Strong Security
Once written to a BestCrypt file (container), data is never stored in an 'open' condition. Yet
BestCrypt's smooth operation and complete transparency allows instant data access to any authorized
user.
BestCrypt's advanced data encryption and authorization technology provides a new level of security
with standard, proven and published cryptographic algorithms, safe password input and transparent
encryption.
-
It is very important for a trusted security system to use open published encryption methods to allow
professionals to verify its reliability.
The BestCrypt system allows users to choose any of algorithms listed below to protect sensitive
data as well as to use all algorithms simultaneously.
BestCrypt utilizes the following encryption algorithms:
Encryption Algorithm |
Key Size (bits) |
Block Size (bits) |
Operating mode |
Notes |
Rijndael |
256 |
128 |
CBC |
AES winner |
Blowfish |
448, 256,128 |
64 |
CBC |
|
Twofish |
256 |
128 |
CBC |
AES candidate |
GOST 28147-89 |
256 |
64 |
CFB |
Russian Federal Standard |
IDEA |
128 |
64 |
CBC |
|
CAST-128 |
128 |
64 |
CBC |
RFC-2144 |
Triple DES |
168 |
64 |
CBC |
US Federal Standard FIPS 46-3 |
DES |
56(*) |
64 |
CBC |
US Federal Standard FIPS 46 |
(*) Note: US Federal Standard DES is implemented
for compatibility reasons only. DES usage is strongly
discouraged due to insufficient key length.
|
Linux and Windows compatibility
BestCrypt for Linux uses the same container format as BestCrypt v6 and newer for Windows.
Containers, created and used by BestCrypt for Linux are accessible under Windows OSes. See also:
container format considerations.
Versatile functions
In addition to comprehensive encrypted storage BestCrypt software offers wide range of security
enhancements and handy features:
Using in Network environment
BestCrypt software can use any network drive for creating and accessing file-containers. This network
drive may be shared by computer with any operating system, for example UNIX-like operating systems
(OSF/1, LINUX, BSD, SunOS, AIX and others), Novell, Windows 2000/NT, Windows Me/98/95, Windows 3.xx
and others.
BestCrypt virtual drives look like usual local drives and any software or operating system utility will
work with these virtual drives in the usual way. As the example of this feature, BestCrypt virtual drives
may be shared in a network in the same way as the other local drives on computer.
Easy to Install and Use
BestCrypt is easy to use. You need only enter the appropriate password. After password verification,
access and use of the encrypted data become transparent for any application. No further action is needed
to keep new or altered data in the secure encrypted form.