people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. It is used...
17 KB (2,194 words) - 10:17, 19 March 2025
Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). This article presents...
30 KB (3,772 words) - 11:25, 5 December 2024
Disk encryption software is a computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy...
9 KB (1,328 words) - 21:23, 5 December 2024
This is a technical feature comparison of different disk encryption software. Hidden containers: Whether hidden containers (an encrypted container (A)...
70 KB (2,834 words) - 03:57, 22 December 2024
Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/SSD) vendors, including: Hitachi, Integral Memory, iStorage Limited...
15 KB (1,788 words) - 05:38, 5 March 2025
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is...
25 KB (2,867 words) - 02:15, 6 April 2025
BitLocker (redirect from Bitlocker Drive Encryption)
experience—the user powers up and logs into Windows as usual. The key used for disk encryption is sealed (encrypted) by the TPM chip and will only be released to...
37 KB (3,534 words) - 03:51, 24 April 2025
Filesystem-level encryption, often called file-based encryption, FBE, or file/folder encryption, is a form of disk encryption where individual files or...
4 KB (493 words) - 02:23, 21 October 2024
Data security (section Disk encryption)
cyberattack or a data breach. Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk encryption typically takes form in...
13 KB (1,394 words) - 00:24, 24 March 2025
Linux Unified Key Setup (category Disk encryption)
The Linux Unified Key Setup (LUKS) is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux. LUKS implements...
14 KB (1,175 words) - 01:55, 8 August 2024
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
34 KB (3,645 words) - 17:52, 2 May 2025
complicated table indicating the encryption method, one could use the much simpler cipher disk. This made both encryption and decryption faster, simpler...
5 KB (647 words) - 22:52, 4 September 2021
VeraCrypt (category Disk encryption)
utility for on-the-fly encryption (OTFE). The software can create a virtual encrypted disk that works just like a regular disk but within a file. It can...
37 KB (3,218 words) - 10:14, 10 December 2024
Evil maid attack (section Full disk encryption systems)
via an external USB flash drive – and therefore bypassing TrueCrypt disk encryption. D. Defreez, a computer security professional, first mentioned the...
15 KB (1,715 words) - 21:03, 18 October 2024
operating system. With full disk encryption, the entire disk is encrypted (except for the bits necessary to boot or access the disk when not using an unencrypted...
10 KB (1,133 words) - 05:54, 19 April 2025
Database encryption can generally be defined as a process that uses an algorithm to transform data stored in a database into "cipher text" that is incomprehensible...
27 KB (3,212 words) - 02:34, 12 March 2025
Cold boot attack (redirect from Full memory encryption)
attacks. Since cold boot attacks target random-access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective...
38 KB (4,246 words) - 11:43, 3 November 2024
Pretty Good Privacy (redirect from Pgp encryption)
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing...
56 KB (6,196 words) - 05:15, 7 April 2025
Private Disk is a disk encryption application for the Microsoft Windows operating system, developed by Dekart SRL. It works by creating a virtual drive...
6 KB (562 words) - 11:54, 9 July 2024
Trusted Platform Module (section Disk encryption)
starts from a trusted combination of hardware and software and storing disk encryption keys. A TPM 2.0 implementation is part of the Windows 11 system requirements...
79 KB (6,593 words) - 00:12, 7 April 2025
FileVault (category Disk encryption)
FileVault is a disk encryption program in Mac OS X 10.3 Panther (2003) and later. It performs on-the-fly encryption with volumes on Mac computers. FileVault...
13 KB (1,538 words) - 15:30, 4 February 2025
PGPDisk (redirect from PGP Whole Disk Encryption)
PGP Virtual Disk is a disk encryption system that allows one to create a virtual encrypted disk within a file. Older versions for Windows NT were freeware...
816 bytes (100 words) - 19:33, 22 October 2020
authentication. Full disk encryption outside of the operating system level Encryption of temporary files Data at rest protection Encryption of cloud servers...
6 KB (628 words) - 11:00, 14 October 2024
CrossCrypt (section CD/DVD encryption)
files stored on them, making the encryption process seamless to the user. CrossCrypt is based on FileDisk, virtual disk driver for Windows NT/2000/XP that...
3 KB (283 words) - 01:43, 1 May 2025
TrueCrypt (category Disk encryption)
source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, encrypt a partition, or encrypt...
66 KB (6,514 words) - 12:10, 3 April 2025
live system or from backups and used to decrypt the databases. Disk encryption Encryption Hardware security module "SQL Server TDE vs CLE". Retrieved 2017-06-02...
6 KB (639 words) - 12:21, 20 April 2025
Computer data storage (redirect from Data disk)
volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices. Hardware memory encryption is available in...
57 KB (6,534 words) - 20:57, 6 May 2025
media or in computer memory. Disk encryption Disk encryption theory Disk encryption software Comparison of disk encryption software BitLocker Encrypting...
18 KB (1,725 words) - 19:07, 26 March 2025
implementation, such as in the Spectre exploit. Disk encryption hardware Hardware-based full disk encryption Hardware security module Intel® 64 and IA-32...
15 KB (1,245 words) - 03:49, 12 July 2024
encryption of data may occur at different hardware levels. Array controller based encryption describes the encryption of data occurring at the disk array...
6 KB (666 words) - 19:57, 25 June 2024