Kingston Technology 2048MB DataTraveler Elite KUSBDTE/2GB User Manual

Product codes
KUSBDTE/2GB
Page of 11
DataTraveler Elite White Paper 
 
privacy zone is created using the TravelerSafe+ console, data stored there will be encrypted using the 
Advanced Encryption Standard (AES-128): 
 
 
Public Zone
Privacy Zone
(AES Encrypted)
 
 
 
 
 
 
 
 
 
DT Elite with public and encrypted, password-protected  
privacy zone (shown in red) 
 
Without a valid password, unauthorized access to the privacy zone is blocked, and the data remains 
encrypted and protected. Whenever the DT Elite is connected to a host computer, the TravelerSafe+ 
console needs to be used to log into and access the privacy zone: 
 
 
Public Zone
Privacy Zone
(AES Encrypted)
Public Zone
Privacy Zone
(AES Encrypted)
TravelerSafe+
User Authentication
User
User
 
 
 
 
 
 
 
   The 
privacy 
zone 
can 
only 
be accessed after valid password logon 
 
Unlike other software consoles that allow unlimited numbers of incorrect passwords, DT Elite has a 
factory-set limit that locks the privacy zone after 25 consecutive failed attempts to log in. This limit 
blocks “Brute Force Attacks,” in which programs are used to test millions of password combinations 
to find the correct password. After 25 consecutive invalid attempts, the DT Elite will lock out the 
privacy zone; the only option left at this point is to reformat the drive, thus losing all the encrypted 
data stored in the privacy zone. 
 
1.2 Hardware-Based, Real-Time Data Encryption 
 
Cryptography is the science of encrypting and decrypting data using a special “key” to encode and 
decode the data. Unencrypted data (or files) are processed through an encryption engine (either in 
software or in hardware) to produce an encrypted file; without the exact key, the data is unusable.   
 
Every DT Elite features one of the industry’s best, most robust data encryption capabilities. The DT 
Elite’s encryption technology is based upon the same standard used in high-security applications – the 
Advanced Encryption Standard (AES). Keys are sequences of bits (128 in the case of AES-128) which 
are used by the encryption/decryption engine to uniquely process the data. 
 
Rev. 0.98 
 
Page   3