Quantcast
Channel: VeraCrypt
Viewing all 7620 articles
Browse latest View live

New Post: encrypting drive

$
0
0
Your a star idrassi!

Ty for replying.

When i'm finished, donation coming your way

If for some reason i need to reverse the process, is this easily doable ? Im running some VM's atm, where outside Ips are connecting as wasn't sure if encrypting the drive would effect this functionality ?

New Post: encrypting drive

$
0
0
Thanks!

You can decrypt your system when you wish. You can also pause the encryption process and defer the operation. Just remember to backup the rescue disk that is created during the encryption process as it will be your only solution to decrypt your drive if something wrong happens to the boot loader.

The encryption process doesn't affect any functionality of the PC. Once the system is encrypted, every time you boot, you have to enter a password to decrypt the drive and start Windows: thus, you have to take this into account if you have external connections that expect Windows to automatically start after reboot.

Since you are using VMs, I advise you to do some tests on a VM in order to check all the steps of the encryption process.

New Post: How to build?

$
0
0
I don't recall which version I had installed (it was a while ago) but I just installed 2.7.2. I did choose the compatibility layer, yes.

New Post: Too much slow

$
0
0
I'm currently using TrueCrypt, but am orientating to see whether to switch to VeraCrypt.

Just to understand how this works:

1.
If I choose RIPEMD160 it will be the fastest to mount because that's what VC tries first? But after the next version(?) SHA2 will be tried first?
So, if I create a new container, for now I should choose RIPEMD160, but later on I should switch to SHA2?

2.
Can I convert a container from RIPEMD160 to SHA2 when this new version comes?

3.
Unrelated, are my current TrueCrypt containers compatible with VeraCrypt? If not, is there a conversion tool?

Thanks in advance for informing.

New Post: Thank you !

$
0
0
Hi idrassi :)

Thank you, thank you, thank you for making VeraCrypt and especially for being so kind as to release it to the public for free.

You look to have made significant improvements already and I look forward to watching your progress.

Awesome work from an awesome guy :) LOL

Updated Wiki: Home

$
0
0

Project Description

VeraCrypt is a free disk encryption software brought to you by IDRIX (http://www.idrix.fr) and that is based on TrueCrypt.

Donate to VeraCrypt
Donate to VeraCrypt

VeraCrypt on Facebook
VeraCrypt on Twitter

What does VeraCrypt bring to you?

VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks.
It also solves many vulnerabilities and security issues found in TrueCrypt. The following post describes parts of the major enhancements and corrections done so far:https://veracrypt.codeplex.com/discussions/569777#PostContent_1313325

As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we use327661. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.

This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data.

VeraCrypt storage format is INCOMPATIBLE with TrueCrypt storage format.

UPDATE September 15th 2014 : VeraCrypt 1.0e is out with many security fixes and performance enhancements. Download for Windows is here. As usual, a MacOSX version is available in the Downloads section or by clicking on the following link. It supports MacOSX 10.6 and above and it requires OSXFUSE 2.3 and later(https://osxfuse.github.io/).MacFUSE compatibility layer must checked during OSXFUSE installation.
Also a Linux version is available in the Downloads section or by clicking on the following link. The package contains the installation scripts for 32-bit and 64-bit versions, and for GUI and console-only version (choose which script is adapted the best to your machine).

Linux and MacOSX releases are signed with a PGP key available on the following link :http://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc . It's also available on major key servers with ID=0x54DDD393.
Please check that its fingerprint is 993B7D7E8E413809828F0F29EB559C7C54DDD393.

SHA256 and SHA512 sums for all released files are available in the Downloads section.

VeraCrypt on the fly encrypting the system partition :
VeraCrypt Partition Encryption


VeraCrypt creating an encrypted volume :

VeraCrypt encrypted volume creation

Changing the GUI language of VeraCrypt
VeraCrypt Language Selection Dialog

New Post: Slow Password Authentication

$
0
0
So after installing Truecrypt (which I love because I am super paranoid) I chose the AES/Serpent/Twofish cascade encryption and after waiting 11 HOURS the drive was encrypted. Upon the reboot of my laptop I correctly entered my password and after 8 minutes of processing it booted. Is it slow because of the cascade encryption, or because of some problem. Any and all suggestions would be appreciated.

New Post: Proposal to create a new technique in the program veracrypt

$
0
0
This is a good idea, but there is a better and more effective way to approach it.

Allow the user to set a password when creating a volume or WDE as normal.

Password = Normal password to open WDE or container.

Passworddelete = Overwrite headers, including backup headers with CSPRNG.

If a user has some time (seconds) to defend their data from being stolen they can simply start their computer and enter their normal password but this time suffix "delete". A confirmation box should pop up with a simple warning and a Yes / No answer.

If the user clicks YES, VeraCrypt should immediately overwrite the headers, including backup headers and also WDE boot.

This would make all connected hard drives useless to an attacker. It would also allow the user to claim plausible deniability by claiming all connected drives are wiped clean.

This feature would be very useful if the user could access this function while their computer was running and WDE or volumes were mounted. Also via a user custom batch file perhaps.

Any accidental deletion can be rectified by the user using the recovery ISO. These recovery ISO's could be stored online, or at another physical location.



The benefits of my method compared to above are as follows...

User only has to remember 1 password, simply suffix's "delete" to genuine password to activate.

Wiping headers and backup headers is very fast. Terra-bytes of data could be 100% protected in seconds.

