User`s guide
Copyright © Acronis, Inc., 2000-2009 145
o AES 128 – the vault contents will be encrypted using the Advanced Standard Encryption (AES)
algorithm with a 128-bit key
o AES 192 – the vault contents will be encrypted using the AES algorithm with a 192-bit key
o AES 256 – the vault contents will be encrypted using the AES algorithm with a 256-bit key.
5. Click OK.
The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a
randomly generated key with a user-defined size of 128, 192 or 256 bits. The larger the key size, the
longer it will take for the program to encrypt the archives stored in the vault and the more secure the
archives will be.
The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key.
The password itself is not stored anywhere on the disk; the password hash is used for verification
purposes. With this two-level security, the archives are protected from any unauthorized access, but
recovering a lost password is not possible.
4.1.2.2. Creating an unmanaged centralized vault
To create an unmanaged centralized vault, perform the following steps.
Vault
Name
Specify a unique name for the vault. The creation of two centralized vaults with the same
name is prohibited.
Comments
Enter the distinctive description of the vault.
Type
Select the Unmanaged type.
Path (p. 145)
Specify where the vault will be created.
After you have performed all the required steps, click OK to commit creating the unmanaged
centralized vault.
Vault path
To specify the path where the managed vault will be created
1. Enter the full path to the folder in the Path field or select the desired folder in the folders tree.
Unmanaged vaults can be organized:
o on a network share
o on a Storage Area Network (SAN)
o on a Network Attached Storage (NAS)
o on FTP and SFTP servers.
According to the original FTP specification, credentials required for access to FTP servers are transferred
through a network as plaintext. This means that the user name and password can be intercepted by an
eavesdropper using a packet sniffer.