FAQ
Last updated
Last updated
Sort of. Backwards compatibility for major versions is not a goal for Kryptor, as explained . However, Kryptor doesn't get updated that frequently. Breaking changes will get grouped together and require significant planning and sometimes waiting for dependencies to get updated.
No, unless you use the -u|--update
option to check for updates via , as explained .
Just let Kryptor for you and store it in a password manager like or .
A is equivalent to a random symmetric key stored on disk. Using a regular file as a keyfile is equivalent to hashing the file, so the file should be high in entropy (e.g. compressed).
Just let Kryptor for you and back it up on external storage (e.g. memory sticks).
Using an with enabled.
Please use the Bug report
issue template on .
Please read the file on GitHub.
Yes, please .
It's fast, , doesn't require hardware support, and ChaCha20 has a than AES.
The latter 32 bytes of block 0 (after the Poly1305 key) are prepended to the ciphertext as a commitment. For decryption, this commitment is checked in constant time alongside the tag, eliminating a timing difference. some code.
This is similar to the padding fix discussed in . Credit goes to Loup Vaillant for the block 0 .
It's than SHA-2 and SHA-3 whilst having a larger security margin than and being as real-world as SHA-3.
Argon2 won the in 2015 and is now recommended over other password-based key derivation algorithms, such as PBKDF2 and scrypt.
Argon2id is used because it's the recommended mode in the and Argon2i is vulnerable to plus weaker in terms of GPU/ASIC resistance.
padding, which is deterministic, was originally implemented. However, convinced me that it to have deterministic file sizes when trying to make files indistinguishable from random.
Instructions can be found .
Because the .NET runtime is so users don't have to install .NET themselves, and compilation is enabled to improve startup performance.
using .
.