Quantcast
Channel: VeraCrypt
Viewing all 7620 articles
Browse latest View live

Edited Unassigned: Encrypting system drive gives "0xc0000452" error possibly due to main drive not being on disk 0 + screenshots [641]

$
0
0
Using VeraCrypt 1.19 (64-bit)

Initially the SYSTEM_DRV was on DISK 0, which is an older slower disk. So I copied the partitions to my DISK 2 SSD Drive which has windows installed, removed the DISK 0 drive, restarted and then put the DISK 0 back in again. Checking in AOMEI shows everything to be correctly now.

[Screenshot drives](https://i.sli.mg/aeaYzL.png)

However when I try to encrypt my system drive now I get the following error:
> Error: 0xC0000452
> Source: VeraCrypt::Elevator::GetEfiBootDeviceNumber:371

[Screenshot error](https://i.sli.mg/rwRrkG.png)

I somehow suspect system drive encryption only working for DISK 0 and isn't working in my case since the Windows installation is on DISK 2.

Now I have tried to remove DISK 0 completely and have my SSD in DISK 1 but it still shows the same error.

Any suggestions?

Created Unassigned: cannot mount Volume [642]

$
0
0
Hello All,

I have the following problem, I just started using VeraCrypt and i have encrypted a removable HDD. ive put some data on it. ive disconnected the drive propperly but now a few days later i cannot mount the HDD in VerCrypt. i keep getting the same error no mather what i do. Anyone else got the same issue? or knows how to solve it? all help is welcome!

Operation failed due to to one or more of the following:

-Incorrect password.
-Incorrect Volume PIM number.
-Incorrect PRF (Hash).
-not a vallid volume.

Source: MountVolume:7763


Gr. ShierraWhiskey

New Post: Password accepted at boot loader, then "Windows is loading files"

$
0
0
I'm trying to fix a coworker's computer. She had not switched from TrueCrypt to VeraCrypt. Her system was encrypted with TrueCrypt.

We can put in the password at the TrueCrypt boot loader, then it says "Windows is loading files" (in Spanish) with bar loading across the bottom. Then a window comes up saying something about a need to repair (it's all in Spanish, she translated for me). When we click repair, it does something on a following window and then restarts. When it restarts, it returns to the boot loader and the process repeats (we put in the password, it says "Windows is loading files", etc.).

At this point, I'm giving up on restoring her files or system; I'm ready to just reinstall Windows and then use her most recent backup (from 3 months ago) to get her back to something. (I'm aware that I could remove her hard drive, plug it into another computer with a SATA cable, mount the drive with pre-boot authentication, copy the files, and use a corruption restoring program to restore the corrupted files. But that's more work than it's worth to me; last time I did that for a computer it took me weeks to finally get each step to work).

But my concern is whether I can reinstall Windows as is, or if the boot loader will prevent that, or if reinstalling Windows over the encrypted drive will also erase vital things (I assume it can't erase the BIOS and that that's separate somewhere, I assume it might overwrite the recovery partition and that that's just a loss I'll need to accept). How can I go about reinstalling Windows? And will I need a new Windows license key, or is there a way to access the original license key?

Once I get it fixed, I will install VeraCrypt for her instead of TrueCrypt.

Details:
Lenovo X1 Carbon 3444
Windows 7
TrueCrypt 7.1a

Thank you!
Phil

Updated Wiki: Random Number Generator

$
0
0

Random Number Generator

The VeraCrypt random number generator (RNG) is used to generate the master encryption key, the secondary key (XTS mode), salt, and keyfiles. It creates a pool of random values in RAM (memory). The pool, which is 320 bytes long, is filled with data from the following sources:

  • Mouse movements
  • Keystrokes
  • Mac OS X and Linux: Values generated by the built-in RNG (both /dev/random and/dev/urandom)
  • MS Windows only: MS Windows CryptoAPI (collected regularly at 500-ms interval)
  • MS Windows only: Network interface statistics (NETAPI32)
  • MS Windows only: Various Win32 handles, time variables, and counters (collected regularly at 500-ms interval)

Before a value obtained from any of the above-mentioned sources is written to the pool, it is divided into individual bytes (e.g., a 32-bit number is divided into four bytes). These bytes are then individually written to the pool with the modulo 28 addition operation (not by replacing the old values in the pool) at the position of the pool cursor. After a byte is written, the pool cursor position is advanced by one byte. When the cursor reaches the end of the pool, its position is set to the beginning of the pool. After every 16th byte written to the pool, the pool mixing function is automatically applied to the entire pool (see below).

Pool Mixing Function

The purpose of this function is to perform diffusion [2]. Diffusion spreads the influence of individual “raw” input bits over as much of the pool state as possible, which also hides statistical relationships. After every 16th byte written to the pool, this function is applied to the entire pool.

