Microsoft Windows

May 2, 2018 General Studies

BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen. Windows 7 extends BitLocker functionality to removable drives, we call that functionality BitLocker to Go.

BitLocker to Go gives you the ability to encrypt your thumb drives and even USB hard drives. You even have the ability to enforce BitLocker to Go via Group Policy, this Group Policy can ensure that users can only store corporate data on encrypted drives. BitLocker does not protect the computers contents while Windows is running. BitLocker is built for offline attacks, once the operating system is up and running. Truecrypt is a source-available freeware application used for on the fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Truecrypt supports windows, OS X and Linux operating systems. It currently uses the XTA mode of operation. Truecrypt used LRW mode in versions 4. 1 through 4. 3a and CBC mode in versions 4. 0 and earlier. TrueCrypt supports parallelized encryption for multi-core systems and, under Microsoft Windows, pipelined read/write operations to reduce the performance hit of encryption and decryption. On newer processors supporting the AES-NI instruction set, TrueCrypt supports hardware-accelerated AES to further improve performance.

The performance impact of disk encryption is especially noticeable on operations which would normally useDirect Memory Access (DMA), as all data must pass through the CPU for decryption, rather than being copied directly from disk to RAM. TrueCrypt is vulnerable to various known attacks which are also present in other software-based disk encryption software such as BitLocker. To prevent those, the documentation distributed with TrueCrypt requires users to follow various security precautions. [15] Some of those attacks are detailed below.


I'm Amanda

Would you like to get a custom essay? How about receiving a customized one?

Check it out