What are the details of the algorithms used?
Passphrases are hashed with SHA-1 to 160 bits, whereof the most significant 128 bits are used as a Key Encrypting Key. Using a Pseudo Random Number Generator specified in FIPS 186-2 operating on a 160-bit Seed and a 160-bit Key with SHA-1, a 128-bit Master Data Encrypting Key is produced. Header data and plain text data is encrypted with different derivations of the Master Data Encrypting Key. The PRNG Seed is a constant accumulating value, dependent on (the presumably secret) user entered keys as well as a 256-byte entropy pool collected continuously through mouse and windows movement, together with further entropy from the system timer and time, as well as a free running bit counter, and the Pentium time stamp counter if available. 128 bytes of the entropy pool are also saved persistently in the registry. The data in the file consists of many header sections containing information about the file size, file name and file modification times as well as version information, integrity che