Customer specific algorithm with 128/256/512 bit key length can be incorporated
upon users request. Software supports CFB-8 and CFB-128 modes of encryption. After
encryption software does not include any proprietary extension to the encrypted
file showing that it is encrypted, due to this adversary will not know which software
has been used to encrypt the file or directory. |