logo
BitlockerAny Full-drive Encryption Programs on Linux

Any Linux Full-Drive Encryption Tool as Convenient as BitLocker

My computer runs on the Linux Ubuntu system. I used to use BitLocker for full disk encryption when I was using the Windows 11 system. However, it seems that BitLocker doesn’t work on Linux systems. So, I’m very depressed, with the impulse to know that does Linux have any full-drive encryption programs as convenient as BitLocker?

author

Lydia

BitLocker is a robust encryption feature, only available in specific Windows versions, including Windows 10 Pro, Enterprise, Education, Windows 8 Pro and Enterprise, as well as Windows 7 Ultimate and Enterprise. The principle of BitLocker is to use TPM for boot measurement. As long as the boot process has not been tampered with, there is no need to verify the BitLocker password.

You can read Access BitLocker in Linux Ubuntu System to learn how to view files encrypted by the BitLocker. And for achieve whole disk encryption similar to BitLocker in Linux, the following two tools may help you.

Tool 1: Using LUKS Encryption

LUKS (Linux Unified Key Setup) is one of the most widely used disk encryption methods in Linux. It is seamlessly integrated into many Linux distributions during the installation process.

Linux Unified Key Setup

Users can encrypt entire partitions or drives with LUKS, and it supports multiple encryption algorithms, including AES and Twofish. LUKS also allows for passphrase-based or key-file-based authentication, making it flexible and convenient for users. The pic below illustrates how LUKS works.

Structure of LUKS

Steps to use LUKS Encryption:

Step 1Install Cryptsetup: Cryptsetup needs to be installed first, following commands below.

sudo apt-get update

sudo apt-get install cryptsetup

Step 2Create Encrypted Volume: Create a new encrypted volume using command below, specifying the target device (/dev/sdd). Enter the encryption password when prompted. This password is essential in the process of Linux decryption.

# cryptsetup -s 512 luksFormat /dev/sdd

LUKS Format Command

Step 3Encrypt Partitions with Key Files:

First you need to generate a random key file:

# dd if=/dev/urandom of=/root/enc.key bs=1 count=4096

Then add the key file as one of the passwords, the "/root/enc.key" is the location of key file:

# cryptsetup luksAddKey /dev/sdd /root/enc.key

Add Random Secret Key

Step 4Remove decryption password (Optional):

To remove normal password:

# cryptsetup luksRemoveKey /dev/sdd

Remove LUKS Password

To remove key file password:

# cryptsetup luksRemoveKey -d /root/enc.key /dev/sdd

It is worth noting that, though LUKS supports multiple password protections, remember never to remove all passwords. Remain one password at least to access the device, as the removal operation is irreversible.

Step 5Open Encrypted Volume: "myusb" is the name for the volume.

# cryptsetup luksOpen /dev/sdd myusb

Unlock LUKS Volume

Step 6Format Encrypted Volume: After opening the encrypted volume, it needs to be formatted as a filesystem for use. Using the following command to format it as the ext4 filesystem.

# mkfs.ext4 /dev/mapper/myusb

mkfs with Device Mapper Volume

Step 7Mount Encrypted Volume: Mount the formatted encrypted volume to a directory.

# mount /dev/mapper/myusb /mnt/

Mount Device Mapper Volume

Step 8Close Encrypted Volume: While done, close the encrypted volume using cryptsetup luksClose.

# cryptsetup luksClose my_encrypted_volume

Tool 2: Using Cryptsetup

Cryptsetup is a set of Linux utilities for setting up disk encryption using LUKS. It provides command-line tools for creating, managing, and accessing encrypted volumes, offering flexibility and control to users who prefer a command-line interface. Make sure you've installed Cryptsetup, then start following steps.

Step 1Create Encrypted Volume: you can specify encryption parameters like cipher, key size, hash, iteration time, etc.

sudo cryptsetup --cipher aes-xts-plain64 --key-size 256 --hash sha256 --iter-time 2000 --use-random luksFormat /dev/sdX

Step 2Open Encrypted Volume: In this command, "my_encrypted_volume" is the name you've assigned to the encrypted volume, which you can replace as needed.

sudo cryptsetup open --type luks /dev/sdX my_encrypted_volume

Step 3Format Encrypted Volume:

sudo mkfs.ext4 /dev/mapper/my_encrypted_volume

Step 4Mount Encrypted Volume:

sudo mount /dev/mapper/my_encrypted_volume /mnt

Step 5Close Encrypted Volume:

sudo cryptsetup close my_encrypted_volume

Conclusion:

With so many Linux full-drive encryption tools that offer convenience and robust security to choose, just pick one that meets your need. Or you can run a dual-boot Windows 10 system to access to BitLocker Drive Encryption feature.

People Also Ask

How can I access BitLocker in Linux Ubuntu System?

Sure, of course you can access BitLocker in the Linux Ubuntu system. Just need to install some practical utilities.

author Lydia

What is BitLocker on Windows, and what is it used for?

BitLocker is a disk/volume encryption feature included in Windows systems since Windows Vista. It helps mitigate the risk of personal data leaks.

author Benjamin

Does BitLocker Work on Windows 10 Home?

First, you should know that BitLocker is not available on Windows 10 Home edition. Microsoft only supports it on Windows 10 Pro and Enterprise editions.

author Michael

Is BitLocker Drive Encryption windows 11 safe?

Rest assured, BitLocker Drive Encryption on Windows is widely considered of highly secure safeguarding utility, offering a strong defense for valuable data.

author Lydia