Comparison of methods of encryption on the storage media

Mediji_za_pohranuBecause of increasing number of theft of data in digital format (USB devices, laptops, etc.), protection of data on computer and external storage devices has become a priority for many companies which are using the confidential and sensitive information in daily operations. Although today there are many free and commercial solutions for data protection on computers and other storage medias, many companies are still not familiar with the possibilities and advantages that they offer, or the risks that brings the potential theft of confidential information.

Because of listed reasons, Nobium made a brief overview of software solutions for encrypting data in storage media. Between many possibilities that these tools offer, we singled out those that are proved to be the most useful and most necessary in practice. In addition, there is a comparison of support for most common operating systems and different levels of data encryption for selected tools.

 

Table 1 shows a comparison of the tools by the possibilities that they provide to its users. Although those are not all the features that most tools on the market certainly have, they are the most important and significantly facilitate the use of this type of protection.

Options were compared in the table are:

  1. Encrypting system partitions
    Most programs have the possibility of encrypting the partition where the operating system is installed.
  2. Hidden operating system
    This option allows deniable encryption. It is about creating a hidden encrypted partition that can’t be detected by attacker. This hidden partition can be activated by typing a special code when you create a certain one.
  3. Support for TPM devices
    Some software solutions support the ability to use the so-called TPM (Eng. Trusted Platform Module) chip. This is a special cryptographic processor that is used to accelerate the process of encryption.
  4. Hardware acceleration
    Some of the software on the market allows using of special cards to speed up the process of encryption.
  5. Support for multiple keys
    Encrypting data using multiple keys allows using of master key for administrators.
  6. External Authentication
    Some software packages support the possibility of authentication with other applications.
  7. Two factors authentication
    The ability to use two-factor authentication is quite important. It is usually the use of various security tokens for user authentication.

 

 
tablica-1-eng

* only on Windows OS

Table 1. Comparison of services

 

As already mentioned, except by its capabilities, tools for encrypting data were compared by the support for various operating systems (Table 2) and the level of encryption of data (Table 3).

Possible level of data encryptions are:

  1. Full disk
    Encrypt the entire physical disk.
  2. Partition
    Encrypt individual partitions on the physical disk.
  3. File
    The possibility of encryption of individuals file.
  4. Swap file
    The possibility of encryption of swap files ("pagefile" in Windows).
  5. Hibernate
    Encryption of file that contain information from working memory during computer hibernation.
 
 
 
tablica-2-eng

* only on Windows OS

Table 2. Comparison of support for operation systems

 

tablica-3-eng

* only on Windows OS

Table 3. Comparison of encryption of encryption of data encryption level

   
   

Articles  

   
© 2015 Nobium - Sva prava pridržana.