External CipherChain2 - 6G SATA encryption

The External CipherChain II is a unique security tool that you can use for a variety of storage applications. Built on a FIPS certified AES 256-bit crypto engine, the External CipherChain II is the perfect solution to secure sensitive data stored on external RAID storage, hard drive, SSD. You can even secure popular flash media when connected to the External CipherChain by using the Addonics Pocket UDD25. The External CipherChain II can also be used as a drive sanitization tool for removing any sensitive data stored on a used hard drive or flash media.

The External CipherChain II uses the same CipherChain II encryption module to ensure full SATA 6G performance. This device is very easy-to-use and implement. As a simple pass-through device between the storage device and the system, once connected up, the simple insertion of the Cipher key will activate the encryption and decryption of the data on the fly with minimal performance degradation. There is no software or driver to install and no special training required. It is as easy as using a key to open a door. The External CipherChain II is Operating System independent and will work on any system.

Any external storage device with eSATA or SATA connection can be attached to the External CipherChain, which in turn connects to any host via an eSATA port. Using an optional Addonics USB 3.1 - eSATA adapter, the External CipherChain can connect to a USB 3.1/3.0 / 2.0 port on any computer. The compact size and rugged metal housing of the External Cipherchain II make it extremely portable and easy to deploy in various environments where applications require absolute data security. The External CipherChain II operates at very low power and can be powered directly by a system using various Addonics optional cables.

Use as a Cipher key programmer
The External CipherChain II can be used for programming or duplicating the Cipher key code using the Addonics RNG software utility (a software sold separately. This allows users to manage their own key code and is highly recommended for multiple units deployment.

Choice of standard Cipher (SC) key or HMAC key (Key - Hash Message Authentication Code)
The standard Cipher key stores the cipher code in plain text. Addonics first generation of CipherChain, Diamond Cipher and Ruby Cipher can only be authenticated with this SC key. This type of key is also compatible with the new CipherChain II product. Although you can use the same key code for both the CipherChain II and the Addonics first generation Cipher products, the encrypted hard drives are not compatible. In other words, drives encrypted in CipherChain II cannot be attached to the first generation of Cipher product and vice versa.

The cipher code in the HMAC key is encrypted. Its authentication requires two ways communication with the CipherChain II and the original encrypted hard drive. The HMAC key cannot be duplicated. The original key file, generated by the Addonics RNG software suite, is required to program additional HMAC key. So when a HMAC key is lost or stolen, the key code cannot be copied or hacked.

 



Security
External CipherChain II is a full disk encryption solution, meaning that the boot sector, partition table, and all the information in the drive are encrypted. When the main drive (boot drive) of a system is connected to the External CipherChain II, the system will be disabled without the Cipher key. Storage devices protected by the External CipherChain II are inaccessible without the Cipher key. If the External CipherChain II encrypted drive is stolen and then is connected to another system, the drive will appear as a brand new drive with no trace of any data. For further security enhancement, External CipherChain II also supports HMAC key (Key-Hash Message Authentication Code).

The AES 256-bit encryption provided by the CipherChain II is considered the highest level of encryption standard there is, secure enough to protect classified information designated as Top Secret. Customers can raise the security level to a more complex level by simply daisy chaining two or more CipherChains II. There is no limit as to the number of CipherChain II that can be linked together in this set-up. It is impossible to penetrate even the encryption of a single CipherChain II. The daisy chaining of two or more CipherChain II will raise the security to another level when a different person controls each Cipher key.


Note on Cipher key code
Each pair of Cipher keys is set with a unique key code. When ordering multiple Cipher kits and extra Cipher keys and wish that all the keys be set to the same key code, please provide instructions at the final checkout when placing the order at our online store. Customers may also e-mail the instructions with reference to the sales order number after final checkout. When ordering from an Addonics reseller or distributor, be sure to leave the instructions when placing the order. Keys can be sent back to Addonics at any time if re-coding is desired there is no charge for re-coding keys, the only charge is the return shipping of the newly re-coded keys.

