
This approach ensures that even if two chunks have the same content, their respective ciphertexts will be different due to the unique nonces used during encryption. The nonce for each chunk is derived by XORing the master nonce with the chunk index. The resulting hash value is used as input to the PBKDF2 function.Ĭipherator uses the derived 256-bit key for encrypting all chunks of the file, while employing a unique nonce for each chunk to ensure maximum security. When a keyfile is specified, the first 1MiB of the keyfile is read, and its data is hashed using SHA256 along with the password (if any).


If the password value is empty, it will be requested.
