Cascade Encryptor
To secure backup files for a long time ...
-
"Cascade Encryptor" does cascade encryption with multiple different algorithms.
-
Three encryption algorithms are selected at random.
-
All Encryption key is different.
-
Even if some of the encryption algorithms would be broken, cipher files are still secure.
-
"Cascade Encryptor" minimize information in cipher files.
-
From cipher file, anyone cannot find which encryption algorithms were used.
-
Encryption keys are not contained in encryption file.
-
IV(Initialization vector) are not contained in encryption file.
-
"Cascade Encryptor" maximize effective bit length of encryption keys.
-
"Password-Based Key Derivation" does not be used.
-
Maximum encryption key length is used.
-
"Cascade Encryptor" does several things.
-
By using "second_key.txt", decryptable person is limited.
-
Encryption keys are not reused.
Cascade Encryptor