diff options
Diffstat (limited to 'doc/html')
149 files changed, 10252 insertions, 0 deletions
diff --git a/doc/html/AES.html b/doc/html/AES.html new file mode 100644 index 00000000..38a56a30 --- /dev/null +++ b/doc/html/AES.html @@ -0,0 +1,51 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Encryption%20Algorithms.html">Encryption Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="AES.html">AES</a> +</p></div> + +<div class="wikidoc"> +<h1>AES</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm (Rijndael, designed by Joan Daemen and Vincent Rijmen, published in 1998) that may be used by US federal departments and agencies to cryptographically protect sensitive + information [3]. VeraCrypt uses AES with 14 rounds and a 256-bit key (i.e., AES-256, published in 2001) operating in +<a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +XTS mode</a> (see the section <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Modes of Operation</a>).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +In June 2003, after the NSA (US National Security Agency) conducted a review and analysis of AES, the U.S. CNSS (Committee on National Security Systems) announced in [1] that the design and strength of AES-256 (and AES-192) are sufficient to protect classified + information up to the Top Secret level. This is applicable to all U.S. Government Departments or Agencies that are considering the acquisition or use of products incorporating the Advanced Encryption Standard (AES) to satisfy Information Assurance requirements + associated with the protection of national security systems and/or national security information [1].</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="Camellia.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Acknowledgements.html b/doc/html/Acknowledgements.html new file mode 100644 index 00000000..54f5d7da --- /dev/null +++ b/doc/html/Acknowledgements.html @@ -0,0 +1,58 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Acknowledgements.html">Acknowledgements</a> +</p></div> +<div class="wikidoc"> +<div> +<h1>Acknowledgements</h1> +<p>We would like to thank the following people:</p> +<p>The TrueCrypt Developers team who have done an amazing job over the course of 10 years. Without their hard work, VeraCrypt would not exist today.</p> +<p>Paul Le Roux for making his E4M source code available. TrueCrypt 1.0 was derived from E4M and some parts of the E4M source code are still incorporated in the latest version of the TrueCrypt source code.</p> +<p>Brian Gladman, who wrote the excellent AES, Twofish, and SHA-512 routines.</p> +<p>Peter Gutmann for his paper on random numbers, and for creating his cryptlib, which was the source of parts of the random number generator source code.</p> +<p>Wei Dai, who wrote the Serpent and RIPEMD-160 and Whirlpool routines.</p> +<p>Tom St Denis, the author of LibTomCrypt which includes compact SHA-256 routines.</p> +<p>Mark Adler and Jean-loup Gailly, who wrote the zlib library.</p> +<p>The designers of the encryption algorithms, hash algorithms, and the mode of operation:</p> +<p>Horst Feistel, Don Coppersmith, Walt Tuchmann, Lars Knudsen, Ross Anderson, Eli Biham, Bruce Schneier, David Wagner, John Kelsey, Niels Ferguson, Doug Whiting, Chris Hall, Joan Daemen, Vincent Rijmen, Carlisle Adams, Stafford Tavares, Phillip Rogaway, Hans + Dobbertin, Antoon Bosselaers, Bart Preneel, Paulo S. L. M. Barreto.</p> +<p>Andreas Becker for designing VeraCrypt logo and icons.</p> +<p>Xavier de Carné de Carnavalet who proposed a speed optimization for PBKDF2 that reduced mount/boot time by half.</p> +<p>kerukuro for cppcrypto library (http://cppcrypto.sourceforge.net/) from which Kuznyechik cipher implementation was taken.</p> +<p><br> +Dieter Baron and Thomas Klausner who wrote the libzip library.</p> +<p><br> +Jack Lloyd who wrote the SIMD optimized Serpent implementation.</p> +<p>All the others who have made this project possible, all who have morally supported us, and all who sent us bug reports or suggestions for improvements.</p> +<p>Thank you very much.