Supported Cipher Algorithms
This may be usable on some situations like file system encrypting.
Kernel name | DES | AES | Blowfish | Triple DES | Serpent | Twofish | CAST-128 | DES-X | IDEA | RC2 | RC5 | SEED | Skipjack | TEA | XTEA | CAST-256 | RC4 | Camellia | Anubis | KHAZAD | Salsa20 | FCrypt |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ? | ? | ? | ? | Yes | ? | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Windows | Yes | Yes | No | Yes | No | No | No | No | No | Yes | No | No | No | No | No | No | Yes | No | No | No | No | No |
Kernel name | DES | AES | Blowfish | Triple DES | Serpent | Twofish | CAST-128 | DES-X | IDEA | RC2 | RC5 | SEED | Skipjack | TEA | XTEA | CAST-256 | RC4 | Camellia | Anubis | KHAZAD | Salsa20 | FCrypt |
Read more about this topic: Comparison Of Operating System Kernels
Famous quotes containing the words supported and/or cipher:
“A solitary traveler whom we saw perambulating in the distance loomed like a giant. He appeared to walk slouchingly, as if held up from above by straps under his shoulders, as much as supported by the plain below. Men and boys would have appeared alike at a little distance, there being no object by which to measure them. Indeed, to an inlander, the Cape landscape is a constant mirage.”
—Henry David Thoreau (18171862)
“It is not an arbitrary decree of God, but in the nature of man, that a veil shuts down on the facts of to-morrow; for the soul will not have us read any other cipher than that of cause and effect. By this veil, which curtains events, it instructs the children of men to live in to-day.”
—Ralph Waldo Emerson (18031882)