Encryption algorithm
You can select here whether the unencrypted files are to be deleted after encryption. If a directory has been encrypted, the unencrypted source directory with all subdirectories is deleted afterwards. The source files are only deleted after successful encryption.
|
Attention: The files are permanently deleted. Afterwards, only the encrypted files exist. |
|
Note: For encryption, DATA Boreum always uses the AES-256-GCM cipher suite. The BSI (see BSI technical guideline TR-3116-4) and the IETF (see RFC 7525) recommend AES-256-GCM for symmetric encryption and SHA256 as digest algorithm and classify this cypher suite as secure. |
Figure 29: “Encryption” tab