There is a possibility for the user to recover their drives if they accidentally use this feature by employing the recovery ISO.


This feature would be very useful to people working in hostile environments, oppressive countries and those under threat of physical / criminal attack etc.

Thanks.

New Post: Too much slow

$
0
0
  1. As explained previously, current version of VeraCrypt (1.0e) mount RIPEMD160 volumes faster that the other algorithms because it's tried first. In the next version, SHA-512 will be tried first and thus it will be faster to mount volume encrypted using SHA-512. You can always switch between RIPEMD160, SHA-512 and Whirlpool at any moment using the menu "Set Header Key Derivation Algorithm": a dialog will show up and you can choose the PRF algorithm you want. So, if mount speed is important for you, you can choose RIPEMD160 for now and in the next version, you can update your container to use SHA-512 instead.
    Image
  2. Yes, you can do the conversion as explained above.
  3. VeraCrypt is not compatible with TrueCrypt containers. There have been many posts asking for compatibility and we understand the need for those who have huge amount of encrypted data. We are planning to implement a conversion tool and hopefully it will make it to the next version if everything goes as planned. The only point is that we can support only containers created with versions 7.x (version 7.0 was released on July 19th 2010).

New Post: VeraWipe

$
0
0
VeraWipe

At the moment no one can actually claim plausible deniability with Truecrypt or even VeraCrypt. The reason is that there is no plausible excuse to having so much cryptographically random data on a hard drive.

Users could claim to have used DBAN, but not only does DBAN sometimes fail to write to the entire disk, I am not 100% convinced the random data outputted by DBAN is statistically similar to the data written by VeraCrypt.

This is why I am suggesting a new product called "VeraWipe" This should be a stand alone product separate from VeraCrypt. VeraWipe would allow users to securely wipe (data destruct) their hard drives like DBAN offers now.

The main reason for VeraWipe is that it produces the exact same random output as VeraCrypt would. Having this separate tool available gives all users the excuse they have simply wiped their hard drives with VeraWipe and they are not encrypted at all.

Without VeraWipe no user can be confident to make a claim of a wiped disk as I am sure (guessing) there will be some difference in the output from DBAN ( or any wipe program) and VeraCrypt.

I hope this would be an easy tool to make as VeraCrypt has all the functionality needed to do this now. Just create a random 63 character password and encrypt the entire hard drive, then dispose of the password. This would obviously be packaged and distributed as a hard drive wiper / overwriting software to enhance the plausible deniability.

Thanks :)

New Post: System Drive Encryption with a USB containing Key

$
0
0
This feature is a personal favourite of mine for many years.

DiskCryptor has made a huge leap forward with it's boot loader. The ability to save the bootloader on a flash drive means the WDE drive can be totally random allowing plausible deniability.

WDE is a great feature but not being able to have a drive which appears to be full of random data has always been a weakness.

Also the password on a flash drive is useful for longer passwords especially when combined with a typed one.

With the bootloader separate from the drive it protects against "EvilMaid" attack.

There are many reasons a separate bootloader is a good idea, I would like to suggest that it might be worth the effort pursuing this.

Source code checked in, #f0e4dedaf6d247edf01b68ee8e6a3ae5b195024a

$
0
0
Implement support for creating and booting encrypted partition using SHA-256. Support SHA-256 for normal volumes as well.

Source code checked in, #dd61d38138eaad5d83ab97b754eea514417843e9

$
0
0
Display only allowed hashes when encrypting the system partition (now, SHA-256 and RIPEMD-160).

Source code checked in, #e949e0ed04598514bbac6d4ac54b2cd581cb598f

$
0
0
Use HashForSystemEncryption to check if the algorithm is supported for system partition encryption because we have now two supported algorithms.

Source code checked in, #9a4af2e88b03feab65ffc8d3bfd9467b15e198ef

$
0
0
Small code size optimization for RIPEMD-160 when compiled for boot encryption.

Source code checked in, #0d775248456cd1df035a26d6f5a824023dddb924

$
0
0
Integrate SHA-256 support into Linux/MacOSX code. Set PRF priority to SHA-512 -> Whirlpool -> SHA-256 -> RIPEMD-160 .

Source code checked in, #65bb75e7d7a245343c6e0fc647f7a5451bff6da7

$
0
0
MacOSX : Support hard drives with a large sector size ( > 512).

Source code checked in, #9558996299e1a230773b0317096598ea43c0900b

$
0
0
Linux/MacOSX : fix encryption/decryption issues with hard drives that have a sector size bigger than 512. Now, we use the sector size as the minimum unit for data fragment encryption/decryption.

Source code checked in, #e8ddb4b0ed951f099564c8f59a97ce8c5f01c21c

$
0
0
Linux: Support NTFS formatting of volume. We use mkfs.ntfs so it needs to be installed on the system.

New Post: VeraWipe

$
0
0
I agree that this is a good idea for plausible deniability. It can also be used as a regular wipe program even if it will always be slower than the others because of the various cryptographic operations involved.

DBAN uses dwipe which in turn uses Mersenne Twister as its default random generator. This makes DBAN random data statically different from those generated by VeraCrypt which uses more cryptographically secure PRNG. That's why it is possible to distinguish between DBAN erased disks and VeraCrypt volumes.

Technically speaking, it is not something difficult to implement as you pointed out. Once we finalize all the current modifications, we'll evaluate all the new features and definitely VeraWipe will have its place.

By the way, excellent name!
Viewing all 7620 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>