</p> +</div> +</div><div class="ClearBoth"></div></body></html> diff --git a/doc/html/Additional Security Requirements and Precautions.html b/doc/html/Additional Security Requirements and Precautions.html new file mode 100644 index 00000000..c7b5f067 --- /dev/null +++ b/doc/html/Additional Security Requirements and Precautions.html @@ -0,0 +1,52 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Additional%20Security%20Requirements%20and%20Precautions.html">Additional Security Requirements and Precautions</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Additional Security Requirements and Precautions</h1> +<p>In addition to the requirements and precautions described in this chapter (<a href="Security%20Requirements%20and%20Precautions.html"><em>Security Requirements and Precautions</em></a>), you must follow and keep in + mind the security requirements, precautions, and limitations listed in the following chapters and sections:</p> +<ul> +<li><a href="How%20to%20Back%20Up%20Securely.html"><em><strong>How to Back Up Securely</strong></em></a> +</li><li><a href="Issues%20and%20Limitations.html"><em><strong>Limitations</strong></em></a> +</li><li><a href="Security%20Model.html"><em><strong>Security Model</strong></em></a> +</li><li><a href="Security%20Requirements%20for%20Hidden%20Volumes.html"><em><strong>Security Requirements and Precautions Pertaining to Hidden Volumes</strong></em></a> +</li><li><a href="Plausible%20Deniability.html"><em><strong>Plausible Deniability</strong></em></a> +</li></ul> +<p>See also: <a href="Digital%20Signatures.html"> +<em>Digital Signatures</em></a></p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Authenticity and Integrity.html b/doc/html/Authenticity and Integrity.html new file mode 100644 index 00000000..b7075beb --- /dev/null +++ b/doc/html/Authenticity and Integrity.html @@ -0,0 +1,49 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Authenticity%20and%20Integrity.html">Authenticity and Integrity</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Authenticity and Integrity</h1> +<p>VeraCrypt uses encryption to preserve the <em>confidentiality</em> of data it encrypts. VeraCrypt neither preserves nor verifies the integrity or authenticity of data it encrypts or decrypts. Hence, if you allow an adversary to modify data encrypted by VeraCrypt, + he can set the value of any 16-byte block of the data to a random value or to a previous value, which he was able to obtain in the past. Note that the adversary cannot choose the value that you will obtain when VeraCrypt decrypts the modified block — + the value will be random — unless the attacker restores an older version of the encrypted block, which he was able to obtain in the past. It is your responsibility to verify the integrity and authenticity of data encrypted or decrypted by VeraCrypt (for + example, by using appropriate third-party software).<br> +<br> +See also: <a href="Physical%20Security.html"> +<em>Physical Security</em></a>, <a href="Security%20Model.html"> +<em>Security Model</em></a></p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Authors.html b/doc/html/Authors.html new file mode 100644 index 00000000..79b5063b --- /dev/null +++ b/doc/html/Authors.html @@ -0,0 +1,42 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a> +</p></div> + +<div class="wikidoc"> +<h2>Authors</h2> +<p>Mounir IDRASSI (<a href="https://www.idrix.fr" target="_blank">IDRIX</a>, <a href="https://fr.linkedin.com/in/idrassi" target="_blank"> +https://fr.linkedin.com/in/idrassi</a>) is the creator and main developer of VeraCrypt. He managed all development and deployment aspects on all supported platforms (Windows,Linux and OSX).</p> +<p>Alex Kolotnikov (<a href="https://ru.linkedin.com/in/alex-kolotnikov-6625568b" target="_blank">https://ru.linkedin.com/in/alex-kolotnikov-6625568b</a>) is the author of VeraCrypt EFI bootloader. He manages all aspects of EFI support and his strong expertise + helps bring new exciting features to VeraCrypt Windows system encryption.</p> +<p> </p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Beginner's Tutorial.html b/doc/html/Beginner's Tutorial.html new file mode 100644 index 00000000..454f1ed1 --- /dev/null +++ b/doc/html/Beginner's Tutorial.html @@ -0,0 +1,207 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Beginner's%20Tutorial.html">Beginner's Tutorial</a> +</p></div> + +<div class="wikidoc"> +<h1>Beginner's Tutorial</h1> +<h2>How to Create and Use a VeraCrypt Container</h2> +<p>This chapter contains step-by-step instructions on how to create, mount, and use a VeraCrypt volume. We strongly recommend that you also read the other sections of this manual, as they contain important information.</p> +<h4>STEP 1:</h4> +<p>If you have not done so, download and install VeraCrypt. Then launch VeraCrypt by double-clicking the file VeraCrypt.exe or by clicking the VeraCrypt shortcut in your Windows Start menu.</p> +<h4>STEP 2:</h4> +<p><img src="Beginner's Tutorial_Image_001.jpg" alt="" width="579" height="498"><br> +<br> +The main VeraCrypt window should appear. Click <strong>Create Volume </strong>(marked with a red rectangle for clarity).