VeraCrypt

Documentation >> Encryption Algorithms

Encryption Algorithms

VeraCrypt volumes can be encrypted using the following algorithms:
Algorithm Designer(s) Key Size
(Bits)
Block Size (Bits) Mode of Operation
         
AES J. Daemen, V. Rijmen 256 128 XTS
Camellia

Mitsubishi Electric and NTT of Japan

256 128 XTS

Kuznyechik

National Standard of the Russian Federation
GOST R 34.12-2015

256  128  XTS
Serpent R. Anderson, E. Biham, L. Knudsen 256 128 XTS
Twofish B. Schneier, J. Kelsey, D. Whiting,
D. Wagner, C. Hall, N. Ferguson
256 128 XTS
AES-Twofish   256; 256 128 XTS
AES-Twofish-Serpent   256; 256; 256 128 XTS
Camellia-Kuznyechik   256; 256 128 XTS
Camellia-Serpent   256; 256 128 XTS
Kuznyechik-AES   256; 256 128 XTS
Kuznyechik-Serpent-Camellia   256; 256; 256 128 XTS
Kuznyechik-Twofish   256; 256 128 XTS
Serpent-AES   256; 256 128 XTS
Serpent-Twofish-AES   256; 256; 256 128 XTS
Twofish-Serpent   256; 256 128 XTS
         
For information about XTS mode, please see the section Modes of Operation.
Next Section >>
ref='#n808'>808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024