Trusted Encryption - No Backdoors
Trusted Encryption with BestCrypt Development Kit
Since back in 2013, we have formally stated that BestCrypt, our encryption solution, has never included any backdoors or related weakness to the software, as well as publishing our source code for all encryption modules (BestCrypt Development Kit).
BestCrypt Development Kit (BDK) is a package of documentation and source codes for security analysts and third-party developers to:
- Understand BestCrypt software architecture
- Create plug-ins for BestCrypt (Encryption Algorithms or User Authentication modules)
- Evaluate security level of the software (absence of 'backdoors' or potential weaknesses in the software)
- Enhance existing security modules
- General architecture of the system
- Functionality of BestCrypt Container Encryption modules
- Functionality of security modules
- Interfaces of security modules
- Source codes of Encryption and Key Generation modules
- Guide to write your own extension for BestCrypt Container Encryption
- Guide to add or remove security modules
BDK contains source codes of version 8 of BestCrypt Container Encryption for Windows.
A backdoor is a built-in way of bypassing encryption, allowing a third-party to access personal data.
Think of a hotel. There are two types of key:
- Guest key
Each guest has a unique key to access his room. No other guest can access that room if not with the right key. Think of this as an encryption password.
- Master key
The hotel has a master key that acts as a key for every room. Think of this as a backdoor.
A piece of code that creates a vulnerability in the encryption software can serve as a backdoor. For anyone worried about backdoors hiding in our encryption software, Jetico has addressed that concern by opening the source codes of its encryption and key generation modules.
Since 1995, Jetico has been reliably serving your data protection needs. Founded in Finland, the privacy of our users is protected by Finnish laws.
Computer America interviewed Jetico CEO, Michael Waksman, about SSD, Bruce Schneier and encryption backdoors. Listen here (Starts @ 1 hr 5 min)