

Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.Multiple keys: Whether an encrypted volume can have more than one active key.Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others. Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption.

#Encryptstick software 6.0 code#
TrueCrypt License Version 3.0 (legacy code only) Trend Micro Endpoint Encryption (Mobile Armor) PGP Corporation (acquired by Symantec in 2010) Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow)
