Encryption information – CRU ToughTech Secure 128 mini-Q with WriteLock User Manual

Page 8

Advertising
background image

CRU

U s e r M a n u a l f o r T o u g h T e c h m i n i Q m o d e l s ( A 9 - 0 0 0 - 0 0 0 1 r e v 1 . 5 )

- 8 -

4. Encryption Information


The information in this section applies only to “Secure” models.

ToughTech Secure employs hardware-based AES 128-bit or 256-bit encryption to protect your data from
unauthorized access. AES (Advanced Encryption Standard) is a government approved encryption
algorithm (FIPS PUB 197). With ToughTech Secure you'll get guaranteed full-disk hardware based
encryption, with no loss of speed.

Encryption is performed automatically by ToughTech Secure's real-time encryption engine. Your
computer will see the volume available as a normal full-speed drive. If your drive is lost or stolen,
however, you can rest assured that without the proper AES Encryption Key, no one will be able to view its
contents.

4.1 How to use ToughTech Secure mini-Q with a Key

Using ToughTech Secure mini-Q is very easy.

1. Connect the external drive to your computer via FireWire, USB, or

eSATA.

2. Insert your AES Encryption Key into ToughTech Secure.
3. Wait for the green LED to light up on the front of ToughTech Secure.

This confirms the key is accepted.

4. You can now remove the AES Encryption Key. It's not needed again until the power is cycled.


The ability to remove the key after power up helps you keep your physical key safe.


4.2 AES encryption keys

Your ToughTech Secure mini-Q comes with 3 identical, programmed keys. These three keys exist so you
can

• Keep one with you (for your own use)
• Keep a backup on site in a safe location
• Keep a backup off site in a safe location


These keys will be completely unique to you. If one of your keys is compromised, via theft or loss, you
should consider replacing your key set. For your convenience, we offer replacement pre-programmed
key sets, which contain unique encryption keys.


4.3 AES encryption key programmer

It is possible for you to create your own keys, should you wish to do so. To
program a new encryption key, you will need the AES Encryption Key
Programmer (sold separately). While we do not retain copies or records of
customers' keys, some customers' security protocols may demand that they have
more control over the key itself. There are also situations where more than three
keys are needed - for granting access to more than one person, for example.
And we're also aware of situations where encryption keys must change on a
timed schedule. These customers will be interested in the AES Encryption Key
Programmer, which will create or copy their AES Encryption Keys.

Advertising
This manual is related to the following products: