Ausführliche Informationen zu abylon CRYPTDRIVE

Why do you need an encryption program, like abylon CRYPTDRIVE:

Do you also store your data unencrypted on your computer? And you wouldn't hang any confidential data on the bulletin board or publish it in the daily newspaper. The computer offers numerous vulnerabilities which potential attackers can exploit. A copy of the data is quickly made and this information can then be misused.
Great dangers also exist in the shared use of computers and networks, in the theft, repair or disposal of computers.

How does the encryption with abylon CRYPTDRIVE:

work?

With abylon CRYPTDRIVE you can easily create virtual, completely encrypted drives. Thus, all files and programs on this drive are protected against unauthorized access.

  • Encryption with the Blowfish (448 bit) or AES (256 bit) algorithm
  • Network-enabled container-based, encrypted drives
  • Only open drives are visible
  • Access permissions via password, external device, or certificate

Files stored on your computer can fall into the wrong hands in many ways. The only remedy is sufficient encryption of the data. The abylon CRYPTDRIVE provides a simple way to create encrypted drives, called containers. Through the encryption with the Blowfish (448 bit) or AES algorithm (256 bit) the files and programs stored on the drive are protected against unauthorized access. Only when the drive is opened can it be accessed via the File Explorer. Encryption and decryption take place automatically in the background. As a secret to open the drive, either a password can be entered via the keyboard, a smart card, a CD or a USB stick can be used. The combination of password and medium is also possible to defend against keyloggers.

In a professional environment, access rights can also be administered via certificates. Numerous certificate chip cards or USB tokens are supported.

Functional scope of the software abylon CRYPTDRIVE:

  • Strong encryption with the Blowfish (448 bit) or AES (256 bit) encryption algorithms
  • Combination encryption with the Blowfish and AES (HighEncryption - System) algorithm
  • PasswordScrambler and image input: anti-keylogger function by hacking the password input and using image objects for cryptic password sequences
  • Full integration as drive in the MS File Explorer
  • Supported keys (secret) to open the encrypted data:
    • SYMM-System
      • Password via keyboard
      • Chip cards (e.g. EC or KV cards)
      • External storage media (e.g. USB sticks)
      • CDs/DVDs
      • RFID cards
      • Combination of password and token
      • 4 eye system (4Eye system)
    • HYBRID system
      • X.509 Software certificates
      • Certificates on smart cards or USB tokens
  • Size almost unlimited (up to 2 TB tested and released)
  • The encrypted image files can be split into up to 500 parts (Partitials) (support of Partitials larger than 4 GB)
  • open already opened CRYPTDRIVEs in read mode
  • The location of the image files can be on the local computer or a network server (client or server)
  • No software is required on the server
  • For network applications the data is transmitted encrypted and only decrypted on the client
  • Automatic movement of the CRYPTDRIVE when the path is changed

NOTE: abylon CRYPTDRIVE is included in the abylon ENTERPRISE package.

Application areas and scenarios for the encryption of files and programs:

  1. Protecting files on the local computer: You are using your home computer with your partner or children and do not want them to see special files on your hard drive (such as text documents, pictures, or videos). Simply store these files in an encrypted drive and after closing, no one can access the files without the appropriate password or smart card. In addition, the files are no longer accessible and can therefore not be changed or deleted.
  2. Installation of programs on the abylon CRYPTDRIVE: On the encrypted drive the installation of software is possible. Create a new encrypted drive, open it and then start the installation of the program. With the selection of the target folder you then select a folder on the encrypted drive. When the drive is closed, the program files of the software are also encrypted and are no longer accessible. The program can only be executed again if the corresponding abylon CRYPTDRIVE is opened.
  3. Create links on the desktop and open them automatically after booting: For fast opening and closing of single encrypted drives you can create icons (links) on the desktop in the connection manager (right-click menu). These allow you a fast access. The links can then be copied to the startup folder of the start menu, for example. This way, the corresponding encrypted drives are automatically opened after the computer is booted.
  4. Access from several different computers: You can also select a network computer as storage location (initial directory = UNC path) for the encrypted drives. This allows access to an encrypted drive from different computers. The data is transferred encrypted over the network and the files are only decrypted on the client. (NOTE Simultaneous access by several users is only possible when mounting and releasing the encrypted drives on one server!)
  5. Storage on an external device: You can also store the encrypted drives on an external device (e.g. USB token). This allows you to take the encrypted data with you and even if it is lost, it is protected against illegal access.
  6. Access permissions through certificates: In HYBRID mode, several certificates can be assigned to a drive as permissions, allowing your colleague or supervisor, for example, to access your data. This can protect the company from damage, especially in the event of illness or loss of the certificate chip card.
  7. Batch processing: Using an executable batch file, the drives can be opened automatically, shares assigned and programs started.

System requirements for encryption:

  • Processor: Pentium (or comparable) 
  • Main memory: 256 MByte RAM
  • Free hard disk space approx. 80 MByte
  • Screen resolution: min. 1024x600 Pixel
  • Optional smart card reader and certificate smart card or USB token

Supported standards:

  • CAPI (Microsoft Crypt API)
  • PKCS#7 (Cryptographic Message Syntax Standard)
  • PKCS#11 (Cryptographic Token Interface Standard)
  • PKCS#12 (Personal Information Exchange Syntax)
  • RSA
  • Blowfish and AES algorithm
  • PC/SC
  • RC4, Blowfish, AES, 3DES...
  • X.509 v3 Certificates
  • Microsoft Certificate Database

Technical information about the encryption program:

  • Installation and uninstallation routine
  • Driver for smart card reader or USB token has to be installed separately
  • Certificates (X.509 v3) can be generated