Select your language

Home arrow-right ... arrow-right Security and Privacy Software arrow-right GostCrypt

We've compiled a list of 79 free and paid alternatives to GostCrypt. The primary competitors include TrueCrypt, VeraCrypt. In addition to these, users also draw comparisons between GostCrypt and DiskCryptor, CipherShed, EncFS. Also you can look at other similar options here: Security and Privacy Software.


TrueCrypt is a freeware utility used for on-the-fly encryption (OTFE).

VeraCrypt is a free disk encryption software brought to you by IDRIX and that is based on...

DiskCryptor
Free Open Source

DiskCryptor is the only truly free solution, provided under GNU General Public License (GPLv3)...

CipherShed
Free Open Source

CipherShed is a program that can be used to create encrypted files or encrypt entire drives...

EncFS
Free Open Source

EncFS provides an encrypted filesystem in user-space.

Cryptonite
Free Open Source

Cryptonite brings EncFS and TrueCrypt to Android.

encfs4win
Free Open Source

This is an experimental project of porting encfs to the Windows world. Use First time

LUKS
Free Open Source

LUKS is the standard for Linux hard disk encryption.

The Gostcrypt project has been launched at the end of 2013 as fork of the (late) Truecrypt project.

GostCrypt Platforms

tick-square Windows
tick-square Linux
tick-square Mac

GostCrypt Overview

The Gostcrypt project has been launched at the end of 2013 as fork of the (late) Truecrypt project.

It intends to go farther than ever. Since the late 70s, most of the algorithms used (not to say all) are UKUSA encryption systems that have been chosen, promoted and standardized under the control of the USA and its satellite countries.

Security rationales

The GOST 28147-89 block cipher uses 256-bit keys for encryption or decryption. Internally, this key is divided into eight 32-bit subkeys. In the process of setting the GOST 28147-89 key in preparation for encryption and decryption, the S-Box is modified based on the supplied key, providing a first degree of diversification of the algorithm (and thus provides resistance to known attacks).

For this process, the 'GOST R 34.11-94 CryptoProParamSet' S-Box from RFC 4357 is used as initial S-Box. The 256-bit encryption key is hashed using the GOST R 34.11-2012 hash function, which produces a 512-bit digest. As both the initial S-Box and the digest contain 512 bits of information, a bitwise addition modulo two is used on of the 4-bit S-Box entries (see the diagram below). The resulting key-dependent S-Box is used for encryption and decryption. During encryption and decryption, the GOST 28147-89 block cipher is used with the XTS mode of operation. The data unit number, a disk offset used in the XTS algorithm, is combined with the GOST 28147-89 key using bitwise addition modulo two. This operation ensures that a different key is used for each 512-byte section of the disk. Given how small changes in the used key result in large changes in the resulting ciphertext, this mechanism provides an additional challenge for a potential adversary.

GostCrypt Features

tick-square Encryption

Top GostCrypt Alternatives

Share your opinion about the software, leave a review and help make it even better!

GostCrypt Categories

Security and Privacy Software

GostCrypt Tags

Discontinued

Suggest Changes

Your Feedback

Select a rating
Please select a rating

Your vote has been counted.

Do you have experience using this software?