Click here for more multimedia footage TurboCrypt features in comparison with competitor products
There exist significant differences between TurboCrypt and competitor products. Most significant are design goals. While the competition generally focuses on functionality, we make our software ultimately strong. What really counts is the security of an encryption software. What are the latest gimmicks worth if a hacker can easily steal your valuable information? View paper containing additional and more detailed information as PDF here (0.5 Mb)
TurboCrypt
Others
x
Encryption of entire Partitions
only old versions support this feature as most users didn't use this functionality
(x)
Pre-boot Authentication
very few products support this feature
Deniable (hidden) Volumes
Arbitrary Start of Hidden Volumes
Hiding of Data in Multimedia Files
.bmp and .wav
(.wav)
Reliable Password Sniffing Protection
Products might be susceptible to Trojan Horses
x THIS IS HIGHLY DANGEROUS
1024 bit
128 bit (maximum)
Approx. 1.000.000 AES blocks can run in parallel on an 8’’ wafer and sieve 1012 keys per second
x (on request)
Potentially susceptible to future attacks that decrease effective key size
768 bit
no reserve
x Susceptible to Meet-in-the-Middle Attack
Short passwords are susceptible to Brute-Force Attack (>500.000 keys per second)
Products might potentially be susceptible to Backup Attack
Products might potentially be susceptible to MOUNT IOCTL Attack