The External CipherChain II is a unique security tool that you can use for a variety of storage applications. Built on a FIPS certified AES 256-bit crypto engine, the External CipherChain II is the perfect solution to secure sensitive data stored on external RAID storage, hard drive, SSD. You can even secure popular flash media when connected to the External CipherChain by using the Addonics Pocket UDD25. The External CipherChain II can also be used as a drive sanitization tool for removing any sensitive data stored on a used hard drive or flash media.
The External CipherChain II uses the same CipherChain II encryption module to ensure full SATA 6G performance. This device is very easy-to-use and implement. As a simple pass-through device between the storage device and the system, once connected up, the simple insertion of the Cipher key will activate the encryption and decryption of the data on the fly with minimal performance degradation. There is no software or driver to install and no special training required. It is as easy as using a key to open a door. The External CipherChain II is Operating System independent and will work on any system.
Any external storage device with eSATA or SATA connection can be attached to the External CipherChain, which in turn connects to any host via an eSATA port. Using an optional Addonics USB 3.1 - eSATA adapter, the External CipherChain can connect to a USB 3.1/3.0 / 2.0 port on any computer. The compact size and rugged metal housing of the External Cipherchain II make it extremely portable and easy to deploy in various environments where applications require absolute data security. The External CipherChain II operates at very low power and can be powered directly by a system using various Addonics optional cables.
Use as a Cipher key programmer
The External CipherChain II can be used for programming or duplicating the Cipher key code using the Addonics RNG software utility (a software sold separately. This allows users to manage their own key code and is highly recommended for multiple units deployment.
Choice of standard Cipher (SC) key or HMAC key (Key - Hash Message Authentication Code)
The standard Cipher key stores the cipher code in plain text. Addonics first generation of CipherChain, Diamond Cipher and Ruby Cipher can only be authenticated with this SC key. This type of key is also compatible with the new CipherChain II product. Although you can use the same key code for both the CipherChain II and the Addonics first generation Cipher products, the encrypted hard drives are not compatible. In other words, drives encrypted in CipherChain II cannot be attached to the first generation of Cipher product and vice versa.
The cipher code in the HMAC key is encrypted. Its authentication requires two ways communication with the CipherChain II and the original encrypted hard drive. The HMAC key cannot be duplicated. The original key file, generated by the Addonics RNG software suite, is required to program additional HMAC key. So when a HMAC key is lost or stolen, the key code cannot be copied or hacked.
Security
External CipherChain II is a full disk encryption solution, meaning that the boot sector, partition table, and all the information in the drive are encrypted. When the main drive (boot drive) of a system is connected to the External CipherChain II, the system will be disabled without the Cipher key. Storage devices protected by the External CipherChain II are inaccessible without the Cipher key. If the External CipherChain II encrypted drive is stolen and then is connected to another system, the drive will appear as a brand new drive with no trace of any data. For further security enhancement, External CipherChain II also supports HMAC key (Key-Hash Message Authentication Code).
The AES 256-bit encryption provided by the CipherChain II is considered the highest level of encryption standard there is, secure enough to protect classified information designated as Top Secret. Customers can raise the security level to a more complex level by simply daisy chaining two or more CipherChains II. There is no limit as to the number of CipherChain II that can be linked together in this set-up. It is impossible to penetrate even the encryption of a single CipherChain II. The daisy chaining of two or more CipherChain II will raise the security to another level when a different person controls each Cipher key.
Note on Cipher key code
Each pair of Cipher keys is set with a unique key code. When ordering multiple Cipher kits and extra Cipher keys and wish that all the keys be set to the same key code, please provide instructions at the final checkout when placing the order at our online store. Customers may also e-mail the instructions with reference to the sales order number after final checkout. When ordering from an Addonics reseller or distributor, be sure to leave the instructions when placing the order. Keys can be sent back to Addonics at any time if re-coding is desired there is no charge for re-coding keys, the only charge is the return shipping of the newly re-coded keys.
There is no backdoor for any Addonics encryption product if the Cipher key is lost or stolen.
For models that comes with the SC (standard cipher) key, a pair of keys is included. One of these keys should be kept in a safe, secure location and, if needed, can be sent back to Addonics for duplicating additional keys. If one of the two keys is lost, be sure to make a back up of all the data stored inside the encrypted hard drive prior to sending your last key to Addonics. Addonics is not responsible for keys lost in the mail or the retrieval of the data inside the encrypted hard drive.
For models that come with HMAC key, the unique key file that is used for programming the HMAC key is sent to the customer for safe keeping. Addonics does not keep any record of the key file. In case of a lost or stolen key, the customer will need to send the key file to Addonics to program the key.
For the HMAC key users, we highly recommend ordering the Addonics RNG software suite PRO, available with a license for minimum 30 keys. This software allows you to program the SC or HMAC key with your own code or the random number generator built-in the software.
Drive Sanitization
The External External CipherChain II can also be used as a drive sanitization equipment for wiping clean all previous data on a used hard or flash media by using the following operation procedures: