Smartcard Device with dual encryption capability

Secured by NcryptNshare®

Like A Bank Vault In Your Pocket

RES Disk combines SPYRUS military grade encryption software with a Rosetta enabled security device to create a high-security vault for strong data protection.

RES Disk is perfect for desktop, laptop, tablet, or any Windows computing device. It works with local drives, network shares and cloud storage; anywhere you want
to securely protect data when not in use or share it with other team members.

Unlike any other data protection solution in this form factor, RES Disk uses a FIPS 140-2 Level 3 hardware security module to generate and protect digital identities and keys.

The cryptographic components in every SPYRUS security device are designed, engineered, and manufactured in the United States by carefully vetted personnel.

RES Disk implements the latest AES-XTS 256- bit two key full disk encryption. Files are securely stored within the RES DISK vault. The vault can be stored and shared
virtually anywhere, not only on removable media such as a microSDHC card or USB flash drive. Why trust today’s information with yesterday’s security when you
and your team are mobile and your data must remain secured long after tomorrow?

Features and Benefits


Encrypt for the Life of Your Data — RES Disk implements next-generation elliptic curve cryptography, an interoperable cryptographic base promulgated by many government organisations for both unclassified and most classified information.


Encrypted files can be stored anywhere—on the SPYRUS storage device, on your PC, on a file server,or in the cloud.

Key Generation—Keys are generated in the ROSETTA device using a HASHDRBG random number generator compliant with NIST SP 800-90.

Patent pending technology reconstitutes keys as required—they are not stored anywhere.

Defense in Depth Data Protection—use double encryption to protect data by using a SPYRUS hardware-encrypting storage drive and RES Disk.

Smart Card Functionality—allows you to safely use it for storing certificates and signing credentials for many applications.

Technical Specifications

Functionality

RES Disk creates multiple virtual vaults that can be shared with other Rosetta users. RES Disk is available for Windows 7, 8, 8.1, and 10.

RSA and Elliptic Curve Cryptography PKI-based digital certificate functionality such as email digital signatures and encryption and authenticated Web browsing.

High-assurance FIPS 140-2 Level 3 protection for keys, digital IDs, and sensitive data.

Works with Rosetta USB, Rosetta microSDHC, P-3X, PocketVault Smart USB 3.0, WorkSafe, and WorkSafe Pro security devices.

Approximately 32K of EEPROM available for X.509 certificates and storage.

memory Capacities

See the Technical Specification for the Rosetta device you want to use.

Electrical

See Technical Specification for the SPYRUS Security Device Used

Environmental

See Technical Specification for the SPYRUS Security Device Used

Packaging

See Technical Specification for the SPYRUS Security Device Used

Standards Compliance

  • FIPS PUB 46-3 Data Encryption Standard;
  • FIPS PUB 180-3 Secure Hash Algorithm;
  • SP 800-90A Random Bit Generator;
  • FIPS PUB 186-4 Digital Signature Standard;
  • FIPS PUB 197 Advanced Encryption Standard;
  • SP 800-38A Block Modes of Operation;
  • SP 800-56A Key Establishment Schemes;
  • FIPS PUB 198 Keyed Hash Message Authentication Code.

Security Certifications

Rosetta FIPS 140-2 Level 3 / EAL 5+ validated crypto core

Security Certifications

Elliptic Curve Cryptography is part of a set of cryptographic algorithms published by the National Security Agency as part of its cryptographic modernization program to serve as an interoperable cryptographic base for both unclassified information and most classified information, including:

  • Elliptic Curve Cryptography (P-256, P-384, P-521)
  • ECDH Key Establishment
  • ECDSA Digital Signature Algorithm
  • Concatenation KDF
  • RSA 2048 digital signature algorithm
  • AES 128/192/256 with ECB, CBC, CTR, KW
  • Key Agreement / Establishment: CVL (ECC CDH), KAS, KTS
  • XTS-AES 256 FDE, AES-CBC file encryption
  • SHA-1 and SHA-224/256/384/512 secure hash algorithms

Also including:

  • HMAC (min 112 bit key) keyed hash MAC
  • SP800-90A HASH_DRBG (RNG)
  • TDES-3key with ECB, CBC

For more information about NcryptNshare products
contact us by email or phone

Contact

Office => (555) 555-5555
[email protected]

Location

123 Example Rd
Scottsdale, AZ 85260

Connect

Twitter
Facebook