There is no backdoor for any Addonics encryption product if the Cipher key is lost or stolen.
For models that comes with the SC (standard cipher) key, a pair of keys is included. One of these keys should be kept in a safe, secure location and, if needed, can be sent back to Addonics for duplicating additional keys. If one of the two keys is lost, be sure to make a back up of all the data stored inside the encrypted hard drive prior to sending your last key to Addonics. Addonics is not responsible for keys lost in the mail or the retrieval of the data inside the encrypted hard drive.

For models that come with HMAC key, the unique key file that is used for programming the HMAC key is sent to the customer for safe keeping. Addonics does not keep any record of the key file. In case of a lost or stolen key, the customer will need to send the key file to Addonics to program the key.

For the HMAC key users, we highly recommend ordering the Addonics RNG software suite PRO, available with a license for minimum 30 keys. This software allows you to program the SC or HMAC key with your own code or the random number generator built-in the software.

 

Drive Sanitization
The External External CipherChain II can also be used as a drive sanitization equipment for wiping clean all previous data on a used hard or flash media by using the following operation procedures:

  1. Connect the storage device to be sanitized into device side of the External External CipherChain.
  2. Connect the External External CipherChain to the computer.
  3. Initialize and perform a standard formatting (not quick format) of the hard drive or the flash media.
  4. Transfer unimportant data to completely fill the hard drive or the flash media. This essentially writes over every sector in the hard drive or the flash media with unimportant encrypted data that are not viewable to any OS. The drive or the flash media, when connects directly to a system, will appear like brand new with no trace of any data
  5. Now connect the drive or flash media directly to the computer. Initialize and format the hard drive or the flash media with any OS to use it as a brand new hard drive or media
  • Great for the following applications:
    • Prevent sensitive data from unauthorized access when the storage device is lost or stolen
    • Shipping or transporting storage devices containing sensitive data.
    • Encrypt an entire RAID volume
    • Drive sanitization - wipe clean of old data on used drive or flash media
  • Maximum performance - 6Gbps
  • Support the following storage devices:
  • AES 256-bit encryption - the highest level of encryption standard
  • FIPS 140-2 certified Crypto Module (MX+ from Enova Technology)
  • Full disk encryption. No traceable data when the encrypted drive is connected to any system.
  • Simple to use - no software to run or any password to remember
  • No training required. Encryption / Decryption via a hardware key , just like using a regular key to open a door.
  • Optional HMAC key (Key-Hash Message Authentication Code)
  • Optional RNG software for programming or duplicating Cipher key
  • System connection options -
  • Power options:
    • power adapter (included)
    • USB port using optional USB power cable (AAUSBPCP24)
  • OS independent - can be used on any system
  • Onboard AES 256-bit crypto engine
  • Compatible with SATA I/II/III HDD/SSD
  • Connectors:
    • Host - eSATA
    • Device - eSATA
    • Cipher keyhole - mini USB socket
  • LEDs:
    • Green - for power and the presence of key code
    • Yellow - drive access activity
  • RESET: To clear key code and reset the CipherChain. This also removes the drive icon when the storage device is removed from the CipherChain connected to a hot swap SATA port.
  • Disable RESET jumper - use for disabling the RESET button.
  • Maximum throughput -  6Gbps
  • Input power: 5V @ 150 mA
  • Dimension: 106 x 92 x 24 mm (W x D x H) (4.17 x 3.62 x 0.94 in)
  • Weight: 260 g (9.17 oz)
  • Operating temperature and humidity: 0 °C to + 60 °C, 5% - 95% (non condensing)
  • Storage temperature and humidity: -40 °C to + 85 °C, 5% - 90% humidity

