Encryption Algorithms
VeraCrypt volumes can be encrypted using the following algorithms:
Algorithm | Designer(s) |
Key Size (Bits) |
Block Size (Bits) | Mode of Operation |
---|---|---|---|---|
AES | J. Daemen, V. Rijmen | 256 | 128 | XTS |
Camellia |
Mitsubishi Electric and NTT of Japan |
256 | 128 | XTS |
National Standard of the Russian Federation |
256 | 128 | XTS | |
Serpent | R. Anderson, E. Biham, L. Knudsen | 256 | 128 | XTS |
Twofish |
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson |
256 | 128 | XTS |
AES-Twofish | 256; 256 | 128 | XTS | |
AES-Twofish-Serpent | 256; 256; 256 | 128 | XTS | |
Camellia-Kuznyechik | 256; 256 | 128 | XTS | |
Camellia-Serpent | 256; 256 | 128 | XTS | |
Kuznyechik-AES | 256; 256 | 128 | XTS | |
Kuznyechik-Serpent-Camellia | 256; 256; 256 | 128 | XTS | |
Kuznyechik-Twofish | 256; 256 | 128 | XTS | |
Serpent-AES | 256; 256 | 128 | XTS | |
Serpent-Twofish-AES | 256; 256; 256 | 128 | XTS | |
Twofish-Serpent | 256; 256 | 128 | XTS | |
For information about XTS mode, please see the section
Modes of Operation.