- BestCrypt
Infobox Software
name = BestCrypt
caption =
author =
developer = Jetico, Inc.
released =
latest release version = 8.05.3
latest release date = 2008-07-22
latest preview version =
latest preview date =
operating system =Windows Vista ,Windows XP ,Windows 9x ,Windows NT ,Linux 2.4+,MS-DOS
platform =
language =
genre =Disk encryption software
license =
website = [http://www.jetico.com/bcrypt8.htm www.jetico.com]BestCrypt is a commercial
disk encryption software produced byJetico for Windows andLinux . BestCrypt is among the most popular commercial disk encryption solutions available.Fact|date=February 2007 Dating back to 1993, it is also one of the oldest.cite web |publisher=Jetico |title=Jetico Company Info |url=http://www.jetico.com/company.htm |accessdate=2007-01-05 ]The BestCrypt Linux version, including the free 30-day trial, comes with full
source code , although not licensed under anopen source license. The source code of security-related parts of the Windows version is also available with the BestCryptsoftware development kit , though this does not include "all" of the Windows source code, and was done in order to give third parties a chance to review the code for security.BestCrypt versions prior to 7.10 (or version 1.3 for Linux) suffered from a
watermarking attack vulnerability defeating thedeniable encryption features of the product. Within two weeks of the initial disclosure of the flaw on 2003-10-23, Jetico released fixed versions of BestCrypt addressing this issue.cite paper
author = Chiriliuc, Adal
title = BestCrypt IV generation flaw
date = 2003-10-23
url = http://adal.chiriliuc.com/bc_iv_flaw.php
accessdate = 2006-11-03]The version for MS-DOS is
freeware .Features
Notable features of BestCrypt include:
* Whole-disk encryption (including the boot partition of Windows).
* A wide choice of encryption algorithms, including AES, Blowfish,Twofish , GOST, IDEA,CAST-128 ,Triple DES and DES. Support for new algorithms can be added by third parties by writing aplugin .
*Deniable encryption through the use of hidden containers within existing encrypted partitions, analogous to TrueCrypt. Hidden containers are virtually unlimited in size and work with all supported file systems.
*Swap space encryption.
* Interoperability between different operating systems. Runs under Linux 2.4 and 2.6, theWindows NT family, as well as olderWindows 9x andMS-DOS .ee also
*
Full disk encryption
*Disk encryption software
*Comparison of disk encryption software
*OTFE External links
* [http://www.jetico.com/ Jetico homepage]
* [http://www.jetico.com/bcrypt8.htm BestCrypt 8 for Windows home page]
* [http://www.jetico.com/linux.htm BestCrypt Linux home page]References
* cite journal
last = Bauer
first = Mick
authorlink =
title = BestCrypt: Cross-Platform Filesystem Encryption
journal =Linux Journal
volume = 2002
issue = 98
pages = page 9
publisher = Specialized Systems Consultants
date = 2002-06-01
url = http://www.linuxjournal.com/article/5938
id = ISSN 1075-3583
accessdate = 2006-11-03
* cite web
title = Bestcrypt for Linux documentation
publisher = Jetico
date = 2005-05-17
url = http://www.jetico.com/linux/bcrypt-help/index.htm
accessdate = 2006-11-03
Wikimedia Foundation. 2010.