BestCrypt, developed b
Jetico is a commercial
disk encryption app available for
Windows
Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for ...
,
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which i ...
,
macOS
macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac (computer), Mac computers. Within the market of ...
and
Android
Android may refer to:
Science and technology
* Android (robot), a humanoid robot or synthetic organism designed to imitate a human
* Android (operating system), Google's mobile operating system
** Bugdroid, a Google mascot sometimes referred to ...
.
BestCrypt comes in two editions: BestCrypt Volume Encryption to encrypt entire
disk volumes; BestCrypt Container Encryption to encrypt
virtual disks stored as computer files.
BestCrypt also provides the complimentary
data erasure
Data erasure (sometimes referred to as data clearing, data wiping, or data destruction) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media ...
utility
BCWipe.
Cryptographic Algorithms
BestCrypt supports a wide variety of block cipher algorithms including
AES
AES may refer to:
Businesses and organizations Companies
* AES Corporation, an American electricity company
* AES Data, former owner of Daisy Systems Holland
* AES Eletropaulo, a former Brazilian electricity company
* AES Andes, formerly AES Gener ...
,
Serpent
Serpent or The Serpent may refer to:
* Snake, a carnivorous reptile of the suborder Serpentes
Mythology and religion
* Sea serpent, a monstrous ocean creature
* Serpent (symbolism), the snake in religious rites and mythological contexts
* Serp ...
,
Blowfish
Tetraodontidae is a family of primarily marine and estuarine fish of the order Tetraodontiformes. The family includes many familiar species variously called pufferfish, puffers, balloonfish, blowfish, blowies, bubblefish, globefish, swellf ...
,
Twofish
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Two ...
,
DES
Des is a masculine given name, mostly a short form (hypocorism) of Desmond (name), Desmond. People named Des include:
People
* Des Buckingham, English football manager
* Des Corcoran, (1928–2004), Australian politician
* Des Dillon (disambig ...
,
Triple DES
In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data Encryption Stand ...
,
GOST 28147-89
GOST (russian: ГОСТ) refers to a set of international technical standards maintained by the ''Euro-Asian Council for Standardization, Metrology and Certification (EASC)'', a regional standards organization operating under the auspices of th ...
. All ciphers support
CBC and
LRW modes of operation while AES, Twofish and Serpent also support
XTS mode.
Features
* Create and mount a
virtual drive
Virtual disk and virtual drive are software components that emulate an actual disk storage device.
Virtual disks and virtual drives are common components of virtual machines in hardware virtualization, but they are also widely used for various p ...
encrypted using
AES
AES may refer to:
Businesses and organizations Companies
* AES Corporation, an American electricity company
* AES Data, former owner of Daisy Systems Holland
* AES Eletropaulo, a former Brazilian electricity company
* AES Andes, formerly AES Gener ...
,
Blowfish
Tetraodontidae is a family of primarily marine and estuarine fish of the order Tetraodontiformes. The family includes many familiar species variously called pufferfish, puffers, balloonfish, blowfish, blowies, bubblefish, globefish, swellf ...
,
Twofish
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Two ...
,
CAST-128
In cryptography, CAST-128 (alternatively CAST5) is a symmetric-key block cipher used in a number of products, notably as the default cipher in some versions of GPG and PGP. It has also been approved for Government of Canada use by the Communi ...
and various other encryption methods. BestCrypt v.8 and higher can alternatively mount a subfolder on a
NTFS
New Technology File System (NTFS) is a proprietary journaling file system developed by Microsoft. Starting with Windows NT 3.1, it is the default file system of the Windows NT family. It superseded File Allocation Table (FAT) as the preferred f ...
disk instead of a drive. Encrypted virtual disk images are compatible across Windows, Linux and Mac OS X.
* Encrypt a set of files into a single, self-extracting archive.
* Transparently encrypt entire partitions or volumes together with pre-boot authentication for encrypted boot partitions.
*
Two-factor authentication
Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting ...
.
* Support for size-efficient Dynamic Containers with the Smart Free Space Monitoring technology.
* Hardware accelerated encryption.
* Anti-keylogging facilities to protect container and volume passwords.
*
Data erasure
Data erasure (sometimes referred to as data clearing, data wiping, or data destruction) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media ...
utility
BCWipe to erase unprotected copies of data to complement encryption.
*
Secret sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals combine th ...
and
Public Key
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic a ...
authentication methods in addition to basic password-based authentication.
BestCrypt Volume Encryption v.3.png, BestCrypt Volume Encryption v.3 main window
BestCrypt for Mac.png, BestCrypt for Mac v.1.3 control panel
See also
*
Comparison of disk encryption software
This is a technical feature comparison of different disk encryption software.
Background information
Operating systems
Features
* Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) ...
References
Further reading
*
*
External links
* {{Official, https://www.jetico.com/data-encryption
Disk encryption
Cryptographic software