East-Tec Logo

Glossary of Terms

Short for Advanced Encryption Standard, a symmetric 128-bit block data encryption technique (east-tec SafeBit uses a 256-bit stronger variation) developed by 2 Belgian cryptographers: Joan Daemen and Vincent Rijmen. The U.S government adopted the algorithm as its encryption technique in October 2000, replacing the obsolete DES encryption. The National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce selected the algorithm, called Rijndael (pronounced Rhine Dahl or Rain Doll), out of a group of five algorithms under consideration.

A formula or set of steps for solving a particular problem. In east-tec SafeBit, we refer by algorithm an encryption algorithm which is the set of steps required to encrypt data.

Container File
An encrypted file which contains all the files and folders of a Safe. Container File will have the same size as the Safe has. It can be moved or resized anytime.

The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.

The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption. east-tec SafeBit uses symmetric encryption.

A secret series of characters that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, encrypted data files and programs may require a password.

Ideally, the password should be something that nobody could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer systems.

A particular container file that can be mounted on a drive letter. The data from the safe is encrypted. Every Safe is password protected.

Computer Security
Refers to techniques for ensuring that data stored in a computer cannot be read or compromised. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.