From 5a63585f7e763cd5ccc4d7d120e7b96012561d7a Mon Sep 17 00:00:00 2001
From: Mounir IDRASSI
Two ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with Kuznyechik (256-bit key) in XTS mode and then with Camellia (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.
+Two ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with Serpent (256-bit key) in XTS mode and then with Camellia (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.
+Two ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode and then with Kuznyechik (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.
+Three ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with Camellia (256-bit key) in XTS mode, then with Serpent (256- bit key) in XTS mode, and finally with Kuznyechik (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All + encryption keys are mutually independent (note that header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.
+Two ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with Twofish (256-bit key) in XTS mode and then with Kuznyechik (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.
Two ciphers in a cascade [15, 16] operating in XTS mode (see the section Modes of Operation). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode and then with Serpent (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that diff --git a/doc/html/Encryption Algorithms.html b/doc/html/Encryption Algorithms.html index 0619fd65..59bf2eaf 100644 --- a/doc/html/Encryption Algorithms.html +++ b/doc/html/Encryption Algorithms.html @@ -154,6 +154,66 @@ XTS