Used Algorithms and Hashes
The encryption technologies used are strong, open, and industry-proven:
RSA 4096-bit keys for asymmetric encryption
OAEP (Optimal Asymmetric Encryption Padding) using MGF1 with SHA-256
AES-256 in CBC mode for data encryption, using random keys and IVs
SHA3-512 digests for verifying metadata, file content, and overall file integrity
All digests, metadata, and file data are encrypted with individual random IVs
The file-level checksum is not encrypted to allow fast integrity checks