![Rocstor COMMANDER 3F series User Manual Download Page 44](http://html1.mh-extra.com/html/rocstor/commander-3f-series/commander-3f-series_user-manual_1476328044.webp)
ROCSTOR
|
COMMANDER 3F user manual
Page | 44
drive is strongly encrypted by AES (Advanced Encryption Standard). There is no possibility that
clear text will remain on the hard drive.
Q: What is hardware-based encryption?
A:
Encryption is a sophisticated mathematical calculation (or algorithm) combining a “secret
key” and clear text. The resulting “cipher text” is an unreadable code that can only be
decrypted with the original “secret key.” The hardware encryption, performed by eNova X-Wall
microchip, delivers significant performance improvement over software encryption, works with
every operating system found today, and requires no additional training to use. This encryption
methodology protects your valuable data with minimum Total Cost of Ownership (TCO).
Q: How does encryption function?
A:
X-Wall MX sits between the PCI Bridge and the device on the SATA interface. It intercepts,
interprets, translates, and relays real-time commands and data to and from the disk drives,
encrypting the data with AES-256 bit key strength. The following illustration best describes how
the security chipset functions.
Q: What is the secure key and why use it?
A:
The secure key (or digital key or key token) is a physical key that contains the “secret key”
necessary for encryption and decryption operations. The hard drive must be partitioned and
formatted using the secure key the first time the hard drive is used. When complete, the entire
content of the hard drive is associated with the unique secure key. Only a secure key containing
the identical “secret key” can be used for authentication and decryption of the hard drive at
power up.
Q: Do I need to establish a separate “encrypted folder” under file directory as required by
some software solutions?
A:
No. Everything you write to the disk drive is automatically strongly encrypted. There is no
need to establish a separate “encrypted folder.”
Q: Does X-Wall MX increase the original file size after encryption?
A:
No. AES is a complicated mathematical algorithm that computes the original data with 128 or
256 bit key length. Regardless of the size of the encryption key, the size of data file after
encryption remains unchanged.