To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. Debt AIDS Trade in Africa (or DATA) is a Multinational non-government organization founded in January 2002 in London by U2 's This article describes how security can be achieved through design and engineering This article discusses hardware which is used to implement the technique (for cryptographic aspects of the problem see disk encryption). Compared to access restrictions commonly enforced by an OS, this technique allows to protect data even when the OS is not active, for example, if data is read directly from the hardware. An operating system (commonly abbreviated OS and O/S) is the software component of a Computer system that is responsible for the management and coordination
Hardware designed for a particular purpose can often achieve better performance than software implementations. And disk encryption hardware can be made more transparent to software than encryption done in software. As soon as the key has been initialized, the hardware should in principle be completely transparent to the OS and thus work with any OS. If the disk encryption hardware is integrated with the media itself the media may be designed for better integration. One example of such design would be through the use of physical sectors slightly larger than the logical sectors.
Existing disk encryption hardware has been criticised as some hardware makes use of keys as small as 40 bits, which can be easily attacked by brute force.
Hardware solutions have also been criticised for being poorly documented. Many aspects of how the encryption is done are not published by the vendor. This leaves the user with little possibility to judge the security of the product. It also increases the risk of a vendor lock-in. In Economics, vendor lock-in, also known as proprietary lock-in, or customer lock-in, makes a customer dependent on a vendor for products
In addition, implementing Hardware-based Full Disk Encryption is prohibitive for many companies due to the high cost of replacing existing hardware. Hardware-based Full Disk Encryption is being pursued by a number of HDD vendors including Intel, Seagate Technology, and Hitachi Ltd This makes migrating to hardware encryption technologies more difficult and would generally require a clear migration and central management solution for both hardware- and software-based Full disk encryption solutions. Full disk encryption (or whole disk encryption) is a kind of Disk encryption software or hardware which encrypts every Bit of data .