Cryptic Disk allows you to use several algorithms in combination to provide the strongest possible encryption of a container or a drive. To begin with, data is encrypted using one algorithm, the result is then encrypted using another, and so on. A separate encryption key is used for each algorithm, greatly boosting the strength of the protection.
In XTS mode, there are two different encryption keys for each algorithm, generating a key that is twice as long. With all encryption algorithms in XTS mode, encryption keys have a length of 2,944 bits.
Data access is protected in accordance with the PBKDF2 standard, part of specification PKCS #5 v2.0. The key is generated based on the password and the key files and is used to protect the main encryption key and encrypted drive headers. A very low generation speed (1-10 seconds) helps to secure against brute force attacks.
Cryptic Disk's secure virtual keyboard enables passwords to be entered without using a physical keyboard.
Most modern microprocessors include hardware support for the AES (AES-NI) encryption algorithm. Cryptic Disk detects AES-NI instructions in the microprocessor and uses these instead of software ones.
AES-NI makes encryption and decryption speeds tens of times faster.