Comparison of disk encryption software: Difference between revisions

Content deleted Content added
Layering: Annotate columns
Features: column annotations
Line 90:
 
== Features ==
* '''Hidden containers''': Whether hidden containers can be created for [[deniable encryption]]. Note that some modes of operation can be more prone to [[watermarking attack]]s than others.
* '''Pre-boot authentication''': Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
* '''Custom authentication''': Whether arbitrary byte strings can be supplied as keys programmatically, that can be coupled with third party authentication mechanisms.
* '''Multiple keys''': Whether an encrypted volumes can have more than one active keys.
* '''Passphrase strengthening''': Whether [[key strengthening]] is used with plaintext passwords to frustrate [[dictionary attack]]s.
* '''Hardware acceleration''': Whether dedicated cryptography acceleration extension cards can be taken advantage of.
 
{| class="wikitable" style="width: 100%; text-align: center; font-size: smaller; table-layout: fixed;"
|-
Line 97 ⟶ 104:
! Custom authentication
! Multiple keys
! [[Passphrase strengthening]]
! Hardware acceleration
|-