</p> +<h4>STEP 3:</h4> +<p><img src="Beginner's Tutorial_Image_002.jpg" alt="" width="616" height="410"><br> +<br> +The VeraCrypt Volume Creation Wizard window should appear.<br> +<br> +In this step you need to choose where you wish the VeraCrypt volume to be created. A VeraCrypt volume can reside in a file, which is also called container, in a partition or drive. In this tutorial, we will choose the first option and create a VeraCrypt volume + within a file.<br> +<br> +As the option is selected by default, you can just click <strong>Next</strong>.</p> +<p>Note: In the following steps, the screenshots will show only the right-hand part of the Wizard window.</p> +<h4>STEP 4:</h4> +<p><img src="Beginner's Tutorial_Image_003.jpg" alt="" width="371" height="333"><br> +<br> +In this step you need to choose whether to create a standard or hidden VeraCrypt volume. In this tutorial, we will choose the former option and create a standard VeraCrypt volume.<br> +<br> +As the option is selected by default, you can just click <strong>Next</strong>.</p> +<h4>STEP 5:</h4> +<p><img src="Beginner's Tutorial_Image_004.jpg" alt="" width="363" height="336"><br> +<br> +In this step you have to specify where you wish the VeraCrypt volume (file container) to be created. Note that a VeraCrypt container is just like any normal file. It can be, for example, moved or deleted as any normal file. It also needs a filename, which you + will choose in the next step.<br> +<br> +Click <strong>Select File</strong>.<br> +<br> +The standard Windows file selector should appear (while the window of the VeraCrypt Volume Creation Wizard remains open in the background).</p> +<h4>STEP 6:</h4> +<p><img src="Beginner's Tutorial_Image_005.jpg" alt="" width="720" height="452"><br> +<br> +In this tutorial, we will create our VeraCrypt volume in the folder F<em>:\Data\ </em> +and the filename of the volume (container) will be <em>My Volume </em>(as can be seen in the screenshot above). You may, of course, choose any other filename and location you like (for example, on a USB memory stick). Note that the file +<em>My Volume </em>does not exist yet – VeraCrypt will create it.</p> +<p>IMPORTANT: Note that VeraCrypt will <em>not </em>encrypt any existing files (when creating a VeraCrypt file container). If you select an existing file in this step, it will be overwritten and replaced by the newly created volume (so the overwritten file + will be <em>lost</em>, <em>not </em>encrypted). You will be able to encrypt existing files (later on) by moving them to the VeraCrypt volume that we are creating now.*</p> +<p>Select the desired path (where you wish the container to be created) in the file selector. Type the desired container file name in the +<strong>Filename </strong>box.<br> +<br> +Click <strong>Save</strong>.<br> +<br> +The file selector window should disappear.<br> +<br> +In the following steps, we will return to the VeraCrypt Volume Creation Wizard.</p> +<p>* Note that after you copy existing unencrypted files to a VeraCrypt volume, you should securely erase (wipe) the original unencrypted files. There are software tools that can be used for the purpose of secure erasure (many of them are free).</p> +<h4>STEP 7:</h4> +<p><img src="Beginner's Tutorial_Image_007.jpg" alt="" width="360" height="335"><br> +<br> +In the Volume Creation Wizard window, click <strong>Next</strong>.</p> +<h4>STEP 8:</h4> +<p><img src="Beginner's Tutorial_Image_008.jpg" alt="" width="359" height="331"><br> +<br> +Here you can choose an encryption algorithm and a hash algorithm for the volume. If you are not sure what to select here, you can use the default settings and click +<strong>Next </strong>(for more information, see chapters <a href="Encryption Algorithms.html"> +<em>Encryption Algorithms</em></a> and <a href="Hash%20Algorithms.html"> +<em>Hash Algorithms</em></a>).</p> +<h4>STEP 9:</h4> +<p><img src="Beginner's Tutorial_Image_009.jpg" alt="" width="369" height="332"><br> +<br> +Here we specify that we wish the size of our VeraCrypt container to be 250 megabyte. You may, of course, specify a different size. After you type the desired size in the input field (marked with a red rectangle), click +<strong>Next</strong>.</p> +<h4>STEP 10:</h4> +<p><img src="Beginner's Tutorial_Image_010.jpg" alt="" width="372" height="368"><br> +<br> +This is one of the most important steps. Here you have to choose a good volume password. Read carefully the information displayed in the Wizard window about what is considered a good password.<br> +<br> +After you choose a good password, type it in the first input field. Then re-type it in the input field below the first one and click +<strong>Next</strong>.