![]() Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.Multiple keys: Whether an encrypted volume can have more than one active key.Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications. ![]() Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others. Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption.Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |