• Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). This article presents...
    30 KB (3,772 words) - 11:25, 5 December 2024
  • people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. It is used...
    17 KB (2,194 words) - 00:15, 20 June 2025
  • Disk encryption software is a computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy...
    9 KB (1,328 words) - 21:23, 5 December 2024
  • This is a technical feature comparison of different disk encryption software. Hidden containers: Whether hidden containers (an encrypted container (A)...
    70 KB (2,842 words) - 09:05, 27 May 2025
  • Watermarking attack (category Disk encryption)
    on disk encryption methods where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryption key...
    4 KB (456 words) - 13:45, 1 March 2024
  • GBDE, standing for GEOM Based Disk Encryption, is a block device-layer disk encryption system written for FreeBSD, initially introduced in version 5.0...
    4 KB (483 words) - 15:23, 28 June 2023
  • In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is...
    29 KB (3,236 words) - 00:32, 1 June 2025
  • FileVault (category Disk encryption)
    FileVault is a disk encryption program in Mac OS X 10.3 Panther (2003) and later. It performs on-the-fly encryption with volumes on Mac computers. FileVault...
    13 KB (1,538 words) - 15:30, 4 February 2025
  • Thumbnail for Block cipher mode of operation
    XTS) and wide-block encryption modes (CMC and EME) are designed to securely encrypt sectors of a disk (see disk encryption theory). Many modes use an...
    52 KB (5,828 words) - 12:52, 13 June 2025
  • Thumbnail for Encryption
    In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
    34 KB (3,645 words) - 22:26, 22 June 2025
  • media or in computer memory. Disk encryption Disk encryption theory Disk encryption software Comparison of disk encryption software BitLocker Encrypting...
    18 KB (1,725 words) - 19:07, 26 March 2025
  • and encryption theory, see disk encryption theory. The encryption of data can take place in many points in a storage network. The point of encryption may...
    6 KB (666 words) - 19:57, 25 June 2024
  • Dm-crypt (category Disk encryption)
    superuser. The fact that disk encryption (volume encryption) software like dm-crypt only deals with transparent encryption of abstract block devices...
    12 KB (1,112 words) - 19:55, 3 December 2024
  • Thumbnail for Coding theory
    Coding theory is the study of the properties of codes and their respective fitness for specific applications. Codes are used for data compression, cryptography...
    27 KB (3,712 words) - 08:44, 19 June 2025
  • then some interesting new operation modes become possible. The disk encryption theory article describes some of these modes. Block ciphers traditionally...
    51 KB (6,569 words) - 08:42, 11 April 2025
  • Thumbnail for End-to-end encryption
    disk encryption is also distinct from E2EE because it does not prevent the service provider from viewing the information, as they have the encryption...
    30 KB (3,142 words) - 20:08, 28 April 2025
  • Thumbnail for Advanced Encryption Standard
    Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]), is a specification for the encryption of electronic...
    50 KB (5,679 words) - 15:35, 15 June 2025
  • TrueCrypt (category Disk encryption)
    source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, encrypt a partition, or encrypt...
    66 KB (6,485 words) - 13:33, 15 May 2025
  • Thumbnail for Cryptography
    Cryptography prior to the modern age was effectively synonymous with encryption, converting readable information (plaintext) to unintelligible nonsense...
    100 KB (11,007 words) - 01:11, 20 June 2025
  • Thumbnail for Hard disk drive
    A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using...
    139 KB (14,137 words) - 13:33, 15 June 2025
  • "Probabilistic encryption & how to play mental poker keeping secret all partial information". Proceedings of the fourteenth annual ACM symposium on Theory of computing...
    60 KB (7,783 words) - 17:58, 20 June 2025
  • Database encryption can generally be defined as a process that uses an algorithm to transform data stored in a database into "cipher text" that is incomprehensible...
    27 KB (3,212 words) - 02:34, 12 March 2025
  • Thumbnail for Cipher
    In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...
    18 KB (2,152 words) - 12:31, 20 June 2025
  • TrueCrypt version history (category Disk encryption)
    Clemens (2005-07-18). "New Methods in Hard Disk Encryption" (PDF). Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology...
    10 KB (177 words) - 15:44, 1 August 2024
  • Thumbnail for Computer virus
    signature detection is to use simple encryption to encipher (encode) the body of the virus, leaving only the encryption module and a static cryptographic...
    92 KB (9,552 words) - 17:59, 5 June 2025
  • Thumbnail for Vigenère cipher
    to note that traditionally spaces and punctuation are removed prior to encryption and reintroduced afterwards. In this example the tenth letter of the plaintext...
    45 KB (6,033 words) - 08:10, 12 June 2025
  • Thumbnail for One-time pad
    the OTP the only known encryption system that is mathematically proven to be unbreakable under the principles of information theory. Digital versions of...
    55 KB (7,403 words) - 09:03, 8 June 2025
  • Thumbnail for Caesar cipher
    the parties had access to far better encryption techniques (Karim himself used PGP for data storage on computer disks), they chose to use their own scheme...
    19 KB (2,078 words) - 22:30, 21 June 2025
  • Communications Security Establishment • Communication Theory of Secrecy Systems • Comparison of disk encryption software • Comparison of SSH clients • Completeness...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Ext4 (category Disk file systems)
    journal is one of the most used files of the disk. This feature has a side benefit: it can safely avoid a disk I/O wait during journaling, improving performance...
    38 KB (3,877 words) - 10:53, 27 April 2025