Hardware-based full disk encryption: Difference between revisions

Content deleted Content added
m Enclosed hard disk drive FDE: Copy edit ▸ Diction.
Tags: Mobile edit Mobile app edit Android app edit App select source
m Characteristics: Copy edit ▸ Grammar ▸ Unwarranted cap.
Tags: Mobile edit Mobile app edit Android app edit App select source
Line 43:
Hardware-based encryption when built into the drive or within the drive enclosure is notably transparent to the user. The drive, except for bootup authentication, operates just like any drive, with no degradation in performance. There is no complication or performance overhead, unlike [[disk encryption software]], since all the encryption is invisible to the [[operating system]] and the host [[Central processing unit|computer's processor]].
 
The two main use cases are [[Data at Restrest]] protection, and Cryptographic Disk Erasure.
 
For Data at Rest protection a computer or laptop is simply powered off. The disk now self-protects all the data on it. The data is safe because all of it, even the OS, is now encrypted, with a secure mode of [[Advanced Encryption Standard|AES]], and locked from reading and writing. The drive requires an authentication code which can be as strong as 32 bytes (2^256) to unlock.