Samiksha Jaiswal (Editor)

BestCrypt

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit
Developer(s)
  
Jetico Inc, Oy

Size
  
5.6–52.3 MB

Initial release
  
1995; 22 years ago (1995)

Stable release
  
9.03.1 / September 29, 2016; 5 months ago (2016-09-29)

Operating system
  
Windows 9xWindows 2000 and later (including Windows Server)OS X 10.6 or laterLinux 2.6 or later (including Android)

Available in
  
English, Arabic, Chinese simplified, Czech, Dutch, Persian, French, German, Italian, Latvian, Polish, Russian, Serbian, Spanish, Turkish

BestCrypt is a commercial disk encryption app for Windows, Linux and OS X, developed by Jetico Inc, Oy. BestCrypt comes in two editions: Volume Encryption edition, which encrypts entire disk volumes; and Container Encryption edition, which encrypts virtual disks stored as computer files. It also provides the complimentary data erasure utility BCWipe.

Contents

Cryptographic algorithms

BestCrypt supports a wide variety of block cipher algorithms including AES, Serpent, Blowfish, Twofish, DES, Triple DES, GOST 28147-89. All ciphers support CBC and LRW modes of operation while AES, Twofish and Serpent also support XTS mode.

Features

  • Create and mount a virtual drive encrypted using AES, Blowfish, Twofish, CAST-128 and various other encryption methods. BestCrypt v.8 and higher can alternatively mount a subfolder on a NTFS disk instead of a drive. Encrypted virtual disk images are compatible across Windows, Linux and Mac OS X.
  • Encrypt a set of files into a single, self-extracting archive.
  • Transparently encrypt entire partitions or volumes together with pre-boot authentication for encrypted boot partitions.
  • Two-factor authentication.
  • Support for size-efficient Dynamic Containers with the Smart Free Space Monitoring technology.
  • Hardware accelerated encryption.
  • Anti-keylogging facilities to protect container and volume passwords.
  • Data erasure utility BCWipe to erase unprotected copies of data to complement encryption.
  • Secret sharing and Public Key authentication methods in addition to basic password-based authentication.
  • References

    BestCrypt Wikipedia


    Similar Topics