FEATURES
OBAKE
BoxCryptor
Corporate
SecureIT
2020
AxCRYPT
Kaspersky
Total Security
VeraCrypt
100%
42%
37%
32%
25%
23%
Great usability and easiness
Without limitation of files
Handles files larger than 4Gb on 32-bit systems
Works on Folders and Subfolders
DIGITAL CERTIFICATES
Encrypts data using Digital Certificates
Certificate: maximum bit-size
8192 bits
4096 bits
Certificate Type
X509v3
RSA
Works with ICP-BR chain
Accepts Certificates from Public CA's
Accepts Certificates from Private CA's
Import and export certificates easily
Certificates safely stored on the user's machine
User certificate is access-protected
Accepts Certificates in the local Windows Store
Works with Self-Signed Certificates
Enables TimeStamp with choice of servers
Unlimited number of Public Keys (or recipients)
SECRET KEYWORDS
Encrypts data using secret key
Requires the secret key at each file opening
Set different random keys per file on multiples files.
FUNCTIONALITY AND SECURITY
Allows encrypted file sharing
Allows direct sharing w/o any manufacturer’s link or procedure
Sharing by Digital Certificates (Public Keys)
Share/Auth data are embedded in files
Checks encrypted file after encryption
Allows to check the creator and the authorized persons in files
Allows to verify file's Integrity & Authenticity
Sanitizes input file automatically
Deletes input file automatically
Allows customized and intelligent files compression
Allows you to cancel operation at any time
Allows to quickly open/edit encrypted files
Automatically re-encrypts when closing a file
Allows to keep the file’s original date/time
Does not require exclusive secure folder
Does not require data-vault
Does not require online services and logins
Does not allow data opening on smartphones
Allows a password for the program access
Allows a 2FA for the program access (Google Authenticator)
Zero-Knowledge compliant
Enables access restriction to critical settings
Enables secure access to the settings restrictions
Enables mandatory sharing by code
Enables mandatory sharing by capillarity
Enables email log for critical configuration changes
Allows the creation of "User Groups" to share
Allows the creation of "User Groups" without a common key
Integration with Microsoft-365 (optional module)
Integration with Windows Explorer / Files Explorer
Allows “end-to-end” synchronization with One-Drive
Allows “end-to-end” synchronization with Google Drive
Allows “end-to-end” synchronization with Dropbox
Passwords and Keys are independent
ADMIN-authorization free – no privileged access
Allows revocation/exchange of authorizations
Protected against hacking/code injection
Protected against Disassembly
Protected against code hijacking
ALGORITHMS
Has algorithms for compliance (AES)
Has AES-XTS for compliance IEEE
Has AES-NI by hardware (top performance)
Has modern strong algorithms (XSalsa, ChaCha, Poly305, etc.)
Calculated One-Time Keys
Symmetric "military-grade" algorithm (> 256 bits)
Symmetric encryption key length (in bits)
32 to 65536
256
448
256
56
256
HASH size (in bits)
512
512
256
256
Derivations of the main Key
5
2
1
1
1
1
PERFORMANCE
Encryption (2.39Gb using OBAKE-512)
7.9 s
22 s
154 s
150 s
25 s
24 s
Decryption (2.39Gb using OBAKE-512)
7.7 s
11.5 s
68 s
55 s
9 s
21 s
Encryption (2.39Gb using AES-NI)
4.3 s
22 s
154 s
150 s
25 s
24 s
Decryption (2.39Gb using AES-NI)
4.8 s
11.5 s
68 s
55 s
9 s
21 s
ADDITIONAL FEATURES
Compliance with GDPR, LGPD and other laws
Compliance with NIST-FIPS, ISO-IEC, RTF
Resistant to Monitoring/Data-Inspection Laws
Allows the source-code auditing
Algorithms can be customized by companies
SCORING RATE:
77
32.5
28.5
24.5
19
18
= 1 point
= 0.5 point