| Symmetric Encryption |
AES-256-GCM / XChaCha20-Poly1305 |
AES-256-GCM / XChaCha20-Poly1305 |
AES-256-GCM / XChaCha20-Poly1305 |
| Hybrid KEM (ML-KEM + X25519) |
ML-KEM-512/768 + X25519 (default: 768) |
ML-KEM-512/768/1024 + X25519 (default: 768) |
ML-KEM-512/768/1024 + X25519 (default: 1024) |
| ML-KEM Security Levels |
NIST Level 1, 3 |
NIST Level 1, 3, 5 |
NIST Level 1, 3, 5 |
| Password Hashing (KDF) |
Argon2id 128 MB, 3 iter, 4 threads |
Argon2id 256 MB, 4 iter, 4 threads |
Argon2id 512 MB, 6 iter, 8 threads |
| Key Derivation |
HKDF-SHA3-256 |
HKDF-SHA3-256 |
HKDF-SHA3-256 |
| Integrity / Hashing |
BLAKE3 |
BLAKE3 |
BLAKE3 + Merkle Tree |
| Nonce Derivation |
BLAKE3 deterministic |
BLAKE3 deterministic |
BLAKE3 deterministic |
| Commands |
encrypt, decrypt, shred |
encrypt, decrypt, shred, batch, sign, verify |
encrypt, decrypt, shred, batch, sign, verify, rekey, split, combine |
| Secure Delete |
3-pass overwrite |
3-pass overwrite |
3-pass overwrite |
| Compression |
Zstd |
Zstd |
Zstd |
| Maximum file size |
1 GB |
10 GB |
Unlimited |
| Chunk Processing |
64 KB – 4 MB adaptive |
64 KB – 4 MB adaptive + streaming |
64 KB – 4 MB adaptive + streaming |
| Memory Protection |
mlock() / VirtualLock |
mlock() / VirtualLock |
mlock() / VirtualLock |
| Audit Logging |
|
Append-only encrypted log |
Hash-chain ML-DSA signed log |
| Key Management |
|
ML-DSA-44/65/87 keypairs |
ML-DSA-44/65/87 + Ed25519 keypairs |
| Digital Signatures |
ML-DSA-44 |
ML-DSA-44/65/87, SLH-DSA-128s/192s/256s |
ML-DSA-44/65/87 + Ed25519 hybrid, SLH-DSA |
| Password Change (Rekey) |
|
|
DEK re-wrap via wrapped KEM SK |
| Custom Argon2 Parameters |
|
|
Configurable memory/iter/threads |
| Key Recovery |
|
|
Shamir Secret Sharing (M-of-N) |
| Sandbox* |
seccomp-bpf (Linux) |
seccomp-bpf (Linux) |
seccomp-bpf (Linux) |
| License |
Personal use |
Commercial use |
Enterprise + priority support |