HOME PRODUCTS DOWNLOADS BUY NOW SUPPORT ABOUT US


When using regular hard disks, all files that are created or downloaded are available to anyone with access to your system.  Even when deleted, the data can still be retrieved with various methods including reading the data on the hard disks directly.  As you can see from Figure 1, a lot of information can be exposed on a regular hard disk.

Figure 1 - Unprotected Hard Disk Data

By using StealthDisk, you can help protect yourself from others spying on your important file and documents. StealthDisk volumes present themselves as regular hard disks to the user.  Use them like a regular hard disk to create and store any files or documents you want.  As you read or write data to the StealthDisk volume, all information is encrypted or decrypted on-the-fly as you work.  The protection is transparent allowing you to work like you did without StealthDisk. The difference is the security StealthDisk provides. Figure 2 shows what the data in Figure 1 would look like encrypted with StealthDisk.

Figure 2 - Hard Disk Data with StealthDisk Protection

External Header Block

StealthDisk also has the ability to create an External Header Block or EHB file. What this does is store all the encrypted key information associated with the StealthDisk volume in a separate file. Place this file on a USB drive or floppy disk to increase the security of your StealthDisk volumes. Without the EHB file, there is no way to mount your StealthDisk volume.

StealthDisk utilizes a kernel-based driver to provide a transparent, on-the-fly, encrypted virtual disk for the best performance possible. Using only high quality, industry-standard methods and algorithms, StealthDisk securely encrypts and protects your files and documents from unwanted access. The following are some of the techniques that StealthDisk employs.

Mersenne Twister (Pseudo-Random Number Generator)

The Mersenne twister is a pseudorandom number generator that was developed in 1997 by Makoto Matsumoto and Takuji Nishimura. It provides for fast generation of very high quality random numbers - having been designed specifically to rectify many of the flaws found in older algorithms.

More Information on Mersenne Twister

PBKDF2 (Password-Based Key Derivation Function)

PBKDF2 applies a pseudorandom function to derive keys. The length of the derived key is essentially unbounded. This scheme is described in PKCS#5 which is the Password-Based Cryptography Standard. The pseudorandom function used for PBKDF2 is HMAC-SHA1.

More Information on PBKDF2
More Information on HMAC-SHA1

AES (Advanced Encryption Standard)

AES, also known as Rijndael, is a block cipher adopted as an encryption standard by the US government. It was adopted by the National Institute of Standards and Technology (NIST) as US FIPS PUB 197 in November 2001 after a 5-year standardization process.

More Information on AES

Blowfish

Blowfish is a symmetric key, secret key, block cipher designed in 1993 by Bruce Schneier and is included in a large number of cipher-suites and encryption products. Blowfish is not subject to any patents and is therefore freely available for anyone to use. This has contributed to its popularity in cryptographic software.

More Information on Blowfish

Free 14 Day Trial, Download It Today!

Buy Now and Get 1 Year of Free Upgrades!

Only $49.95!