August 10

Tags

BestCrypt Volume Encryption

BestCrypt Volume Encryption Feature Image

It’s Friday evening and you’ve just got home from a long week of work bracketed by endless commutes.

You collapse on the couch and reach for your laptop, opting for a bit of Netflix while you decide what to do with the rest of your night.

‘Wait a minute’ you think, ‘where is my laptop?’

And then with a sinking feeling it dawns on you: you grabbed your bag from the train seat next to you, but your laptop case was in the overhead luggage rack.

After several frantic calls round train stations the horrible truth creeps in: the laptop is gone, taking a sizeable portion of your personal data with it.

Situations like this aren’t exactly uncommon and are a strong reminder of the benefits of using encryption on your daily devices.

Encryption won’t do much to soothe the irritation of losing an expensive laptop, but it will help to keep your personal data secure if it falls into the hands of a thief – or someone with an aversion to handing in lost property.

If you’ve recently purchased a device running Windows Home Edition, you might be surprised to find that it doesn’t come with disk encryption as standard. You have to upgrade to Windows Professional for access to BitLocker.

If you want to encrypt your laptop data but don’t feel inclined to throw another wad of cash at Microsoft, we think BestCrypt Volume Encryption software offers a leading alternative. The software is also available for Apple’s OS X.

To be honest, we hadn’t heard of BestCrypt until we stumbled across a blog post by security guru Bruce Schneier saying he trusted the people at Jetico – the company behind the product. So we decided to try it out.

What is Volume Encryption?

For the unfamiliar, encryption is a process of encoding data using an algorithm called a cipher, which produces a ciphertext that should be unintelligible to any unauthorised third parties attempting to view it.

There are numerous encryption standards with varying strengths, pros and cons, but we’ll come back to that later.

Before we go any further it may be worth distinguishing volume encryption from other terms that get bandied around, including partition and disk encryption.

A hard disk can be made up into multiple data partitions for purposes such as holding separate Operating Systems. Partition encryption solutions therefore only work with encrypting individual partitions.

Partition Encryption Diagram

Disk encryption software on the other hand may be able to encrypt all the partitions on an individual disk, but often encrypts each hard drive on a computer individually, requiring the management of different encryptions keys.

As such, disk encryption solutions won’t be able to support more complex set-ups such as the RAID configurations available in Direct Attached Storage (DAS) solutions.

Disk Encryption Diagram

Volume encryption provides the most flexibility, allowing the combined encryption of multiple partitions spread across separate hard disks as single volumes.

With this system the entire volume is encrypted until a password is entered by a user and then all files are unlocked in all partitions within the given volume.

Volume Encryption Diagram

With many of us now working with data across multiple disks these days, volume encryption software is arguably the most sensible option for efficient encryption. It’s worth noting that if you do only currently work from one partition or drive then a volume encryption solution would also act as partition or disk encryption software respectively.

Pre-Boot Authentication

BestCrypt Volume Encryption features pre-boot authentication, which prevents unauthorised access to both the volume where Windows boots from and the volume where system files are stored.

With the common risks in relying solely on a password it’s also good to see that the software allows for two-factor authentication, which generally means providing two of: something you know (e.g password), something you have (e.g. security token) or something you are (e.g. fingerprint scan). In this case users can combine a hardware token such as a YubiKey (holding the volume encryption key) with a password that must be entered for encryption or decryption.

Single Sign-On

For Windows users, the latest version of BestCrypt (Version 5 at time of writing) also offers a Single Sign-On (SSO) option, meaning that after entering the BestCrypt decryption password at boot time you can be be logged straight into your account without a requirement for further credentials. Further details on this functionality and use of SSO for multiple user accounts can be found here.

UEFI Secure Boot

Every computer needs a low-level software to manage the boot up process and wake up various components, but the BIOS (Basic Input Output Software) we have known for decades is a bit long in the tooth and lacking in features – including security.

The catchily titled Unified Extensible Firmware Interface (UEFI) now ships as a BIOS replacement in most modern computers and includes secure boot functionality, where the software checks that the Windows boot loader has been signed by Microsoft and isn’t an imposter sneakily trying to run malware outside of the operating system.

BestCrypt Volume Encryption supports the more secure UEFI boot process. This helps prevent various ‘Evil Maid’ exploits where an attacker could plug an external drive into a computer and boot from that, bypassing system firmware.

Multiple Strong Encryption Algorithms

For the encryption process the software also allows you to choose between multiple encryption algorithms:

BestCrypt Encryption Algorithm Comparison Table

Key size refers to the number of bits in an encryption algorithm’s key, which determines the maximum number of combinations that would be required to break the algorithm. Everything else being equal, longer keys mean stronger security.

An encryption round is the repeatable sequence of steps a given encryption algorithm will complete as part of the encryption process. For example, AES (Rijndael) completes the functions SubBytes, ShiftRows, MixColumns and AddRoundKey as part of a single round, which can then be repeated up to 14 times depending on the configuration of the algorithm.

With the exception of Camellia all of the algorithms listed were finalists in a NIST (National Institute of Standards and Technology) 2002 competition to become the new Advanced Encryption Standard (AES) and can all be considered strong forms of encryption. Rijndael was eventually selected as the winning standard due to its consistent speed and performance across different hardware and software platforms.

Download and Installation

The software is downloadable from the Jetico website after purchase, with the option for manual or automatic annual subscription renewals.

BestCrypt Volume Encryption Order Page

We found the BestCrypt installation process easy and had the software up and running in minutes.

After providing payment a link is sent to your email address allowing download of the software to your desired computer. You then follow the setup process and paste in a licence key also included in the order email.

Once fully installed you set set a decryption password (don’t lose it!) and hit ‘Encrypt computer’ button.

BestCrypt Simple Menu

Admittedly the menus aren’t the most exciting to look at, but you don’t by encryption software for its pretty user interface. A more advanced menu is available if you want to encrypt specific volumes and external drives.

Ultimately, the decision on whether to encrypt your devices is a personal choice, depending on the amounts and types of data stored on them and your (or your employer’s) risk tolerance. If the thought of losing your laptop makes you break out in a cold sweat, BestCrypt Volume Encryption is a solid safety net for the cost, packing a range of features.

BestCrypt Volume Encryption supports Windows XP, Vista, 7, 8/8.1, 10 and 11. Windows Server releases 2008, 2012, 2016 and 2019 are also covered.

IWantThisButton