Encryption Algorithms
This page describes how Duplicati handles encryption
The modular design in Duplicati makes it simple to add new encryption methods, if needed. By default, Duplicati ships with a built-in AES-based encryption and a GPG-based encryption that requires GPG binaries to be present on the system.
AES Encryption
The built-in AES encryption is an open-source C# port of the open-specification AESCrypt file format. The file format ensures that each volume is encrypted with a separate random file-encryption key (FEK), which makes it harder to perform analysis on the encrypted volumes. The file format also adds a HMAC signature that prevents modifications to the encrypted volume.
GPG Encryption
With GPG encryption the implementation requires the GPG binaries to be installed on the system. GPG is available on most Linux distributions, and in most package managers, but can otherwise be obtained via the GnuPG download page.
By default, GPG encryption is done with symmetric encryption and default options (CAST-128), using the provided passphrase. It is possible to supply custom arguments to GPG, to choose a different algorithm, or even set it up to perform asymmetric encryption where only the public key is present on the client.
Last updated