BestCrypt, developed b
Jetico is a commercial
disk encryption app available for
Windows
Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
,
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
,
macOS
macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
and
Android.
BestCrypt comes in two editions: BestCrypt Volume Encryption to encrypt entire
disk volumes; BestCrypt Container Encryption to encrypt
virtual disks stored as computer files.
BestCrypt also provides the complimentary
data erasure
Data erasure (sometimes referred to as data clearing, data wiping, or data destruction) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media b ...
utility
BCWipe.
Cryptographic Algorithms
BestCrypt supports a wide variety of block cipher algorithms including
AES,
Serpent
Serpent or The Serpent may refer to:
* Snake, a carnivorous reptile of the suborder Serpentes
Mythology and religion
* Sea serpent, a monstrous ocean creature
* Serpent (symbolism), the snake in religious rites and mythological contexts
* Serp ...
,
Blowfish
Tetraodontidae is a family of primarily marine and estuarine fish of the order Tetraodontiformes. The family includes many familiar species variously called pufferfish, puffers, balloonfish, blowfish, blowies, bubblefish, globefish, swellfis ...
,
Twofish
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twof ...
,
DES
Des is a masculine given name, mostly a short form (hypocorism) of Desmond. People named Des include:
People
* Des Buckingham, English football manager
* Des Corcoran, (1928–2004), Australian politician
* Des Dillon (disambiguation), sever ...
,
Triple DES
In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data Encryption Standa ...
,
GOST 28147-89. All ciphers support
CBC and
LRW LRW may refer to:
* Liskov-Rivest-Wagner, in cryptography
* Lifetime Real Women, US television channel
* Little Rock West High School, school in Arkansas
* Waco LRW, a military glider airplane
{{dab ...
modes of operation while AES, Twofish and Serpent also support
XTS mode.
Features
* Create and mount a
virtual drive
Virtual disk and virtual drive are software components that emulate an actual disk storage device.
Virtual disks and virtual drives are common components of virtual machines in hardware virtualization, but they are also widely used for various pu ...
encrypted using
AES,
Blowfish
Tetraodontidae is a family of primarily marine and estuarine fish of the order Tetraodontiformes. The family includes many familiar species variously called pufferfish, puffers, balloonfish, blowfish, blowies, bubblefish, globefish, swellfis ...
,
Twofish
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twof ...
,
CAST-128
In cryptography, CAST-128 (alternatively CAST5) is a symmetric-key block cipher used in a number of products, notably as the default cipher in some versions of GPG and PGP. It has also been approved for Government of Canada use by the Communic ...
and various other encryption methods. BestCrypt v.8 and higher can alternatively mount a subfolder on a
NTFS
New Technology File System (NTFS) is a proprietary journaling file system developed by Microsoft. Starting with Windows NT 3.1, it is the default file system of the Windows NT family. It superseded File Allocation Table (FAT) as the preferred fil ...
disk instead of a drive. Encrypted virtual disk images are compatible across Windows, Linux and Mac OS X.
* Encrypt a set of files into a single, self-extracting archive.
* Transparently encrypt entire partitions or volumes together with pre-boot authentication for encrypted boot partitions.
*
Two-factor authentication
Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting ...
.
* Support for size-efficient Dynamic Containers with the Smart Free Space Monitoring technology.
* Hardware accelerated encryption.
* Anti-keylogging facilities to protect container and volume passwords.
*
Data erasure
Data erasure (sometimes referred to as data clearing, data wiping, or data destruction) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media b ...
utility
BCWipe to erase unprotected copies of data to complement encryption.
*
Secret sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals combine th ...
and
Public Key
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
authentication methods in addition to basic password-based authentication.
BestCrypt Volume Encryption v.3.png, BestCrypt Volume Encryption v.3 main window
BestCrypt for Mac.png, BestCrypt for Mac v.1.3 control panel
See also
*
Comparison of disk encryption software
This is a technical feature comparison of different disk encryption software.
Background information
Operating systems
Features
* Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) ...
References
Further reading
*
*
External links
* {{Official, https://www.jetico.com/data-encryption
Disk encryption
Cryptographic software