Datasheet
Table Of Contents

DataTraveler Elite White Paper
Without the unique 128-bit key, which is uniquely generated for the DT Elite utilizing a true random
number generator, encrypted data is nearly impossible to decode.
1.3 Software-Based Encryption vs. DT Elite’s Hardware-Based AES Encryption
1.3.1 Software-Based Encryption
Host Computer
Encryption
Program
USB Flash Drive
Encrypted
File
Flash
Memory
And
USB Controller
Flash
Memory
Storage
Unencrypted
Files
1101101010……..……1000010110
1101101010……..……1000010110
Key
1101101010……..……1000010110
1101101010……..……1000010110
Key
Software-Based Encryption
In this case, the user has to explicitly run a program to encrypt a file. When the file is encrypted, the
file can then be copied to the USB Flash drive.
When run on host computers, encryption and decryption programs take up a lot of processor resources
and reduce overall system performance.
1.3.2 DT Elite’s Hardware-Based Encryption
Because the processor-intense AES encryption/decryption is done through a DT Elite dedicated co-
processor, the DT Elite offers an industry-leading performance level over software encryption
programs.
Privacy
Partition
Flash Memory
And USB
Controller
AES
Co-Processor
Kingston DataTraveler Elite
Host ComputerHost Computer
Unencrypted
Files
Encrypted
Files
1101101010……..……1000010110 1101101010……..……1000010110
Key
1101101010……..……1000010110 1101101010……..……1000010110
Key
DT Elite has a Built-in AES-128 Encryption Co-Processor
Rev. 0.98 Page 5