CipherShed icon

CipherShed

CipherShed is an open-source and cross-platform disk encryption program designed to create and manage encrypted storage containers or encrypt entire partitions/drives. It aims to provide strong data protection with a focus on security and user privacy.

CipherShed Project

License

Open Source

Platforms

Mac OS X Windows Linux

About CipherShed

CipherShed stands as a robust solution for individuals and organizations prioritizing data security through powerful encryption. Built upon the legacy of TrueCrypt, it offers a familiar interface and extensive features for creating and managing encrypted containers or encrypting entire volumes. This on-the-fly encryption ensures that data is only accessible when the volume is mounted with the correct password or key file, providing a strong barrier against unauthorized access. CipherShed supports a variety of encryption algorithms, including the widely recognized and secure AES-256, alongside others, often used in conjunction with hashing algorithms like SHA-512 for enhanced protection. Users have the flexibility to create hidden volumes within standard encrypted containers, adding an extra layer of plausible deniability. The software's cross-platform compatibility allows users to access encrypted data across different operating systems, enhancing usability and convenience. Key features include:
  • Creation of dynamically expanding or fixed-size encrypted file containers.
  • Full system or partition encryption for comprehensive data protection.
  • Support for various strong encryption algorithms and hash functions.
  • On-the-fly encryption and decryption, meaning data is automatically encrypted/decrypted as it's written/read.
  • Creation of hidden volumes for added security and deniability.
  • Portable mode for running CipherShed without installation, ideal for securing data on external drives.
CipherShed's commitment to being source-available allows for community scrutiny and reinforces its security model. It provides granular control over encryption settings, catering to both novice users and those with more advanced needs.

Pros & Cons

Pros

  • Strong encryption algorithms supported
  • Compatible with TrueCrypt volumes
  • Cross-platform availability
  • Supports hidden volumes for plausible deniability
  • Source code is auditable for security

Cons

  • User interface is somewhat dated
  • Development pace can be variable
  • Requires technical understanding for advanced features

What Makes CipherShed Stand Out

Open-Source and Auditable

The source code is available for public review, promoting transparency and trust in its security.

TrueCrypt Compatibility

Provides a migration path and continued access for users with existing TrueCrypt volumes.

Cross-Platform Accessibility

Enables users to access their encrypted data seamlessly across different operating systems.

Features & Capabilities

11 features

Expert Review

Software Review: CipherShed

CipherShed emerges as a noteworthy contender in the realm of disk encryption software, positioned as a successor to the widely used but discontinued TrueCrypt. This heritage is immediately apparent in its interface and core functionality, providing a sense of familiarity for those transitioning from TrueCrypt. However, CipherShed aims to improve upon its predecessor by incorporating community-driven development and ongoing security audits. At its core, CipherShed is designed to provide robust data protection through on-the-fly encryption. This means data is automatically encrypted as it's written to an encrypted volume and decrypted as it's read, without requiring explicit user intervention for each operation. The primary methods of encryption involve creating encrypted containers, which are essentially files that behave like secure virtual disks, or encrypting entire partitions or drives. One of the significant strengths of CipherShed is its support for a variety of strong encryption algorithms, including AES, Serpent, and Twofish, which can be used individually or in cascade modes for increased security. These are typically combined with hashing algorithms like SHA-512 or Whirlpool for integrity verification and key derivation. This flexibility allows users to choose a configuration that best suits their security needs and hardware capabilities. The creation of encrypted volumes is a straightforward process. Users define the size of the container or select the partition/drive to encrypt, choose the encryption and hash algorithms, and set a strong password or utilize a key file. The software offers the option to create hidden volumes, a powerful feature for plausible deniability. A hidden volume is created within a standard encrypted volume, making it virtually impossible to prove its existence when the outer volume is opened with a different password. Performance is a critical aspect of on-the-fly encryption. While encryption and decryption add overhead, CipherShed is generally efficient, particularly with modern hardware that supports AES-NI instructions, which accelerate AES encryption. Performance can vary depending on the selected algorithms and the speed of the underlying storage device. The cross-platform availability of CipherShed is a major advantage. Official builds are available for Windows, macOS, and Linux, allowing users to access their encrypted data regardless of their operating system. This interoperability is crucial for individuals who use multiple platforms or need to share encrypted data securely with others who use different operating systems. Another commendable aspect is CipherShed's source-available nature. While not strictly open source in the sense of being freely distributed under a license meeting the Open Source Definition, the source code is available for public inspection. This transparency is vital in security-focused software, allowing independent security researchers and the community to audit the code for vulnerabilities. However, as with any software, there are areas for consideration. The user interface, while functional and familiar to TrueCrypt users, may appear somewhat dated compared to more modern applications. New users might require some time to understand the various options and best practices for setting up secure volumes. The project's development, while community-driven, may not be as rapid or have the same level of resources as commercially backed software. This can sometimes lead to slower adoption of new features or support for cutting-edge technologies. In summary, CipherShed is a reliable and capable disk encryption program that builds upon a solid foundation. Its strong encryption options, cross-platform compatibility, and source-available nature make it a compelling choice for users who prioritize data security and privacy. While the interface could benefit from modernization and development pace may vary, its core functionality for creating secure, encrypted volumes is robust and effective. It serves as a valuable tool for protecting sensitive data from unauthorized access.

Screenshots

Similar Apps

Compare features and reviews between these alternatives.

Compare

Compare features and reviews between these alternatives.

Compare

Compare features and reviews between these alternatives.

Compare

Compare features and reviews between these alternatives.

Compare
Advertisement

Compare features and reviews between these alternatives.

Compare

Compare features and reviews between these alternatives.

Compare

Compare features and reviews between these alternatives.

Compare