Software Index
Linux Software Security Tools  


download download home home   report broken
important software information
company name:
dm-crypt Team
license: Freeware
minimum requirements: No special requirements.
functional limitations:
dm-crypt description
dm-crypt is a device-mapper crypto target.

Device-mapper is a new infrastructure in the Linux 2.6 kernel that provides a generic way to create virtual layers of block devices that can do different things on top of real block devices like striping, concatenation, mirroring, snapshotting, etc... The device-mapper is used by the LVM2 and EVMS 2.x tools.

dm-crypt is such a device-mapper target that provides transparent encryption of block devices using the new Linux 2.6 cryptoapi. The user can basically specify one of the symmetric ciphers, a key (of any allowed size), an iv generation mode and then he can create a new block device in /dev. Writes to this device will be encrypted and reads decrypted. You can mount your filesystem on it as usual. But without the key you can't access your data.

It does basically the same as cryptoloop only that it's a much cleaner code and better suits the need of a block device and has a more flexible configuration interface. The on-disk format is also compatible. In the future you will be able to specify other iv generation modes for enhanced security (you'll have to reencrypt your filesystem though).

There is support for dm-crypt in the latest official kernel 2.6.4 which you can find on Please use the mirrors for downloads.

There is a HIGHMEM cryptoapi bug in kernels before 2.6.4-rc2, please upgrade if you were using such a kernel.. . Publisher of dm-crypt, Author of dm-crypt 0.1. dm-crypt is a device-mapper crypto target. Device-mapper is a new infrastructure in the Linux 2.6 kernel that provides a generic way to create virtual layers of block devices that can do dif
Similar software
Ruby Crypt (Popularity: ) : Ruby Crypt library is a pure-ruby implementation of a number of popular encryption algorithms. Block cyphers currently available include Blowfish, GOST, IDEA, and Rijndael (AES). Cypher Block Chaining (CBC) has been implemented. Twofish, Serpent, and CAST256 are planned for release ...
Crypt (Popularity: ) : Crypt is a small C program that utilizes the crypt(3) function to include DES password checking/encryption in shell scripts.. . Publisher of Crypt, Author of Crypt 0.1. Crypt is a small C program that utilizes the crypt(3) function to include ...
Eureka Encryption Global Edition (Popularity: ) : Eureka Encryption Global Edition contains file encryption, multiple encryption, merge encryption, multiple file encryption, embedded applications (Crypt Words, Steganographer, Interface) and other tools such as a file shredder and scrambler.

Eureka Encryption Global Edition is available for Windows, Mac and Linux. ...

phpass (Popularity: ) : phpass is a portable PHP password hashing framework.

This is a portable public domain password hashing framework for use in PHP applications. It is meant to work with PHP 3 and above, and it has actually been tested with PHP 3.0.18, ...

pam_tcb (Popularity: ) : pam_tcb is an alternative to shadow. The tcb package contains core components of our tcb suite implementing the alternative password shadowing scheme on Owl.

It is being made available separately from Owl primarily for use by other distributions. Note that you ...

pam_userpass (Popularity: ) : PAM has traditionally assumed that services doing authentication have the ability to interact with the user. Unfortunately, this isn't true for services that implement non-interactive and/or fixed protocols, such as FTP and POP3.

This is typically worked around by making the ...

passwdqc (Popularity: ) : pam_passwdqc is a simple password strength checking module for PAM-aware password changing programs, such as passwd.

In addition to checking regular passwords, it offers support for passphrases and can provide randomly generated ones. All features are optional and can be (re-)configured ...

Digital Invisible Ink Toolkit (Popularity: ) : The Digital Invisible Ink Toolkit is a Java steganography tool that can hide any sort of file inside a digital image (regarding that the message will fit, and the image is 24 bit colour). Digital Invisible Ink Toolkit will work ...
Dirac (Popularity: ) : Dirac is a video codec that provides general-purpose video compression and decompression tools comparable with state-of-the-art systems.

Dirac video codec is available for distribution under the MPL version 1.1 software license.

Dirac is an open source video codec. It uses a traditional ...

User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
Similar scripts
Encrypted Volume Manager (Popularity: ) : A script to manage dm-crypt volumes, which is a good replacement for TrueCrypt, as dm-crypt is supported by Linux kernel, while TrueCrypt is considered as non-free (by Fedora, Mandriva and maybe other Linux distributors).
Crypt::TEA (Popularity: ) : Crypt::TEA is a pure ruby implementation of the various forms of the Tiny Encryption Algorithm.
Crypt::Rijndael (Popularity: ) : Crypt::Rijndael is a Rijael (AES)S) block cipher class.
Crypt::Blowfish (Popularity: ) : Crypt::Blowfish provides Blowfish block cipher enion.:Cry
btt-crypt Online Version (Popularity: ) : BTT-Crypt is an online encryption tool for php developers. Several different versions are available via the selection menu. Hide your source code and save your intellectual property from would-be hackers.
crypt.cgi (Popularity: ) : crypt.cgi is a user management program where webmasters can manage users through a web based interface. Only authenticated visitors having valid username and password can access secured contents on the web pages. When the visitors try to access secured contents ...
VisualSoft Crypt (Popularity: ) : VisualSoft Crypt can be used to protect sensitive data in Government, Financial, Health Care and e-Business Applications. It supports various Industry-standard symmetric Cryptography methodologies namely AES, Serpent, Mars, DES, TDES, BlowFish, IDEA.
XP Crypt (Popularity: ) : XP Crypt is an useful site security program that has the ability to perform column encryption in views, procedures and triggers. All data encryptions are done through the server side symmetric and asymmetric encryption algorithms integrated as extended stored procedures, ...
Crypt::ISAAC (Popularity: ) : This is a Ruby implementation of the ISAAC cryptographically secure PRNG.One can use it when one wants independent sources of high quality random numbers.
RC4 Crypt (Popularity: ) : RC4 Crypt RC4Crypt is a library that allows you to use RC4 encryption easily in PHP. It's OO and can produce outputs in binary and hex.
Rate me
supported os's
downloads 27
version 0.1
size in Kb 246
user rating 5/10
our rating 0 Stars
share info
Recommend dm-crypt
Report spyware
New Software
Popular Software
Latest Reviews