CipherChain II, 6G performance, FIPS certified, full disk encryption

The CipherChain II is the Addonics latest hardware encryption solution that supports the full SATA 3.0 6Gbps speed. Similar to the first generation of CipherChain, the new CipherChain II is FIPS 140-2 certified to ensure meeting the highest encryption standard. Designed for simple deployment, the CipherChain II is a pass-through electronic module connected between the SATA port and any HDD or SSD with standard SATA connection. There is no software or driver to install. Thus the solution is OS independent and can be implemented into any computer or computing equipment that has SATA port.

Simple to use
Similar to all other Addonics encryption products, the CipherChain II is a pure hardware solution, meaning there is no software to run, no driver to install, and no password to remember. There is very little user training required to use the CipherChain II products. All the user needs to do is to insert the correct Cipher key before powering on the system or the storage device. The CipherChain II products are totally operating system independent and this makes the CipherChain II  an ideal security solution for organizations with heterogeneous computing environments and legacy systems.

Easy to install
The CipherChain II family of products is a simple pass-through device that works with any SATA I/II/III hard drive, SSD (Solid State Drive), or storage device with SATA interface. The SATA HDD/SSD to be encrypted is first connected to the device side of the CipherChain and the host side (blue SATA connector) in turn connects to the SATA port on the system board or a SATA controller.

            

 

High Performance
The CipherChain II encrypts and decrypts data on the fly at speed up to 6Gbps using an onboard FIPS 140-2 certified AES crypto engine from Enova Technology. Unlike software encryption products that depend on the system CPU to encrypt and decrypt the data, the CipherChain II has no impact on CPU utilization. This allows the system CPU to perform its computing tasks at normal speed. The CipherChain II has minimal impact on the performance of the hard drive or SSD.

Security
CipherChain II is a full disk encryption solution, meaning that the boot sector, partition table, and all the information in the drive are encrypted. Storage devices protected by the CipherChain II are inaccessible without the Cipher key. If the CipherChain II encrypted drive is stolen and then is connected to another system, the drive will appear as a brand new drive with no trace of any data. For further security enhancement, CipherChain II also supports HMAC key (Key-Hash Message Authentication Code), which cannot be duplicated in case the key is lost or stolen.

The CipherChain II can be used to lock down a system. When the main drive (boot drive) of a system is connected to the CipherChain II, the system cannot be booted without the Cipher key.

Use as a Cipher key programmer
The CipherChain II can be used for programming or duplicating the Cipher key code using the Addonics RNG software utility (a software sold separately). This allows users to manage their own key code and is highly recommended for multiple units deployment.

Choice of standard Cipher (SC) key or HMAC Key (Key-Hash Message Authentication Code)
The standard Cipher key stores the cipher code in plain text. Addonics first generation of CipherChain, Diamond Cipher and Ruby Cipher can only be authenticated with this SC key. This type of key is also compatible with the new CipherChain II product. Although you can use the same key code for both the CipherChain II and the Addonics first generation Cipher products, the encrypted hard drives are not compatible. In other words, drives encrypted in CipherChain II cannot be attached to the first generation of Cipher product and vice versa.

The cipher code in the HMAC key is encrypted. Its authentication requires two ways communication with the CipherChain II and the original encrypted hard drive. The HMAC key cannot be duplicated. The original key file, generated by the Addonics RNG software suite, is required to program additional HMAC key. So when a HMAC key is lost or stolen, the key code cannot be copied or hacked.

 

The CipherChain II is a small module that can fit into practically any computer or storage equipment. Addonics provides a wide variety of mounting brackets to enable the installation of the CipherChain II into various systems via a 3.5" drive bay, a 5.25" drive bay, a slim CD drive bay, a PCI slot, or the SCSI-I (Centronics 50) punch out commonly found on many external drive enclosures. There are also a dual CipherChain brackets for installing up to two CipherChain II modules to encrypt as many as two storage devices (one for the boot drive and one for the secondary data drive for example). Since each CipherChain II works independently, a customer may install as many CipherChain II as needed to secure all the storage devices in a system. Depending on the security control strategy, a customer may use Cipher key with the same or different key code for each CipherChain.