</p> +<p>Note: The button <strong>Next </strong>will be disabled until passwords in both input fields are the same.</p> +<h4>STEP 11:</h4> +<p><img src="Beginner's Tutorial_Image_011.jpg" alt="" width="365" height="368"><br> +<br> +Move your mouse as randomly as possible within the Volume Creation Wizard window at least until the randomness indicator becomes green. The longer you move the mouse, the better (moving the mouse for at least 30 seconds is recommended). This significantly increases + the cryptographic strength of the encryption keys (which increases security).<br> +<br> +Click <strong>Format</strong>.<br> +<br> +Volume creation should begin. VeraCrypt will now create a file called <em>My Volume +</em>in the folder F<em>:\Data\ </em>(as we specified in Step 6). This file will be a VeraCrypt container (it will contain the encrypted VeraCrypt volume). Depending on the size of the volume, the volume creation may take a long time. After it finishes, the + following dialog box will appear:<br> +<br> +<img src="Beginner's Tutorial_Image_012.jpg" alt="" width="398" height="171"><br> +<br> +Click <strong>OK </strong>to close the dialog box.</p> +<h4>STEP 12:</h4> +<p><img src="Beginner's Tutorial_Image_013.jpg" alt="" width="361" height="333"><br> +<br> +We have just successfully created a VeraCrypt volume (file container). In the VeraCrypt Volume Creation Wizard window, click +<strong>Exit</strong>.<br> +<br> +The Wizard window should disappear.<br> +<br> +In the remaining steps, we will mount the volume we just created. We will return to the main VeraCrypt window (which should still be open, but if it is not, repeat Step 1 to launch VeraCrypt and then continue from Step 13.)</p> +<h4>STEP 13:</h4> +<p><img src="Beginner's Tutorial_Image_014.jpg" alt="" width="579" height="498"><br> +<br> +Select a drive letter from the list (marked with a red rectangle). This will be the drive letter to which the VeraCrypt container will be mounted.<br> +<br> +Note: In this tutorial, we chose the drive letter M, but you may of course choose any other available drive letter.</p> +<h4>STEP 14:</h4> +<p><img src="Beginner's Tutorial_Image_015.jpg" alt="" width="579" height="498"><br> +<br> +Click <strong>Select File</strong>.<br> +<br> +The standard file selector window should appear.</p> +<h4>STEP 15:</h4> +<p><img src="Beginner's Tutorial_Image_016.jpg" alt="" width="625" height="453"><br> +<br> +In the file selector, browse to the container file (which we created in Steps 6-12) and select it. Click +<strong>Open </strong>(in the file selector window).<br> +<br> +The file selector window should disappear.<br> +<br> +In the following steps, we will return to the main VeraCrypt window.</p> +<h4>STEP 16:</h4> +<p><img src="Beginner's Tutorial_Image_017.jpg" alt="" width="579" height="498"><br> +<br> +In the main VeraCrypt window, click <strong>Mount</strong>. Password prompt dialog window should appear.</p> +<h4>STEP 17:</h4> +<p><img src="Beginner's Tutorial_Image_018.jpg" alt="" width="499" height="205"><br> +<br> +Type the password (which you specified in Step 10) in the password input field (marked with a red rectangle).</p> +<h4>STEP 18:</h4> +<p><img src="Beginner's Tutorial_Image_019.jpg" alt="" width="499" height="205"><br> +<br> +Select the PRF algorithm that was used during the creation of the volume (SHA-512 is the default PRF used by VeraCrypt). If you don’t remember which PRF was used, just leave it set to “autodetection” but the mounting process will take more + time. Click <strong>OK</strong> after entering the password.<br> +<br> +VeraCrypt will now attempt to mount the volume. If the password is incorrect (for example, if you typed it incorrectly), VeraCrypt will notify you and you will need to repeat the previous step (type the password again and click +<strong>OK</strong>). If the password is correct, the volume will be mounted.</p> +<h4>FINAL STEP:</h4> +<p><img src="Beginner's Tutorial_Image_020.jpg" alt="" width="579" height="498"><br> +<br> +We have just successfully mounted the container as a virtual disk M:<br> +<br> +The virtual disk is entirely encrypted (including file names, allocation tables, free space, etc.) and behaves like a real disk. You can save (or copy, move, etc.) files to this virtual disk and they will be encrypted on the fly as they are being written.<br> +<br> +If you open a file stored on a VeraCrypt volume, for example, in media player, the file will be automatically decrypted to RAM (memory) on the fly while it is being read.