Hubbry Logo
BestCryptBestCryptMain
Open search
BestCrypt
Community hub
BestCrypt
logo
7 pages, 0 posts
0 subscribers
Be the first to start a discussion here.
Be the first to start a discussion here.
Contribute something
BestCrypt
from Wikipedia
BestCrypt
DeveloperJetico Inc. Oy
Initial release1995; 31 years ago (1995)[1]
Stable release
9.08.4 / May 25, 2023; 2 years ago (2023-05-25)
Operating system
Size5.6–52.3 MB
Available inEnglish, Arabic, Chinese simplified, Czech, Dutch, Persian, French, German, Italian, Latvian, Polish, Russian, Serbian, Spanish, Turkish
TypeDisk encryption software
LicenseTrialware
Websitewww.jetico.com/data-encryption

BestCrypt, developed by Jetico, is a commercial disk encryption app available for Windows, Linux, macOS and Android.[3]

BestCrypt comes in two editions: BestCrypt Volume Encryption to encrypt entire disk volumes;[4] BestCrypt Container Encryption to encrypt virtual disks stored as computer files.[5]

BestCrypt also provides the complimentary data erasure utility BCWipe.[6]

Cryptographic Algorithms

[edit]

BestCrypt supports a wide variety of block cipher algorithms including AES, Serpent, Blowfish, Twofish, DES, Triple DES, GOST 28147-89. All ciphers support CBC and LRW modes of operation while AES, Twofish and Serpent also support XTS mode.

Features

[edit]
  • Create and mount a virtual drive encrypted using AES, Blowfish, Twofish, CAST-128[7] and various other encryption methods. BestCrypt v.8 and higher can alternatively mount a subfolder on a NTFS disk instead of a drive. Encrypted virtual disk images are compatible across Windows, Linux and Mac OS X.
  • Encrypt a set of files into a single, self-extracting archive.
  • Transparently encrypt entire partitions or volumes together with pre-boot authentication for encrypted boot partitions.
  • Two-factor authentication.
  • Support for size-efficient Dynamic Containers with the Smart Free Space Monitoring technology.[8]
  • Hardware accelerated encryption.
  • Anti-keylogging facilities to protect container and volume passwords.
  • Data erasure utility BCWipe to erase unprotected copies of data to complement encryption.
  • Secret sharing and Public Key authentication methods in addition to basic password-based authentication.


See also

[edit]

References

[edit]

Further reading

[edit]
[edit]
Revisions and contributorsEdit on WikipediaRead on Wikipedia
Add your contribution
Related Hubs
Contribute something
User Avatar
No comments yet.