 CipherChain II module

 

 

Below are  choice of CipherChain II kits with CipherChain II module installed on various type of mounting brackets

CipherChain II module mounted on a 3.5" bay bracket
(model: CC2-35MK1)


Two CipherChain II module mounted on a 3.5" bay bracket
(model: CC2-35MK2)

CipherChain II module mounted on a standard height PCI bracket (model: CC2-SPC1)

can be mounted onto a SCSI-I (Centronics 50) punch out by removing the PCI bracket

 

 Two CipherChain II module mounted on a standard height PCI bracket (model: CC2-SP2)

can be mounted onto a SCSI-I (Centronics 50) punch out by removing the PCI bracket

CipherChain II module mounted on a slim CD bay bracket
(model: CC2-SCD1)

CipherChain II module mounted on a slim CD bay bracket
(model: CC2-SCD2)

 


The AES 256-bit encryption provided by the CipherChain II is considered the highest level of encryption standard there is, secure enough to protect classified information designated as Top Secret. Customers can raise the security level to a more complex level by simply daisy chaining two or more CipherChains II. There is no limit as to the number of CipherChain II that can be linked together in this set-up. It is impossible to penetrate even the encryption of a single CipherChain II. The daisy chaining of two or more CipherChain II will raise the security to another level when a different person controls each Cipher key.

Note on Cipher key code
Each pair of Cipher keys is set with a unique key code. When ordering multiple Cipher kits and extra Cipher keys and wish that all the keys be set to the same key code, please provide instructions at the final checkout when placing the order at our online store. Customers may also e-mail the instructions with reference to the sales order number after final checkout. When ordering from an Addonics reseller or distributor, be sure to leave the instructions when placing the order. Keys can be sent back to Addonics at any time if re-coding is desired there is no charge for re-coding keys, the only charge is the return shipping of the newly re-coded keys.

There is no backdoor for any Addonics encryption product if the Cipher key is lost or stolen.
For models that comes with the SC (standard cipher) key, a pair of keys is included. One of these keys should be kept in a safe, secure location and, if needed, can be sent back to Addonics for duplicating additional keys. If one of the two keys is lost, be sure to make a back up of all the data stored inside the encrypted hard drive prior to sending your last key to Addonics. Addonics is not responsible for keys lost in the mail or the retrieval of the data inside the encrypted hard drive.

For models that come with HMAC key, the key file that is used for programming the HMAC key is sent to the customer for safe keeping. Addonics doe not keep any record of the key file. In case of a lost or stolen key, the customer will need to send the key file to Addonics to program the key.

For the HMAC key users, we highly recommend ordering the Addonics RNG software suite PRO version, available with a license for minimum 30 keys. This software allows you to program the SC or HMAC key with your own code or the random number generator built-in the software.

  • Great for the following applications:
    • Secure or lock down a system from unauthorized access
    • Prevent sensitive data from unauthorized access when the storage device is lost or stolen
    • Shipping or transporting storage devices containing sensitive data
    • Encrypt an entire RAID volume or a specific storage device within a RAID volume
  • High performance - up to 6Gbps (actual performance depends on the speed of the storage device)
  • No measurable performance degradation to the SATA HDD/SSD
  • Supports encrypting the following storage devices:
  • AES 256-bit encryption - the highest level of encryption standard
  • FIPS 140-2 certified Crypto Module (MX+ crypto engine from Enova Technology)
  • Full disk encryption. No traceable data when the encrypted drive is connected to any system
  • No training required. Encryption/decryption via a hardware key, just like using a regular key to open a door.
  • A pair of Cipher keys is included with each CipherChain II kit
  • Choice of standard Cipher key or HMAC key (Key-Hash Message Authentication Code)
  • Easily mounts into any system via either a drive bay or a PCI slot
  • Installs into external storage enclosures such as Addonics Storage Towers and Storage Rack via the SCSI - 1 punch-out or one of the drive bays.
  • Optional RNG software suite for programming or duplicating the Cipher key
  • Multiple CipherChains can be daisy chained to achieve incredibly complex security level.
  • OS independent - can be used on any system

 

Cipher Key programming software
For organization with large deployment, you may consider managing your own keys by ordering the optional RNG software suite

