File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -16,7 +16,9 @@ In general, any HBSH construction can be used to wrap any VFS.
16
16
17
17
The default Adiantum construction uses XChaCha12 for its stream cipher,
18
18
AES for its block cipher, and NH and Poly1305 for hashing.
19
- It uses Argon2id to derive keys from plain text.
19
+ It uses Argon2id to derive 256-bit keys from plain text.
20
+
21
+ The VFS encrypts database files, rollback and statement journals, and WAL files.
20
22
21
23
> [ !IMPORTANT]
22
24
> Adiantum is typically used for disk encryption.
@@ -25,5 +27,3 @@ It uses Argon2id to derive keys from plain text.
25
27
> The security property that disk encryption provides is that
26
28
> the only information such an adversary can determine is
27
29
> whether the data in a sector has or has not changed over time.
28
-
29
- The VFS encrypts database files, rollback and statement journals, and WAL files.
You can’t perform that action at this time.
0 commit comments