Main Features
Up to five encrypted volumes can be accessed at any one time from a selection of as many volumes as there is storage for.
Works with most drive types, from 360K floppy disks up to 9 GB SCSI drives.
Compatible with Windows 32-bit disk access.
Direct access to IDE and EIDE drives for enhanced performance.
SCSI device access for enhanced performance and use of drives which aren't normally accessible to DOS.
SFS supports SCSI host adapters from: Adaptec Advanced Integration Research (AIR) Alpha Research Always Technology American Megatrends (AMI) BusLogic Distributed Processing Technology DTC Future Domain IBM LinkSys NEC Trantor Ultrastor ... and many more.
All memory areas are sanitized to prevent data leakage.
Stealth features to minimise the possibility of other programs monitoring or altering its operation.
Encrypted volumes can be:Smart card key management for invidual SFS volumes or groups of volumes.
- Quickly unmounted with a user-defined hotkey
- Automatically unmounted after a certain period of time
- Unmounted under control of a smart card
- Converted back to unencrypted volumes
- Have their contents irrevocably destroyed
Key safeguarding system using a threshold scheme to allow emergency access to SFS volumes if the original key is forgotten or lost.
Support for removable-media hard disk and magneto-optical drives.
Note for NTFS Users / Users of Runtime Software products
Products from Runtime Software like System Info and GetDataBack will occasionally erroneously report NTFS disks as containing SFS partitions. This is due to a bug in the Runtime Software products, which decide that finding partition type 42h on a Windows machine indicates that it's running the SFS real-mode MSDOS device driver rather than being an NTFS dynamic partition marker. See this news posting for more information on how to fix this. You may also want to report this bug to Runtime Software, although since it's remained unfixed for more than five years now it doesn't look like they're in a hurry to correct this.
- Complies with the following security standards
Encryption algorithms used have been selected to be free from any patent restrictions
ANSI X3.106
ANSI X9.30 Part 2
Australian Standard 2805.5.2
Federal Information Processing Standard (FIPS) 180
ISO 10116:1991
ISO 10126-2:1991
The software is not covered by US export restrictions and can be used anywhere in the world
- Good encryption speed and low memory requirements
160 KB/s on a 386/40
260 KB/s on a 486/33
700 KB/s on a P5/90
1100 KB/s on a P5/133
Requires around 7.5 KB of memory
Can be loaded high to conserve DOS memory
Contains Pentium-optimized code in the 486+ version
- Compatible with other disk utilities and software such as:
Windows internationalization support for the following languages:
- 2M, Anadisk, AVTK, CPAV, Disk cacheing software, DRDOS, FDFormat, F-Prot, Integrity Master, Invircible, JAM, Maxi-PC, Microsoft Defrag, MSDOS, NAV, Netroom, Norton DiskEdit, Disk Doctor, and Speed Disk, Novell DOS, QEMM, Share, Stacker, TBAV, VirusScan, VOPT, and Windows
Croatian Czech Dutch English French German Italian Norwegian Polish Portuguese Romanian Russian Spanish Swedish
In-depth analyses of various security aspects of the software
Complete design and programming details necessary to verify the algorithms used in SFS
The latest update release of SFS is version 1.17, which is available from the University of Hamburg archive site. This site can be rather slow, there is a mirror at the University of Milan archive site. Bandwidth to both these sites is limited outside Europe.
The JCFG utilities can be used to enhance the performance and ease of use of SFS.
Version 1.20 is almost ready, but since I'm very busy I haven't had much time to finish it. In 600 million years the sun will go out. I may have to finish 1.20 in the dark.
There is a free portable encryption library which contains the encryption code used in SFS, as well as a number of other encryption and hash algorithms. The library contains high-level encrypted object management routines which make implementing or adding encryption functionality to an existing program a breeze. The library is supplied as source code for Unix, DOS, Windows, Macintosh, and the Amiga, and also as 16- and 32-bit dynamic link libraries for Windows.
Related Information
The Intelligence and
Counter-Intelligence page contains links to intelligence agencies and
resources and commercial intelligence and industrial espionage information.
The crypto link farm contains a large collection of
links to other security, privacy, and encryption-related sites.
The Law Enforcement,
Intelligence, Investigative, and Other Intersting Sites page contains
another contains another large collection of links to intelligence agencies,
law enforcement, and security organisations.
The Terrorism,
Intelligence, and Crime page is another page with links to intelligence and
law enforcement ogranisations.
The
Security and Encryption page contains links to security archives, companies,
archives, software, anti-virus information, and assorted other information.
The Encryption
page contains links to references on encryption, papers and publications,
utilities and services, crypto policy, digicash, and related subjects.
OCP's Security and Privacy Related Items
page contains a large number of links to virtually anything to do with security
and privacy (too much to list here).
The Cryptorebel
and Cypherpunk page is another large collection of links to encryption and
security-related Web pages and FTP sites.
Ron Rivest's
Cryptography and Security page has links to bibliographies, government
sources, non-profit organisations, commercial enterprises, university sites,
newsgroups and FAQ's, and computer security people.
The SAIC Security Documents page
contains links to information on firewalls, WWW security, intrusion detection,
UNIX security, the internet worm, computer attacks and countermeasures,
networking security, trusted systems, newsletters, and miscellaneous
security-related documents.
The
COAST
Security Archive Index page contains pointers to the collection of
security-related programs and documentation contained in the COAST security
archive, covering such diverse topics as access control, authentication,
commercial security packages, email security, encryption, firewalls, intrusion
detection, Kerberos, legal issues, network and password security, privacy
issues, RFC's, software forensics, security guidelines and policies, trusted
systems, and viruses.
Information on software which will break the encryption used in a large number of commercial software packages, including WordPerfect (versions 4.2-6.1, regular or enhanced encryption), Microsoft Word (versions 2.0-6.1), Microsoft Excel (all versions including the Macintosh one), Lotus 1-2-3 (all versions), Quattro Pro, Paradox, Pkzip, Norton's Diskreet (both DES and proprietary encryption), Novell NetWare (versions 3.x-4.x), and others, is available from the AccessData home page.
Another encryption-breaking package is available from the CRAK Software home page.
A number of other references to information pertaining to SFS are given at the end of the SFS documentation.
Information last updated 2 September 1996.