Trusted Encryption - No Backdoors

Jetico provides trusted encryption with no backdoors. This content can be helpful to evaluate BestCrypt security, as well as develop your own customized BestCrypt modules.

Trusted Encryption with BestCrypt Development Kit

Since back in 2013, we have formally stated that BestCrypt, our encryption solution, has never included any backdoors or related weakness to the software, as well as publishing our source code for all encryption modules (BestCrypt Development Kit).

BestCrypt Development Kit (BDK) is a package of documentation and source codes for security analysts and third-party developers to:

  • Understand BestCrypt software architecture
  • Create plug-ins for BestCrypt (Encryption Algorithms or User Authentication modules)
  • Evaluate security level of the software (absence of 'backdoors' or potential weaknesses in the software)
  • Enhance existing security modules

BDK includes:

  • General architecture of the system
  • Functionality of BestCrypt Container Encryption modules
  • Functionality of security modules
  • Interfaces of security modules
  • Source codes of Encryption and Key Generation modules
  • Guide to write your own extension for BestCrypt Container Encryption
  • Guide to add or remove security modules

BDK contains source codes of version 8 of BestCrypt Container Encryption for Windows.

Download BestCrypt Development Kit

What is an Encryption Backdoor?

A backdoor is a built-in way of bypassing encryption, allowing a third-party to access personal data.

Think of a hotel. There are two types of key:

  • Guest key
    Each guest has a unique key to access his room. No other guest can access that room if not with the right key. Think of this as an encryption password.
  • Master key
    The hotel has a master key that acts as a key for every room. Think of this as a backdoor.

A piece of code that creates a vulnerability in the encryption software can serve as a backdoor. For anyone worried about backdoors hiding in our encryption software, Jetico has addressed that concern by opening the source codes of its encryption and key generation modules.

Related Sources

Since 1995, Jetico has been reliably serving your data protection needs. Founded in Finland, the privacy of our users is protected by Finnish laws.

Computer America interviewed Jetico CEO, Michael Waksman, about SSD, Bruce Schneier and encryption backdoors. Listen here (Starts @ 1 hr 5 min)