PRODUCTS

CC2-EA256 - (External CipherChain II 6G SATA encryption, ECB)
Content: External CipherChain II 6G SATA encryption main unit, one pair of cipher keys (AAENKEY256-2), 5V power adapter, user guide
Price: 99.95
CC2-EA256U31 - (External CipherChain II, ECB, with eSATA/USB 3.1 host connection)
Content: External CipherChain II 6G SATA encryption main unit, one pair of cipher keys (AAENKEY256-2), 3-foot eSATA cable (AAESATA100C), USB 3.1 - eSATA adapter (ADU31ESP), 5V power adapter (AAPAC5V), user guide
Price: 119.00
CC2-EA256HM - (External CipherChain II 6G SATA encryption with HMAC key)
Content: External CipherChain II 6G SATA encryption main unit, two (2) HMAC keys (AAHMACK) with the same key code, 5V power adapter, user guide
Price: 145.00
CC2-EA256U31HM - (External CipherChain II, with eSATA/USB 3.1 host connection and HMAC key)
Content: External CipherChain II 6G SATA encryption main unit, two (2) HMAC keys (AAHMAC), 3-foot eSATA cable (AAESATA100C), USB 3.1 - eSATA adapter (ADU31ESP), 5V power adapter (AAPAC5V), user guide
Price: 175.00

ACCESSORIES

ASWRNG (RNG programming suite for Cipher key (AAENKEY256 and AAENKEY256-2))
Content: Addonics RNG (Random Number Generator) programming software for cipher key model AAENKEY256 and AAENKEY256-2. Windows 10 compatible. Requires Addonics 6G SATA encryption hardware.
Price: 60.00
AAENKEY256 (1 AES 256-bit Cipher key)
Content: 1 piece of AES-256-bit encryption key
Price: 9.00
AAHMACK (1 AES 256-bit HMAC Cipher key)
Content: 1 piece of AES 256-bit HMAC key. Note: The cipher code file (a .BIN file) is provided in either a CD or email. If the customer wants to receive this file via email, please include the email address in the instruction box on the final check out page when placing the order from our online store. The BIN file is required to program additional cipher keys with the same code. For security purpose, we store the BIN file for up to 30 days only after the product delivery. It is important for the customer to make extra copies of this file and keep them in a safe place once the file is received.
Price: 39.95
AAHMACK-30 (30 AES 256-bit HMAC Cipher keys + RNG software PRO)
Content: 30 pieces of AES 256-bit HMAC keys, RNG software PRO, user guide
Price: 849.00
AAHMACK-50 (50 AES 256-bit HMAC Cipher keys + RNG software PRO)
Content: 50 pieces of AES 256-bit HMAC keys, RNG software PRO, user guide
Price: 1249.00
AAHMACK-100 (100 AES 256-bit HMAC Cipher keys + RNG software PRO)
Content: 100 pieces of AES 256-bit HMAC keys, RNG software PRO, user guide
Price: 2199.00
CKEYEX6 (Cipher key extension cable, 6 feet)
6 feet Cipher key extension cable. Can be used to connect the Cipher key 6 feet from the CipherChain or any Addonics Cipher drive enclosure
Price: 17.95
AAESATA100C (eSATA - eSATA cable, 100 cm.)
Content: 100 cm. eSATA connecting cable with eSATA connectors on both ends. Full compliance with eSATA specification. Great for connecting external storage device with eSATA connector to eSATA host controller.
Price: 9.00
AAESATA200C (eSATA cable, 200 cm (6 ft.))
Content: 200 cm. eSATA connecting cable with eSATA connector on both ends. Full compliance with eSATA specification. Great for connecting external storage device with eSATA connector to eSATA host controller.
Price: 13.99
AASA2SA100C (External eSATA - SATA cable, 100 cm)
AASA2SA100C eSATA to SATA connecting cable, 100 cm. eSATA connector on one end and heavy duty SATA1 (regular SATA connector) on another end. Great for connecting external SATA storage device to eSATA port.
Price: 12.99
ADU31ESP (USB 3.1 to eSATAp adapter)
Content: USB 3.1 to eSATAp Adapter, user guide
Price: 27.95
AAUSBPCP24 (USB power cable 24 center positive)
AAUSBPCP24 USB power cable for all Addonics Pocket drives except Pocket UDD
Price: 5.99