Description of the pool mixing function:

  1. Let R be the randomness pool.
  2. Let H be the hash function selected by the user (SHA-512, RIPEMD-160, or Whirlpool).
  3. l = byte size of the output of the hash function H (i.e., ifH is RIPEMD-160, then l = 20; if H is SHA-512, l = 64)
  4. z = byte size of the randomness pool R (320 bytes)
  5. q = z / l– 1 (e.g., if H is Whirlpool, thenq = 4)
  6. Ris divided intol-byte blocksB0...Bq.

    For 0 ≤ i ≤ q (i.e., for each block B) the following steps are performed:

    1. M = H (B0 || B1 || ... || Bq) [i.e., the randomness pool is hashed using the hash function H, which produces a hash M]
    2. Bi = Bi ^ M
  7. R = B0 || B1 || ... || Bq

For example, if q = 1, the randomness pool would be mixed as follows:

  1. (B0 || B1) = R
  2. B0 = B0 ^ H(B0 || B1)
  3. B1 = B1 ^ H(B0 || B1)
  4. R = B0 || B1

Generated Values

The content of the RNG pool is never directly exported (even when VeraCrypt instructs the RNG to generate and export a value). Thus, even if the attacker obtains a value generated by the RNG, it is infeasible for him to determine or predict (using the obtained value) any other values generated by the RNG during the session (it is infeasible to determine the content of the pool from a value generated by the RNG).

The RNG ensures this by performing the following steps whenever VeraCrypt instructs it to generate and export a value:

  1. Data obtained from the sources listed above is added to the pool as described above.
  2. The requested number of bytes is copied from the pool to the output buffer (the copying starts from the position of the pool cursor; when the end of the pool is reached, the copying continues from the beginning of the pool; if the requested number of bytes is greater than the size of the pool, no value is generated and an error is returned).
  3. The state of each bit in the pool is inverted (i.e., 0 is changed to 1, and 1 is changed to 0).
  4. Data obtained from some of the sources listed above is added to the pool as described above.
  5. The content of the pool is transformed using the pool mixing function. Note: The function uses a cryptographically secure one-way hash function selected by the user (for more information, see the sectionPool Mixing Function above).
  6. The transformed content of the pool is XORed into the output buffer as follows:
    1. The output buffer write cursor is set to 0 (the first byte of the buffer).
    2. The byte at the position of the pool cursor is read from the pool and XORed into the byte in the output buffer at the position of the output buffer write cursor.
    3. The pool cursor position is advanced by one byte. If the end of the pool is reached, the cursor position is set to 0 (the first byte of the pool).
    4. The position of the output buffer write cursor is advanced by one byte.
    5. Steps b–d are repeated for each remaining byte of the output buffer (whose length is equal to the requested number of bytes).
    6. The content of the output buffer, which is the final value generated by the RNG, is exported.

Design Origins

The design and implementation of the random number generator are based on the following works:

  • Software Generation of Practically Strong Random Numbers by Peter Gutmann [10]
  • Cryptographic Random Numbers by Carl Ellison [11]

 

Next Section >>

New Post: Vera Crypt Command Line - Mount Option - Recovery

$
0
0
Hi,

anyone used in the past the "recovery" mount option?
Any help would be highly appreciated.

Best,
Lukasz

New Post: Get passed PMI authentication?

$
0
0
I did not want to use PMI but it prompted me to use after the main password was used. How do I get passed this or get the PMI password set?

Created Unassigned: source:voltransformthreadfunction:2744 [643]

$
0
0
I was trying to permanently encrypt a 1.8Tb hard drive. I started the process and paused it. When resuming the process next morning the following error appears:

source:voltransformthreadfunction:2744

Solutions?

New Post: source: vol transform thread function:2744

$
0
0
I was trying to permanently encrypt a 1.8Tb hard drive. I started the process and paused it. When resuming the process next morning the following error appears:

source:voltransformthreadfunction:2744

Solutions?

New Post: Move from TC to VC - has not gone well

$
0
0
Hi

I have been a long time TC user. Just got a new laptop that will not run TC. UEFI boot on GPT boot record rather than BIOS boot on MBR.

Immediate problem:
On clean installation of windows (10) first the verycrypt rescue file was not recognised as either a zip or an iso so have not yet created the rescue disk. Before anyone goes off on that track, I was just testing out because I have read so much about VC problems on UEFI boot amongst others...so no problem. I can reinstall windows - there is nothing on this machine to lose - yet.

Second, on proceeding with the boot test, boot failed with windows error message, something about "image not found". Only option was to boot with windows 10 iso installation files and reinstall.

Is it even worth me continuing to try to get this to work?

General question:
Another more general question about which maybe someone can enlighten me....

What I don't understand is that the big audit of Truecrypt, as I understand it, found little in the way of vulnerabilities. Truecrypt was always reliable and stable - it just worked. I know it would have had to be updated work with GPT and UEFI. But veracrypt devs have apparently found that there are multiple vulnerabilities which seem to be being fixed all the time, the code has ballooned to 8x that of Truecrypt, and now it seems that there are multiple problems and unreliability.

