From 5a63585f7e763cd5ccc4d7d120e7b96012561d7a Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Tue, 27 Mar 2018 13:57:25 +0200 Subject: Documentation: document newly added cascades of cipher algorithms (Camellia-Kuznyechik, Camellia-Serpent, Kuznyechik-AES, Kuznyechik-Serpent-Camellia and Kuznyechik-Twofish) --- doc/chm/VeraCrypt User Guide.chm | Bin 1925287 -> 1923777 bytes doc/html/Cascades.html | 25 +++++++++++++++ doc/html/Encryption Algorithms.html | 60 ++++++++++++++++++++++++++++++++++++ 3 files changed, 85 insertions(+) (limited to 'doc') diff --git a/doc/chm/VeraCrypt User Guide.chm b/doc/chm/VeraCrypt User Guide.chm index 67c496f0..f7cb3196 100644 Binary files a/doc/chm/VeraCrypt User Guide.chm and b/doc/chm/VeraCrypt User Guide.chm differ diff --git a/doc/html/Cascades.html b/doc/html/Cascades.html index baebdef0..3f5a0822 100644 --- a/doc/html/Cascades.html +++ b/doc/html/Cascades.html @@ -47,6 +47,31 @@ Modes of Operation). Each 128-bit block is first encrypted with Serpent (256-bit key) in XTS mode, then with Twofish (256-bit key) in XTS mode, and finally with AES (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that header keys are independent too, even though they are derived from a single password – see the section Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.

+

Camellia-Kuznyechik

+

Two ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with Kuznyechik (256-bit key) in XTS mode and then with Camellia (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.

+

Camellia-Serpent

+

Two ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with Serpent (256-bit key) in XTS mode and then with Camellia (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.

+

Kuznyechik-AES

+

Two ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode and then with Kuznyechik (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.

+

Kuznyechik-Serpent-Camellia

+

Three ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with Camellia (256-bit key) in XTS mode, then with Serpent (256- bit key) in XTS mode, and finally with Kuznyechik (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All + encryption keys are mutually independent (note that header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.

+

Kuznyechik-Twofish

+

Two ciphers in a cascade [15, 16] operating in XTS mode (see the section +Modes of Operation). Each 128-bit block is first encrypted with Twofish (256-bit key) in XTS mode and then with Kuznyechik (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see the section +Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.

Serpent-AES

Two ciphers in a cascade [15, 16] operating in XTS mode (see the section Modes of Operation). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode and then with Serpent (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that diff --git a/doc/html/Encryption Algorithms.html b/doc/html/Encryption Algorithms.html index 0619fd65..59bf2eaf 100644 --- a/doc/html/Encryption Algorithms.html +++ b/doc/html/Encryption Algorithms.html @@ -154,6 +154,66 @@ XTS +Camellia-Kuznyechik + +  + +256; 256 + +128 + +XTS + + + +Camellia-Serpent + +  + +256; 256 + +128 + +XTS + + + +Kuznyechik-AES + +  + +256; 256 + +128 + +XTS + + + +Kuznyechik-Serpent-Camellia + +  + +256; 256; 256 + +128 + +XTS + + + +Kuznyechik-Twofish + +  + +256; 256 + +128 + +XTS + + + Serpent-AES   -- cgit v1.2.3