5.8     Encrypt tab

Encryption algorithm

You can select here whether the unencrypted files are to be deleted after encryption. If a directory has been encrypted, the unencrypted source directory with all subdirectories is deleted afterwards. The source files are only deleted after successful encryption.

Achtung

Attention: The files are permanently deleted. Afterwards, only the encrypted files exist. 

 

Note

Note: For encryption, DATA Boreum always uses the AES-256-GCM cipher suite. 

The BSI (see BSI technical guideline TR-3116-4) and the IETF (see RFC 7525) recommend AES-256-GCM for symmetric encryption and SHA256 as digest algorithm and classify this cypher suite as secure.

“Encryption” tab

Figure 29: “Encryption” tab