The Best Encryption Algorithms

  • Cryptic Disk supports several well-known encryption algorithms: AES (Rijndael), Serpent, Twofish, Blowfish, CAST6.
  • Data encryption is performed in XTS mode (IEEE 1619 standards), specifically designed for drive encryption.
Exlade Cryptic Disk

Cascade Encryption

Cryptic Disk allows you to use several algorithms in combination to provide the strongest possible encryption of a container or a drive. To begin with, data is encrypted using one algorithm, the result is then encrypted using another, and so on. A separate encryption key is used for each algorithm, greatly boosting the strength of the protection.

Exlade Cryptic Disk

In XTS mode, there are two different encryption keys for each algorithm, generating a key that is twice as long. With all encryption algorithms in XTS mode, encryption keys have a length of 2,944 bits.

Powerful Protection Against Attacks

Data access is protected in accordance with the PBKDF2 standard, part of specification PKCS #5 v2.0. The key is generated based on the password and the key files and is used to protect the main encryption key and encrypted drive headers. A very low generation speed (1-10 seconds) helps to secure against brute force attacks.

Exlade Cryptic Disk

Cryptic Disk's secure virtual keyboard enables passwords to be entered without using a physical keyboard.

Exlade Cryptic Disk

Hardware Acceleration

Most modern microprocessors include hardware support for the AES (AES-NI) encryption algorithm. Cryptic Disk detects AES-NI instructions in the microprocessor and uses these instead of software ones.

AES-NI makes encryption and decryption speeds tens of times faster.

Exlade Cryptic Disk