VeraCrypt

Documentation >> Encryption Algorithms

Encryption Algorithms

VeraCrypt volumes can be encrypted using the following algorithms:
Algorithm Designer(s) Key Size
(Bits)
Block Size (Bits) Mode of Operation
         
AES J. Daemen, V. Rijmen 256 128 XTS
Camellia

Mitsubishi Electric and NTT of Japan

256 128 XTS

Kuznyechik

National Standard of the Russian Federation
GOST R 34.12-2015

256  128  XTS
Serpent R. Anderson, E. Biham, L. Knudsen 256 128 XTS
SM4 Data Assurance & Communication Security Center, Chinese Academy of Sciences
GB/T 32907-2016
128 128 XTS
Twofish B. Schneier, J. Kelsey, D. Whiting,
D. Wagner, C. Hall, N. Ferguson
256 128 XTS
AES-Twofish   256; 256 128 XTS
AES-Twofish-Serpent   256; 256; 256 128 XTS
Camellia-Kuznyechik   256; 256 128 XTS
Camellia-Serpent   256; 256 128 XTS
Kuznyechik-AES   256; 256 128 XTS
Kuznyechik-Serpent-Camellia   256; 256; 256 128 XTS
Kuznyechik-Twofish   256; 256 128 XTS
Serpent-AES   256; 256 128 XTS
Serpent-Twofish-AES   256; 256; 256 128 XTS
Twofish-Serpent   256; 256 128 XTS
Kuznyechik-SM4   256; 128 128 XTS
Serpent-SM4   256; 128 128 XTS
SM4-Twofish   128; 256 128 XTS
Twofish-Serpent-SM4   256; 256; 128 128 XTS
         
For information about XTS mode, please see the section Modes of Operation.
Next Section >>