Table of contents Up Previous Next Glossary Home   Benefits of BestCrypt  

  • Strong Security

    Once written to a BestCrypt file (container), data is never stored in an 'open' condition. Yet BestCrypt's smooth operation and complete transparency allows instant data access to any authorized user.

    BestCrypt's advanced data encryption and authorization technology provides a new level of security with standard, proven and published cryptographic algorithms, safe password input and transparent encryption.

  • Proven Encryption Methods

    It is very important for a trusted security system to use open published encryption methods to allow professionals to verify its reliability. The BestCrypt system allows users to choose any of algorithms listed below to protect sensitive data as well as to use all algorithms simultaneously.

    BestCrypt utilizes the following encryption algorithms:

    Encryption Algorithm Key Size (bits) Block Size (bits) Operating mode Notes
    Rijndael 256 128 CBC AES winner
    Blowfish 448, 256,128 64 CBC  
    Twofish 256 128 CBC AES candidate
    GOST 28147-89 256 64 CFB Russian Federal Standard
    IDEA 128 64 CBC  
    CAST-128 128 64 CBC RFC-2144
    Triple DES 168 64 CBC US Federal Standard FIPS 46-3
    DES 56(*) 64 CBC US Federal Standard FIPS 46
    (*) Note: US Federal Standard DES is implemented for compatibility reasons only. DES usage is strongly discouraged due to insufficient key length.
  • Linux and Windows compatibility

    BestCrypt for Linux uses the same container format as BestCrypt v6 and newer for Windows. Containers, created and used by BestCrypt for Linux are accessible under Windows OSes. See also: container format considerations.

  • Versatile functions

    In addition to comprehensive encrypted storage BestCrypt software offers wide range of security enhancements and handy features:

  • Using in Network environment

    BestCrypt software can use any network drive for creating and accessing file-containers. This network drive may be shared by computer with any operating system, for example UNIX-like operating systems (OSF/1, LINUX, BSD, SunOS, AIX and others), Novell, Windows 2000/NT, Windows Me/98/95, Windows 3.xx and others.

    BestCrypt virtual drives look like usual local drives and any software or operating system utility will work with these virtual drives in the usual way. As the example of this feature, BestCrypt virtual drives may be shared in a network in the same way as the other local drives on computer.

  • Easy to Install and Use

    BestCrypt is easy to use. You need only enter the appropriate password. After password verification, access and use of the encrypted data become transparent for any application. No further action is needed to keep new or altered data in the secure encrypted form.

 

  Table of contents Up Previous Next Glossary Home   Top