FreeOTFE
File:FreeOTFE-logo-32x32.png | |
FreeOTFE running on Windows XP
|
|
Developer(s) | Sarah Dean |
---|---|
Stable release | 5.21 / 7 February 2010 |
Operating system | Microsoft Windows and Windows Mobile |
Available in | Croatian, Czech, English, French, German, Greek, Italian, Japanese, Russian and Spanish |
Type | Disk encryption software |
License | Free and open-source software that requires attribution[1] |
Website | FreeOTFE at the Wayback Machine (archived May 31, 2013) |
FreeOTFE is a discontinued open source computer program for on-the-fly disk encryption (OTFE). On Microsoft Windows, and Windows Mobile (using FreeOTFE4PDA), it can create a virtual drive within a file or partition, to which anything written is automatically encrypted before being stored on a computer's hard or USB drive. It is similar in function to other disk encryption programs including TrueCrypt and Microsoft's BitLocker.[2]
The author, Sarah Dean, went absent as of 2011. The FreeOTFE website is unreachable as of June 2013 and the domain name is now registered by a domain squatter. The original program can be downloaded from a mirror at Sourceforge. In June 2014, a fork of the project now named LibreCrypt appeared on GitHub.[3]
Contents
Overview
FreeOTFE was initially released by Sarah Dean in 2004, and was the first open source code disk encryption system that provided a modular architecture allowing 3rd parties to implement additional algorithms if needed. Older FreeOTFE licensing required that any modification to the program be placed in the public domain. This does not conform technically to section 3 of the Open Source definition. Newer program licensing omits this condition. The FreeOTFE license has not been approved by the Open Source Initiative and is not certified to be labeled with the open-source certification mark.
This software is compatible with Linux encrypted volumes (e.g. LUKS, cryptoloop, dm-crypt), allowing data encrypted under Linux to be read (and written) freely. It was the first open source transparent disk encryption system to support Windows Vista and PDAs.[4][5][6][7]
Optional two-factor authentication using smart cards and/or hardware security modules (HSMs, also termed security tokens)[8] was introduced in v4.0, using the PKCS#11 (Cryptoki) standard developed by RSA Laboratories.
FreeOTFE also allows any number of "hidden volumes" to be created, giving plausible deniability and deniable encryption, and also has the option of encrypting full partitions or disks (but not the system partition).[9]
Portable use
FreeOTFE can be used in "portable" (or "traveller") mode, which allows it to be kept on a USB drive or other portable media, together with its encrypted data, and carried around. This allows it to be used under Microsoft Windows without installation of the complete program to "mount" and access the encrypted data through a virtual disk.
The use of this mode requires installing device drivers (at least temporarily) to create virtual disks, and as a consequence administrator rights are needed to start this traveller mode. Like most open source software which uses device drivers the user must enable test signing[10] when ran under Windows Vista x64 and Windows 7 x64 systems.[11]
Driverless operation
Packaged with FreeOTFE is another program called "FreeOTFE Explorer",[12] which provides a driverless system that allows encrypted disks to be used without administrator rights.
This allows FreeOTFE encrypted data to be used on (for example) public computers found in libraries or computer kiosks (interactive kiosks), where administrator rights are unavailable.
Unlike FreeOTFE, FreeOTFE Explorer does not provide on-the-fly encryption through a virtual drive.[12] Instead it lets files be stored and extracted from encrypted disk images, in a similar manner as ZIP and RAR archives, by using a Windows Explorer like interface.
Algorithms implemented
Due to its architecture, FreeOTFE provides great flexibility to the user with its encryption options.
Ciphers
FreeOTFE implements several ciphers, including:
It includes all National Institute of Standards and Technology (NIST) Advanced Encryption Standard (AES) finalists, and all ciphers can be used with multiple different keylengths.
Cipher modes
FreeOTFE originally offered encryption using cipher-block chaining (CBC) with encrypted salt-sector initialization vector (ESSIV), though from v3.00 introduced LRW and also the more secure XTS mode, which supersedes LRW in the IEEE P1619 standard for disk encryption.
Hashes
As with its cipher options, FreeOTFE offers many different hash algorithms:
Alternatives
A software fork of the FreeOTFE project named "LibreCrypt" has been created on GitHub.[13]
See also
- Disk encryption
- Disk encryption software
- On-the-fly encryption
- Comparison of disk encryption software
References
- ↑ FreeOTFE license
- ↑ David A. Karp, Windows Vista annoyances, O'Reilly Media, Inc., 2008, ISBN 0-596-52762-4, page 5.
- ↑ LibreCrypt on GitHub
- ↑ FreeOTFE version history
- ↑ Michael Mandaville, Citizen-Soldier Handbook: 101 Ways Every American Can Fight Terrorism, Dog Ear Publishing, 2009 ISBN 1-59858-671-8, page 253.
- ↑ Gregory B. White, Wm. Arthur Conklin, Dwayne Williams, Roger L. Davis, Chuck Cothren, CompTIA Security+ All-in-One Exam Guide, Second Edition, McGraw Hill Professional, 2008, ISBN 0-07-160127-9, page 103.
- ↑ Bryan Burns, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch, Dave Killion, Nicolas Beauchesne, Security power tools, O'Reilly Media, Inc., 2007, ISBN 0-596-00963-1, page 523.
- ↑ Security Token/Smartcard Support
- ↑ Partition/Entire Disk Based Volumes
- ↑ What is Windows 7 Test Mode
- ↑ Additional Information for Windows Vista x64 and Windows 7 x64 Users
- ↑ 12.0 12.1 FreeOTFE v. FreeOTFE Explorer Comparison
- ↑ LibreCrypt
External links
- FreeOTFE at the Wayback Machine (archived May 31, 2013)
- http://sourceforge.net/projects/freeotfe.mirror/