Datasheet

When data is written to a privacy zone of either the DT Vault or the DT Vault – Privacy Edition, it
is encrypted by the AES Encryption and Decryption Co-Processor in real-time, and then written to
the Flash memory storage. Similarly for reads, the data is decrypted real-time on the DT Vault drive
and then sent to the host computer.
Without the unique 256-bit key, which is uniquely generated for the DT Vault utilizing a true
random number generator, encrypted data is nearly impossible to decode.
3.0 Software-Based Encryption Host Computer
Software-Based Encryption
In this case, the user has to explicitly run a program to encrypt a file. When the file is
encrypted, the file can then be copied to the USB Flash drive.
When run on host computers, encryption and decryption programs take up a lot of processor
resources and reduce overall system performance.
3.1 DT Vault & DT Vault – Privacy Edition Hardware-Based Encryption
Because the processor-intense AES encryption/decryption is done through a DTV’s or DTVP’s
dedicated Co-Processor, both drives offer an industry-leading performance level over software
encryption programs.
In addition, utilizing hardware encryption on both drives does not expose the AES “key” to host
computers or networks, further increasing security. The encrypted user password and the key are
never shared outside of the DT Vault or DT Vault – Privacy Edition drives. With software-based
encryption approaches, the key or keys are exposed to the host computer and network.
There is no performance penalty when storing files on the public and privacy zones in a DT Vault
or DT Vault – Privacy Edition.
5