Software:BestCrypt

From HandWiki
Short description: Commercial disk encryption app available for Windows, Linux, macOS and Android
BestCrypt
BestCrypt v.9 logo.png
BestCrypt for Windows v.9.png
BestCrypt for Windows v9.0
Developer(s)Jetico Inc. Oy
Initial release1995; 29 years ago (1995)[1]
Stable release
9.08.4 / May 25, 2023; 8 months ago (2023-05-25)
Operating system
Size5.6–52.3 MB
Available inEnglish, Arabic, Chinese simplified, Czech, Dutch, Persian, French, German, Italian, Latvian, Polish, Russian, Serbian, Spanish, Turkish
TypeDisk encryption software
LicenseTrialware
Websitewww.jetico.com/data-encryption

BestCrypt, developed by Jetico, is a commercial disk encryption app available for Windows, Linux, macOS and Android.[3]

BestCrypt comes in two editions: BestCrypt Volume Encryption to encrypt entire disk volumes;[4] BestCrypt Container Encryption to encrypt virtual disks stored as computer files.[5]

BestCrypt also provides the complimentary data erasure utility BCWipe.[6]

Cryptographic Algorithms

BestCrypt supports a wide variety of block cipher algorithms including AES, Serpent, Blowfish, Twofish, DES, Triple DES, GOST 28147-89. All ciphers support CBC and LRW modes of operation while AES, Twofish and Serpent also support XTS mode.

Features

  • Create and mount a virtual drive encrypted using AES, Blowfish, Twofish, CAST-128[7] and various other encryption methods. BestCrypt v.8 and higher can alternatively mount a subfolder on a NTFS disk instead of a drive. Encrypted virtual disk images are compatible across Windows, Linux and Mac OS X.
  • Encrypt a set of files into a single, self-extracting archive.
  • Transparently encrypt entire partitions or volumes together with pre-boot authentication for encrypted boot partitions.
  • Two-factor authentication.
  • Support for size-efficient Dynamic Containers with the Smart Free Space Monitoring technology.[8]
  • Hardware accelerated encryption.
  • Anti-keylogging facilities to protect container and volume passwords.
  • Data erasure utility BCWipe to erase unprotected copies of data to complement encryption.
  • Secret sharing and Public Key authentication methods in addition to basic password-based authentication.


See also

References

Further reading

External links