What are the different types of disk encryption software?
Disk Encryption Software is a full disk encryption method where different software types implement different features and strategies for encryption of the entire disk unit known as the FDE encryption (FDE). Between different methods, some FDE software will require the use of separate hardware, either to unlock the unit or save encryption keys or in some cases. Another FDE software can unlock the disk at a time when the user logs in to the computer, while others will not even introduce the computer operating system. Other types are distinguished in the way they process the format of the disk and the way in which encryption is generated from the disk structure.
Some implementations of the disk encryption software have a denial encryption. Here the data are nested where lower levels can be denied by existence. If the user is obliged to give up the password for any reason, you can only approach certain data such as operating system files, programs or data that the userHe decided, there is no secret. The user shows compliance with the regulations by giving up the password and seemingly by unlocking the disk, but the actual secret data remain hidden under the next password that remains secret.
In many cases where this plausible deniability is used, the software creates something like volume. The main disk partition is loaded with one password, running the operating system and software, while the other, invisible disk partition is accessible only with the other password. Of course, this method works well only if the attacker is unable to see any distinguishing characteristics of the basic, encrypted data structure. To do this, the software leaves no brands lying around to indicate whether disk encryption is used. For the external observer, the data seems to be random and uninteresting unless the key to Unlock is known.
some disk encryption software is designed soY supported or even required other hardware devices that are used to unlock the disk. One such method is the use of expansion cards with another processor for processing encryption and decrypting data on the unit. You need to insert further hardware, such as smart cards or universal serial bus (USB) Dongle, to provide the key to unlock the disc. Many of these hardware supplements adhere to the specification of the trusted platform module (TPM), but only some types of disk encryption software fully implement TPM.
Finally, various disk encryption software can work using a file as an encrypted volume, separate logical partitions of the physical unit or the entire disk. For full disk encryption software, everything is secured, including information on how the disc is divided, boot and date information. This type of software is likely to require some other pre -password just to start the computer's operating system. BesidesThis may not be able to manipulate encryption for the operating system power management techniques such as sleep or hibernation states.
Software fordisk encryption is not immune to attack techniques. In some software, brutal force attacks can be carried out against the HESS. Other software types can use information about disk sectors unsecured, allowing you to detect encrypted files in the system. Another danger lies in the memory of random access (RAM) on a computer where the operating system left the residues of encryption keys. What is called cold attack can be restarted quickly and introduced from a separate operating system, which can then read what is left in the RAM computer.