Modern Algorithms
Gain access to six of the most advanced and robust cryptographic algorithms available, including certified and compliance-ready options of your choice.

AES-GCM-AEAD

Advanced Encryption Standard + Authentication

Our software uses AES-GCM (AEAD), a modern authenticated-encryption standard designed to protect both data confidentiality and data integrity in a single operation. Unlike older encryption modes that only encrypt data, AES-GCM also verifies that the information has not been modified, forged, or corrupted.


AES-GCM is highly efficient and can take advantage of hardware acceleration available on most modern Intel© and AMD© processors, delivering excellent performance for file protection, data transfer, and real-time operations.


In addition to speed, hardware-assisted AES execution reduces reliance on traditional software lookup tables, helping lower exposure to certain side-channel attack techniques when compared to older software-only implementations.


The result is strong, modern encryption with authentication, low overhead, and broad compatibility across current desktop and mobile computing environments.

Business people collaborating

OBAKE

by OBAKE Specialists Team

OBAKE was created for organizations that demand a deeper level of protection than conventional symmetric encryption can offer.


Built on a 512-bit symmetric block architecture operating in PCB+CTR mode, OBAKE combines six cryptographic keys ranging from 32 to 65,536 bits in a layered security model. It supports adaptive parallel execution based on input size and incorporates multiple substitution tables, 2048-bit true-random keys, and one-time key elements to strengthen defensive depth.


Its design places special emphasis on resilience against both direct and indirect cryptanalytic techniques, including attack classes historically associated with older cipher families. The result is an advanced encryption foundation engineered for high-assurance environments where security, performance, and long-term protection are critical.

Business people collaborating

XSalsa20-Poly1305-Curve25519

by Daniel Bernstein et al.

In fact, the OBAKE implementation is the XSalsa20-AEAD-Poly1305-Curve25519, since this is the most powerful derivation of the original Salsa20 by Bernstein.


XSalsa20 is a stream cipher based upon Salsa20 but with a much longer nonce: 192 bits instead of 64 bits. XSalsa20 uses a 256-bit key as well as the first 128 bits of the nonce in order to compute a subkey. This subkey, as well as the remaining 64 bits of the nonce, are the parameters of the Salsa20 function used to actually generate the stream.


Like Salsa20, XSalsa20 is immune to timing attacks and provides its own 64-bit block counter to avoid incrementing the nonce after each block. But with XSalsa20's longer nonce, it is safe to generate nonces for every message encrypted with the same key without having to worry about a collision.

Business people collaborating

ChaCha20-AEAD-Poly1305

by Daniel Bernstein et al.

ChaCha20 is a stream cipher and its original design expands a 256-bit key into 2^64 randomly accessible streams, each containing 2^64 randomly accessible 64-byte (512 bits) blocks. It is a variant of Salsa20 with better diffusion.


ChaCha20 doesn't require any lookup tables and avoids the possibility of timing attacks.


Internally, ChaCha20 works like a block cipher used in counter mode. It includes an internal block counter to avoid incrementing the nonce after each block. For design, it allows a practically unlimited amount of data to be encrypted with the same (key, nonce) pair which, in OBAKE, is supplemented with its key methods to enhance the other algorithms.

Business people collaborating

AES-256-CBC

by Morris Dworkin, Elaine Barker, James Nechvatal, James Foti, Lawrence Bassam, Edward Roback, James Dray Jr.

The AES block cipher algorithm, specifically, is also known as Rijndael, having been derived from the Rijndael family of encryption algorithms, developed by Belgian cryptographers Vincent Rijmen and Joan Daemen.


AES encryption is a cybersecurity technology refers to the process of concealing electronic data using an approved 128-bit, 192-bit, or 256-bit symmetric encryption algorithm from the Advanced Encryption Standard (AES), also known as FIPS 197. The standard is published and maintained by the National Institute for Standards and Technology (NIST).


The AES is one of many NIST-issued Federal Information Processing Standards (FIPS), which are approved by the U.S. Secretary of Commerce before publication to ensure their legal alignment with the Information Technology Management Reform Act of 1996 and the Computer Security Act of 1987. It is the only publicly available block cipher approved by the National Security Agency (NSA) for transmission and encryption of secret and top-secret information and intelligence.

Business people collaborating

AES-XTS

by IEEE SISWG

The IEEE Security in Storage Working Group (SISWG) has developed the XTS mode of the Advanced Encryption Standard (AES) that the IEEE 1619-2007 standard defines. XTS stands for "XEX-based tweaked codebook mode with ciphertext stealing" and this mode works within the constraints of hard disks while keeping the security that the AES algorithm provides.


This stream cipher algorithm is faster and consuming less memory than the original AES, it is used in most pen drives and SSD (disk-encryption), being a good alternative when speed is necessary.


However, due to a lot of enhancements seen in other algorithms, AES-XTS must be considered as deprecated and is kept on OBAKE just for compatibility issues with its older versions.

Business people collaborating