 |archive-url=https://web.archive.org/web/20070101114008/http://www.securstar.com/products_drivecrypt.php |archive-date=2007-01-01 |url-status=dead }}</ref>
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{no}}
| {{yes|Any supported by OS}}
| {{yes}}
Line 1,711 ⟶ 1,509:
|-
! e-Capsule Private Safe
| {{yes}}<ref name=ps-mla>{{cite web |title=Multi level access with separate access credentials, each enabling a different set of functional or logical operations |publisher=EISST Ltd. |url=http://www.eisst.com/products/private_safe/compare/ |access-date=2007-07-25 |archive-date=2007-09-28 |archive-url=https://web.archive.org/web/20070928145451/http://www.eisst.com/products/private_safe/compare/ |url-status=dead }}</ref>
| {{no}}
| {{n/a}}
Line 1,832 ⟶ 1,630:
! Loop-AES
| {{no}}
| {{yes}}<ref name=loop-aes>{{cite web |author=Jari Ruusu |title=loop-AES README file |url=httphttps://loop-aes.sourceforge.net/loop-AES.README |access-date=2007-04-23 |archive-date=2023-08-23 |archive-url=https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README |url-status=dead }}</ref>
| {{dunno}}
| {{yes}}<ref name=loop-aes/>
Line 1,868 ⟶ 1,666:
! [[PGPDisk]]
| {{no}}
| {{yes}}<ref name=pgp-faq>{{cite web |title=PGP Whole Disk Encryption FAQ |publisher=PGP Corporation |url=http://www.pgp.com/products/wholediskencryption/faq.html |access-date=2006-12-24 |archive-date=2006-12-24 |archive-url=https://web.archive.org/web/20061224231228/http://www.pgp.com/products/wholediskencryption/faq.html |url-status=dead }}</ref>
| {{yes}}
| {{dunno}}
Line 2,129 ⟶ 1,927:
! Filesystems
! Two-factor authentication
|-
!ZzEnc
!No
!Yes
!Yes
!Yes
!Yes
!Yes
!No
!No
!Windows, Legacy BIOS & UEFI
!In UEFI with removable keys store on USB-flash
|}
{{Reflist|group=Note|refs=
Line 2,134 ⟶ 1,944:
<ref name=BitLockerFS>Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, [[Windows Vista]] and later are limited to be installable only on NTFS volumes</ref>
<ref name=dm-cryptTPM>An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the [[standard input]]</ref>
<ref name=TrueCryptMystery>The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. httphttps://www.zdnet.com/article/truecrypt-quits-inexplicable-7000029994/</ref>
]}}
 
Line 2,178 ⟶ 1,988:
| {{dunno}}
|-
! [[BitArmor]] DataControl
| {{no}}
| {{yes}}
Line 2,234 ⟶ 2,044:
| {{dunno}}
|-
! [[CrossCrypt]]
| {{no}}
| {{no}}
Line 2,328 ⟶ 2,138:
| {{yes}}
| {{yes}}<ref>yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/</ref>
| {{dunno}}
|-
! [http://www.securstar.de DriveCrypt]
| {{yes}}
| {{yes}}<ref name=drivecrypt/>
| {{yes}}<ref name=drivecrypt/>
| {{yes}}
| {{yes}}
| {{dunno}}
|-
Line 2,543 ⟶ 2,345:
| {{n/a}}
| {{no}}
| {{dunno}}
|-
! [https://www.winmagic.com/encryption-solutions/enterprise-encryption SecureDoc]
| {{yes}}<ref name=sdoc-faq />
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{dunno}}
|-
Line 2,643 ⟶ 2,437:
 
==Modes of operation==
{{detailsfurther|Disk encryption theory}}
 
Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
Line 2,687 ⟶ 2,481:
| {{dunno}}
|-
! [[BitArmor]] DataControl
| {{no}}
| {{yes}}
Line 2,743 ⟶ 2,537:
| {{dunno}}
|-
! [[CrossCrypt]]
| {{yes}}
| {{no}}
Line 2,780 ⟶ 2,574:
| {{no}}
| {{no}}
| {{yes}}<ref>{{cite web |title=CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+ |url=https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-2022_35fr.pdf }}</ref>
| {{no}}
| {{dunno}}
|-
Line 2,810 ⟶ 2,604:
| date = 2018-01-01 | access-date = 2018-05-08
}}</ref>}}
|-
! DriveCrypt
| {{dunno}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
|-
! [[DriveSentry]] GoAnywhere 2
Line 2,905 ⟶ 2,691:
| {{no}}
| {{yes}}
| {{yes|Yes, using <code>-a</code> option<ref>{{cite web
| {{dunno}}
| url = https://docs.freebsd.org/cgi/getmsg.cgi?fetch=326862+0+archive/2006/freebsd-current/20060611.freebsd-current
| title = Data authentication for geli(8) committed to HEAD.
| author = Pawel Jakub Dawidek
| date = 2006-06-08
| access-date = 2021-11-22
}}</ref>}}
|-
! Loop-AES
Line 3,130 ⟶ 2,922:
 
[[Category:Disk encryption|*]]
[[Category:SoftwareSecurity software comparisons|Disk encryption software]]
[[Category:Cryptographic software|*]]
[[Category:Cryptography lists and comparisons|Disk encryption software]]