Cryptic Disk creates virtual encrypted disks. This allows you to maintain secrets both on a home computer and on a workstation. Data encryption makes use of the best algorithms and takes place in real time without affecting computer performance. Cryptic Disk provides its users with maximum functionality for protecting their information. Using Cryptic Disk means protecting your data without compromises!
Deniable Encryption so that encrypted volumes do not contain any signatures which could be used to prove that they are encrypted disks or containers.
Support for using key files together with a password or instead of a password, offering users flexibility in how they deploy the disk encryption software .
Reliable protection from keyloggers (built-in virtual keyboard for entering passwords).
Use of XTS data encryption mode, developed specially for disk encryption (IEEE 1619 standard).
Ability to mount an encrypted container/disk using any free drive letter or an empty folder on an NTFS disk.
Support for setting hotkeys to quickly mount and dismount encrypted volumes.
Support for automatic restoration of access settings to shared resources on an encrypted disk after mounting it.
Optimization for multiple CPUs.
Ability to access the program's features from the command line, which allows automating the process of working with the program.
Powerful protection from brute force password attacks (both dictionary attacks and true brute force attacks) in accordance with PKCS #5 v2.
Configurable automatic actions when an encrypted disk is mounted or dismounted: play a WAV file, or launch a program or script in the following languages: CMD Shell, Windows Scripts and PowerShell.
Ability to use the disk encryption software on a computer without installing it beforehand (portable mode).