Version Information



Yüklə 5,12 Kb.
Pdf görüntüsü
səhifə59/130
tarix07.01.2024
ölçüsü5,12 Kb.
#205371
1   ...   55   56   57   58   59   60   61   62   ...   130
TrueCrypt User Guide

AES-Twofish-Serpent 
Three ciphers in a cascade [15, 16] operating in XTS mode (see the section 
Modes of Operation
). 
Each 128-bit block is first encrypted with Serpent (256-bit key) in XTS mode, then with Twofish 
(256-bit key) in XTS mode, and finally with AES (256-bit key) in XTS mode. Each of the cascaded 
ciphers uses its own key. All encryption keys are mutually independent (note that header keys are 
independent too, even though they are derived from a single password – see the section 
Header 
Key Derivation, Salt, and Iteration Count
). See above for information on the individual cascaded 
ciphers. 
* These are positive votes. If negative votes are subtracted from the positive votes, the following results are obtained: 
Rijndael: 76 votes, Serpent: 52 votes, Twofish: 10 votes, RC6: -14 votes, MARS: -70 votes [19]. 


77 
Serpent-AES 
Two ciphers in a cascade [15, 16] operating in XTS mode (see the section 
Modes of Operation
). 
Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode and then with Serpent 
(256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are 
mutually independent (note that header keys are independent too, even though they are derived 
from a single password – see the section 
Header Key Derivation, Salt, and Iteration Count
). See 
above for information on the individual cascaded ciphers. 
Serpent-Twofish-AES 
Three ciphers in a cascade [15, 16] operating in XTS mode (see the section 
Modes of Operation
). 
Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode, then with Twofish (256-
bit key) in XTS mode, and finally with Serpent (256-bit key) in XTS mode. Each of the cascaded 
ciphers uses its own key. All encryption keys are mutually independent (note that header keys are 
independent too, even though they are derived from a single password – see the section 
Header 
Key Derivation, Salt, and Iteration Count
). See above for information on the individual cascaded 
ciphers. 

Yüklə 5,12 Kb.

Dostları ilə paylaş:
1   ...   55   56   57   58   59   60   61   62   ...   130




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin