Disk encryption has three flavors.
Block/Disk Partition Encryption
Individual Files
File System or Directory Encryption.
The LUKS 'dmcrypt' method you mentioned is in the first group, and involved Formatting a partition so that everything is encrypted at the block level. You need the encryption key to mount the partition, and without it the disk does not have a generally reconisable file system.
If you NAS is limited to CIFS filesystems, then you can not use this encryption method.
Unless you make one really huge file in which to store the whole filesystem that you can then mount separately. I doubt however that your NAS provider would like a 50 Tb filesystem with a single 50Tb file of what is essentially purely random data on it. Of course that many not even work, as everything has to be able to handle a 50Tb file, from CIFS (instant fail), to network, to file seeking, or mounting, and so on!
I wouldn't even like to try!
Individual file encryption encripts the a individual file with a key. This generally requires the encryption built into the application that is using the file, or a decryption pipeline. In a pipeline files are typicaly also compressed before they are encrypted (not much good doing compression afterward).
It is good for small file, such as protecting some private data of some kind, but it is not generally good for large files or databases, unless the application itself handles the encryption. It is also typically what is used and advertised in 'Cloud' services, where they can encrypt/decrypt each file individually. It it is the cloud servive provider that does the encryption.
The newest form and the one you can use, is known as File System, or Directory Level Encryption (and I don't mean encrypting a directory archive).
This is where you mount a directory tree, and you see all the files as normal (unencrypted), but the other end of the mount is just another directory (such as a CIFS mount), also with a completely normal directory structure, but all the filenames and file data is encrypted.
The key with this is that the files and filenames are encrypted but the filesystem used is just a normal filesystem. You can use any normal filesystem CIFS, Dropbox (Cloud), USB stick, and you get the same file system limitations in both encrypted and decrypted directory trees.
If that file system is from a NAS, the NAS stores encrypted files but still sees it as a normal file system, that it can handle without any special requirements. In the cloud they also see a normal file system filles with normal but encrypted files. In both cases however the remote server does not have the encryption key, so teh system programmers that look after that system can not decrypt the data at all. They see and store the encrypted files, but only you 9with the password) can mount it in a decrypted form.
The current software that provides this type of filesystem is called EncFS (short for Encrypt FS). And it is not only for Linux and MacOSX, but with a small amount of restrictions, it is now available under windows too, so cloud solutions are also sharable across most desktop platforms.
The point its your data encrypted, and it works without anything special for the remote NAS or Cloud provider.
Wikipedia Page:
http://en.wikipedia.org/wiki/EncFS
For windows see BoxCrypt:
http://www.boxcryptor.com/index.html