  • Onboard AES 256-bit crypto engine
  • Support SATA 1.0, 2.0 and 3.0 speed
  • SATA connectors:
    • Blue marking - for connecting to host
    • Black - for connecting to device
  • LEDs:
    • Green - for power and the presence of key code
    • Yellow - drive access activity
  • RESET: To clear key code and reset the CipherChains. This also removes the drive icon when the storage device is removed from the CipherChain and the connected SATA supports hot swap
  • Disable RESET jumper - to disable the RESET button.
  • Maximum throughput -  up to 6Gbps via SATA or USB 3.1 connection
  • Small 4-P power connector
  • Input power: 5V @ 150 mA
  • Dimension: 41 x 48.5 x 8 mm (1.61 x 1.9 x .31 in)
  • Weight: 12 g (0.4 oz)
  • Operating temperature and humidity: 0 °C to + 75 °C, 5% - 95% (non-condensing)
  • Storage temperature and humidity: -40 °C to + 85 °C, 5% - 90% humidity

System requirements:

  • Any system with 1 available SATA port
  • Standard 4P Molex power connector or floppy drive power connector
  • One of the following mounting options:
    • 3.5" drive bay
    • 5.25" drive bay (requires optional 3.5" to 5.25" drive bay mounting bracket)
    • slim CD drive bay
    • PCI slot
    • SCSI-I punch out
  • OS: any operating system


Note on Cipher key code

Each pair of Cipher keys is set with a unique key code. When ordering multiple Cipher kits and extra Cipher keys and wish that all the keys be set to the same key code, please provide instructions at the final checkout when placing the order at our online store. Customers may also e-mail the instructions with reference to the sales order number after final checkout. When ordering from an Addonics reseller or distributor, be sure to leave the instructions when placing the order. Keys can be sent back to Addonics at any time if re-coding is desired there is no charge for re-coding keys, the only charge is the return shipping of the newly re-coded keys.

PRODUCTS

CC2-35MK1 - (CipherChain II 6G SATA encryption module on 3.5" bay brkt)
Content: CipherChain II kit with single CipherChain II 6G SATA encryption module mounted on 3.5" bay bracket, one pair of standard cipher key (AAENKEY256-2), user guide.
Price: 79.00
CC2-35MK2 - (Dual CipherChain II 6G SATA encryption module on 3.5" bay brkt)
Content: CipherChain II kit with two (2) CipherChain II 6G SATA encryption modules mounted on 3.5" bay bracket, two (2) pairs of standard cipher keys (AAENKEY256-2), user guide.
Price: 149.00
CC2-SPC1 - (CipherChain II 6G SATA encryption module on SCSI1 & PCI brkt)
Content: CipherChain II kit with single CipherChain II 6G SATA encryption module mounted on SCSI-1 and PCI bracket, 1 pair of standard cipher key (AAENKEY256-2), user guide.
Price: 79.00
CC2-SPC2 - (Dual CipherChain II 6G SATA encryption module on SCSI1 & PCI brkt)
Content: CipherChain II kit with two (2) CipherChain II 6G SATA encryption modules mounted on SCSI-1 and PCI bracket, Two (2) pairs of standard cipher keys (AAENKEY256-2), user guide.
Price: 149.00
CC2-SCD1 - (CipherChain II 6G SATA encryption module on slim CD bay brkt)
Content: CipherChain II kit with single CipherChain II 6G SATA encryption module mounted on slim CD bay bracket, one pair of standard cipher key (AAENKEY256-2), user guide.
Price: 79.00
CC2-SCD2 - (Dual CipherChain II 6G SATA encryption module on slim CD bay brkt)
Content: CipherChain II kit with two (2) CipherChain II 6G SATA encryption modules mounted on slim CD bay bracket, two pairs of standard cipher keys (AAENKEY256-2), user guide.
Price: 149.00
CC2-AES256M - (CipherChain II SATA 6G, AES 256-bit module, ECB )
Content: CipherChain II, AES 256-bit encryption module for support of full SATA 6G speed and cipher key programming capability. Cipher key is not included.
Price: 59.95
CC2-35MK1HM - (CipherChain II encryption module on 3.5" bay bracket with HMAC key)
Content: CipherChain II kit with single CipherChain II 6G SATA encryption module mounted on 3.5" bay bracket, two HMAC keys with same key code (AAHMACK), user guide.
Price: 125.00
CC2-35MK2HM - (Dual CipherChain II encryption module on 3.5" bay bracket with HMAC key)
Content: CipherChain II kit with two (2) CipherChain II 6G SATA encryption modules mounted on 3.5" bay bracket, four (4) HMAC keys (AAHMACK) with two different codes, user guide.
Price: 245.00
CC2-SPC1HM - (CipherChain II encryption module on SCSI1 & PCI bracket with HMAC key)
Content: CipherChain II kit with single CipherChain II 6G SATA encryption module mounted on SCSI-1 and PCI bracket, two (2) HMAC keys (AAHMACK) with same key codes, user guide.
Price: 125.00
CC2-SPC2HM - (Dual CipherChain II encryption module on SCSI1 & PCI brkt with HMAC key)
Content: CipherChain II kit with two (2) CipherChain II 6G SATA encryption modules mounted on SCSI-1 and PCI bracket, four (4) HMAC keys (AAHMACK) with 2 different key codes, user guide.
Price: 245.00
CC2-SCD1HM - (CipherChain II encryption module on slim CD bay bracket with HMAC key)
Content: CipherChain II kit with single CipherChain II 6G SATA encryption module mounted on slim CD bay bracket, two (2) HMAC keys (AAHMACK)with same key code, user guide.
Price: 125.00
CC2-SCD2HM - (Dual CipherChain II encryption module on slim CD bay bracket with HMAC key)
Content: CipherChain II kit with two (2) CipherChain II 6G SATA encryption modules mounted on slim CD bay bracket, four (4) HMAC keys (AAHMACK) with 2 different key codes, user guide.
Price: 245.00
CC2-AES256M - (CipherChain II SATA 6G, AES 256-bit module, ECB )
Content: CipherChain II, AES 256-bit encryption module for support of full SATA 6G speed and cipher key programming capability. Cipher key is not included.
Price: 59.95