New Post: New Encryption Cipher

$
0
0
I'm always one for using the lesser used things so for that reason i'm wondering what the chances are of adding the Anubis cipher to VC? Details on it can be found here:

https://web.archive.org/web/20160303183118/http://www.larc.usp.br/~pbarreto/AnubisPage.html

Linux kernel module(not sure this helps)

https://github.com/torvalds/linux/blob/master/crypto/anubis.c

I know nothing of what it would require for this cipher to be included in VC but i would love to see it added.

Thank you for your continued work

Created Unassigned: I Don't see "Do not show any texts in the pre-boot authentication screen" [644]

$
0
0
Windows 10 user here using VeraCrypt 1.19 (64 bit). I have encrypted my system partition and would like to enable the option to not display verbiage to enter my pre-boot authorization. When I go to "Settings > System Encryption" I do not see the option "'Do not show any texts in the pre-boot authentication screen'"

New Post: Questions from a Newbie....

$
0
0
Hi there,

I am a new user of Veracrypt and is quite new to this field of encryption. I have briefly gone through the beginner documentation and I have the following questions:-

1.After the encryption of a non-system partition is complete, what would happen if I switch that encrypted hard disk to another (brand new) computer? And what should I do to gain access to its contents in that new computer? I am asking so because I expect that I may upgrade my computer this year.
  1. Regarding encryption of the whole C:\ (i.e. system partition), it appears from the documentation that there are two options available: (1) to encrypt only the partition where windows (mine is win 7) is installed; or (2) encrypt the whole system drive, including a special small partition (probably hidden?) containing files that are required to boot the system.
What’s the implication involved in both options? And what exactly the difference it would make if I take option (1) but not (2)? Is it advisable to choose option (2)?
  1. Is it advisable to put the keyfiles for those encrypted non-system partition into a duly encrypted system partition (i.e. C:)?
Would be much appreciated for any response.

New Post: Questions from a Newbie....

$
0
0
It appears that the format of this post is somehow screwed up when I tried to use the neat numbering to present my questions. Sorry about that as I am also a new user to this forum:(

New Post: Slow write speeds from NTFS to Veracrypt

$
0
0
Hello.

First off, VeraCrypt is very nice as it enables me to encrypt my volume and use it on both Windows and Ubuntu, I am how ever experiencing some problems. I have a ~500mb/s drive and I'm only getting 30-40mb/s write speeds in Windows.

What I'm doing is copying [30gb] files from an unencrypted NTFS partition to a VC AES outer (on a hidden volume setup) volume. Copying the same files from a Bitlocker encrypted [C] partition to the same NTFS unencrypted partition results in writespeeds of ~380mb/s avg for the same files.

Not sure what the problem could be. I'm using a slightly higher PIM, but the way I understands it, that only effects volume mount.

Best regards
makada

New Post: Volume creation issue: I will mount the volume on other platforms?

$
0
0
I'm creating a new encrypted volume on USB3 disk having ext4. During the wizard there is a "Cross-Platform Support" screen having 2 options:
  • I will mount the volume on other platforms
  • I will mount the volume only on Linux
What do these mean in practice?
If I select volume to be ext4 can I really mount it e.g. from Windows PC?
Can I somehow change the selection afterwards when the volume is created? How?

Veracrypt (or Truecrypt) documentation does not mention these settings at all.
Please clarify the documentation also. Thank you for your support.

New Post: Slow write speeds from NTFS to Veracrypt

Created Unassigned: My volumes are being mounted without entering a password! [645]

$
0
0
I'm not sure what exactly is going on but my Veracrypt volumes have now mounted two separate times after booting my machine without me entering any password. I am using this script to mount the volumes:
VeraCrypt.exe /cache /auto favorites /wipecache /quit

I am not using a system encryption and both times it was a cold boot, not a reboot or wake up from standby.

Does anyone have an idea what is going on here? Is this normal behaviour?

New Post: Problem creating Rescue Disk on CD/DVD drive when attempting to encrypt system

$
0
0
During my attempt to encrypt my system I extracted the "Vera Crypt Rescue Disk" .zip file to a DVD but during the "wizard" setup it kept wanting to look for the rescue disk on a USB drive using the next available drive letter (in this case "E:/"). How can I force VeraCrypt to look for the rescue disk on my optical drive? All the documentation indicates that's where it'll look but version 1.19 will only look for a USB drive. Any help is appreciated.

New Post: Problem creating Rescue Disk on CD/DVD drive when attempting to encrypt system

$
0
0
Oh, and I'm running Windows 10 Home Version, 64-bit

New Post: Encrypting External harddrive

$
0
0
Encrypted my external HDD. Whats happens if the PC where I have VeraCrypt installed dies? Am I able to access the HDD from a different computer?
Viewing all 7620 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>