diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2023-09-29 22:26:54 +0200 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2023-09-29 22:26:54 +0200 |
commit | c0f8179f2af7cdaa0a098b5ad5ea9bdba654274e (patch) | |
tree | c5fe5ec50218459ea963ce83d997a3c7fd77dc3b /src/Crypto/sha512_avx2_x86.asm | |
parent | 5192eac233d4ac1c972af724d01167d38c249410 (diff) | |
download | VeraCrypt-c0f8179f2af7cdaa0a098b5ad5ea9bdba654274e.tar.gz VeraCrypt-c0f8179f2af7cdaa0a098b5ad5ea9bdba654274e.zip |
Windows: enhancement to RAM encryption
- use a more standard-looking memory value tag instead of fully random one that will look suspicious and outstanding
- If we fail to allocate 1MiB for derivation area, we device the size by two in a loop until we succeed. This is better than falling back directly to 8KiB size
- Better method to derive actual encryption key: instead of simply duplicating 128bit key value, we combine a xor addition and self-encryption to build a 256-bit key
- use both encID and pbKeyDerivationArea to derive IV for encryption and not only endID
Diffstat (limited to 'src/Crypto/sha512_avx2_x86.asm')
0 files changed, 0 insertions, 0 deletions