Smartcard Device with dual encryption capability
Secured by NcryptNshare®
Like A Bank Vault In Your Pocket
RES Disk combines SPYRUS military grade encryption software with a Rosetta enabled security device to create a high-security vault for strong data protection.
RES Disk is perfect for desktop, laptop, tablet, or any Windows computing device. It works with local drives, network shares and cloud storage; anywhere you want
to securely protect data when not in use or share it with other team members.
Unlike any other data protection solution in this form factor, RES Disk uses a FIPS 140-2 Level 3 hardware security module to generate and protect digital identities and keys.
The cryptographic components in every SPYRUS security device are designed, engineered, and manufactured in the United States by carefully vetted personnel.
RES Disk implements the latest AES-XTS 256- bit two key full disk encryption. Files are securely stored within the RES DISK vault. The vault can be stored and shared
virtually anywhere, not only on removable media such as a microSDHC card or USB flash drive. Why trust today’s information with yesterday’s security when you
and your team are mobile and your data must remain secured long after tomorrow?
Features and Benefits

Encrypt for the Life of Your Data — RES Disk implements next-generation elliptic curve cryptography, an interoperable cryptographic base promulgated by many government organisations for both unclassified and most classified information.

Encrypted files can be stored anywhere—on the SPYRUS storage device, on your PC, on a file server,or in the cloud.

Key Generation—Keys are generated in the ROSETTA device using a HASHDRBG random number generator compliant with NIST SP 800-90.

Patent pending technology reconstitutes keys as required—they are not stored anywhere.

Defense in Depth Data Protection—use double encryption to protect data by using a SPYRUS hardware-encrypting storage drive and RES Disk.

Smart Card Functionality—allows you to safely use it for storing certificates and signing credentials for many applications.
Technical Specifications
Functionality
RES Disk creates multiple virtual vaults that can be shared with other Rosetta users. RES Disk is available for Windows 7, 8, 8.1, and 10.
RSA and Elliptic Curve Cryptography PKI-based digital certificate functionality such as email digital signatures and encryption and authenticated Web browsing.
High-assurance FIPS 140-2 Level 3 protection for keys, digital IDs, and sensitive data.
Works with Rosetta USB, Rosetta microSDHC, P-3X, PocketVault Smart USB 3.0, WorkSafe, and WorkSafe Pro security devices.
Approximately 32K of EEPROM available for X.509 certificates and storage.
memory Capacities
See the Technical Specification for the Rosetta device you want to use.
Electrical
See Technical Specification for the SPYRUS Security Device Used
Environmental
See Technical Specification for the SPYRUS Security Device Used
Packaging
See Technical Specification for the SPYRUS Security Device Used
Standards Compliance
- FIPS PUB 46-3 Data Encryption Standard;
- FIPS PUB 180-3 Secure Hash Algorithm;
- SP 800-90A Random Bit Generator;
- FIPS PUB 186-4 Digital Signature Standard;
- FIPS PUB 197 Advanced Encryption Standard;
- SP 800-38A Block Modes of Operation;
- SP 800-56A Key Establishment Schemes;
- FIPS PUB 198 Keyed Hash Message Authentication Code.
Security Certifications
Rosetta FIPS 140-2 Level 3 / EAL 5+ validated crypto core
Security Certifications
Elliptic Curve Cryptography is part of a set of cryptographic algorithms published by the National Security Agency as part of its cryptographic modernization program to serve as an interoperable cryptographic base for both unclassified information and most classified information, including:
- Elliptic Curve Cryptography (P-256, P-384, P-521)
- ECDH Key Establishment
- ECDSA Digital Signature Algorithm
- Concatenation KDF
- RSA 2048 digital signature algorithm
- AES 128/192/256 with ECB, CBC, CTR, KW
- Key Agreement / Establishment: CVL (ECC CDH), KAS, KTS
- XTS-AES 256 FDE, AES-CBC file encryption
- SHA-1 and SHA-224/256/384/512 secure hash algorithms
Also including:
- HMAC (min 112 bit key) keyed hash MAC
- SP800-90A HASH_DRBG (RNG)
- TDES-3key with ECB, CBC

For more information about NcryptNshare products
contact us by email or phone
Contact
Office => (555) 555-5555
[email protected]
Location
123 Example Rd
Scottsdale, AZ 85260