ACCESSORIES

ASWRNG (RNG programming suite for Cipher key (AAENKEY256 and AAENKEY256-2))
Content: Addonics RNG (Random Number Generator) programming software for cipher key model AAENKEY256 and AAENKEY256-2. Windows 10 compatible. Requires Addonics 6G SATA encryption hardware.
Price: 60.00
AAENKEY256 (1 AES 256-bit Cipher key)
Content: 1 piece of AES-256-bit encryption key
Price: 9.00
AAHMACK (1 AES 256-bit HMAC Cipher key)
Content: 1 piece of AES 256-bit HMAC key. Note: The cipher code file (a .BIN file) is provided in either a CD or email. If the customer wants to receive this file via email, please include the email address in the instruction box on the final check out page when placing the order from our online store. The BIN file is required to program additional cipher keys with the same code. For security purpose, we store the BIN file for up to 30 days only after the product delivery. It is important for the customer to make extra copies of this file and keep them in a safe place once the file is received.
Price: 39.95
AAHMACK-30 (30 AES 256-bit HMAC Cipher keys + RNG software PRO)
Content: 30 pieces of AES 256-bit HMAC keys, RNG software PRO, user guide
Price: 849.00
AAHMACK-50 (50 AES 256-bit HMAC Cipher keys + RNG software PRO)
Content: 50 pieces of AES 256-bit HMAC keys, RNG software PRO, user guide
Price: 1249.00
AAHMACK-100 (100 AES 256-bit HMAC Cipher keys + RNG software PRO)
Content: 100 pieces of AES 256-bit HMAC keys, RNG software PRO, user guide
Price: 2199.00
PCISCBKT (CipherChain PCI brkt, used /w SCSI1 brkt)
PCI bracket to mount any SCSI 1 device such as Addonics rack mount PM or CipherChain onto a PCI slot of a Desktop system.
Price: 2.50
AAMK53 (3.5" drive bracket for 5.25" Bay-Black)
5 1/4inch drive bay mounting bracket (black) for 3.5inch removable drive such as Addonics internal DigiDrive, 2.5inch Mobile Rack, MO or Iomega ZIP,
Price: 7.00
AA4PYFFCBL (4 Pin male to 4 Pin female & floppy pwr )
AA4PYFFCBL 4P male to 4P female and Floppy female Y power cables
Price: 2.99
CKEYEX6 (Cipher key extension cable, 6 feet)
6 feet Cipher key extension cable. Can be used to connect the Cipher key 6 feet from the CipherChain or any Addonics Cipher drive enclosure
Price: 17.95
AAHPISC8 (High performce 8" internal SATA cable)

AAHPISC8     Content:  High Performance 8" internal Serial ATA data cable

For more detail, visit product web page www.addonics.com/products/aahpsac.php

Price: 3.50
AAHPISC18 (High performce 18" internal SATA cable)

AAHPISC18     Content:  High Performance 18" internal Serial ATA data cable

For more detail, visit product web page www.addonics.com/products/aahpsac.php

Price: 3.50