Hardware disk encryption is completely transparent to the operating system and, consequently, to applications and users on the computer. This means saving a part of unstructured data on the disk is easy and needs no modification to the operating system, the application, or the content format.
Some kind of authentication needs to take a place before any data on the drive can be decrypted and read. When complete disk encryption is implemented using software, the operating system must have some kind of unencrypted partition from which to boot and in turn authenticate the system to obtain access to the cryptographic keys to decrypt the main encrypted disks.
Both hardware and software techniques provide the encryption of data as it is written to disk over the complete disk. The methods are completely transparent to the processes (other than, of course, those in the operating system that may be managing the encryption/decryption), and as data is read from disk, it is recognized by applications in its decrypted state. One downside of hardware-based disk encryption is that the management of the cryptographic keys can be hard.
Latest posts by Eslam Medhat (see all)
- Satori.Coin.Robber (botnet) is now hacking Ethereum mining rigs by replacing wallet address - January 17, 2018
- Skygofree (one of the most powerful strains of Android spyware) has been discovered - January 16, 2018
- Types of Hacking - January 13, 2018