</p> +<p>Important: Note that when you open a file stored on a VeraCrypt volume (or when you write/copy a file to/from the VeraCrypt volume) you will not be asked to enter the password again. You need to enter the correct password only when mounting the volume.</p> +<p>You can open the mounted volume, for example, by selecting it on the list as shown in the screenshot above (blue selection) and then double-clicking on the selected item.</p> +<p>You can also browse to the mounted volume the way you normally browse to any other types of volumes. For example, by opening the ‘<em>Computer</em>’ (or ‘<em>My Computer</em>’) list and double clicking the corresponding drive letter + (in this case, it is the letter M).<br> +<br> +<img src="Beginner's Tutorial_Image_021.jpg" alt="" width="406" height="264"><br> +<br> +You can copy files (or folders) to and from the VeraCrypt volume just as you would copy them to any normal disk (for example, by simple drag-and-drop operations). Files that are being read or copied from the encrypted VeraCrypt volume are automatically decrypted + on the fly in RAM (memory). Similarly, files that are being written or copied to the VeraCrypt volume are automatically encrypted on the fly in RAM (right before they are written to the disk).<br> +<br> +Note that VeraCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume + will be dismounted and all files stored on it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), all files stored on the volume will be inaccessible (and encrypted). To make them accessible + again, you have to mount the volume. To do so, repeat Steps 13-18.</p> +<p>If you want to close the volume and make files stored on it inaccessible, either restart your operating system or dismount the volume. To do so, follow these steps:<br> +<br> +<img src="Beginner's Tutorial_Image_022.jpg" alt="" width="579" height="498"><br> +<br> +Select the volume from the list of mounted volumes in the main VeraCrypt window (marked with a red rectangle in the screenshot above) and then click +<strong>Dismount </strong>(also marked with a red rectangle in the screenshot above). To make files stored on the volume accessible again, you will have to mount the volume. To do so, repeat Steps 13-18.</p> +<h2>How to Create and Use a VeraCrypt-Encrypted Partition/Device</h2> +<p>Instead of creating file containers, you can also encrypt physical partitions or drives (i.e., create VeraCrypt device-hosted volumes). To do so, repeat the steps 1-3 but in the step 3 select the second or third option. Then follow the remaining instructions + in the wizard. When you create a device-hosted VeraCrypt volume within a <em>non-system +</em>partition/drive, you can mount it by clicking <em>Auto-Mount Devices </em>in the main VeraCrypt window. For information pertaining to encrypted +<em>system </em>partition/drives, see the chapter <a href="System%20Encryption.html"> +<em>System Encryption</em></a>.</p> +<p>Important: <em>We strongly recommend that you also read the other chapters of this manual, as they contain important information that has been omitted in this tutorial for simplicity.</em></p> +</div> +</body></html> diff --git a/doc/html/Beginner's Tutorial_Image_001.jpg b/doc/html/Beginner's Tutorial_Image_001.jpg Binary files differnew file mode 100644 index 00000000..cfe13f27 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_001.jpg diff --git a/doc/html/Beginner's Tutorial_Image_002.jpg b/doc/html/Beginner's Tutorial_Image_002.jpg Binary files differnew file mode 100644 index 00000000..efb1fbaa --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_002.jpg diff --git a/doc/html/Beginner's Tutorial_Image_003.jpg b/doc/html/Beginner's Tutorial_Image_003.jpg Binary files differnew file mode 100644 index 00000000..456a855e --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_003.jpg diff --git a/doc/html/Beginner's Tutorial_Image_004.jpg b/doc/html/Beginner's Tutorial_Image_004.jpg Binary files differnew file mode 100644 index 00000000..9b83e71e --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_004.jpg diff --git a/doc/html/Beginner's Tutorial_Image_005.jpg b/doc/html/Beginner's Tutorial_Image_005.jpg Binary files differnew file mode 100644 index 00000000..57d33d58 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_005.jpg diff --git a/doc/html/Beginner's Tutorial_Image_007.jpg b/doc/html/Beginner's Tutorial_Image_007.jpg Binary files differnew file mode 100644 index 00000000..2aff5b18 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_007.jpg diff --git a/doc/html/Beginner's Tutorial_Image_008.jpg b/doc/html/Beginner's Tutorial_Image_008.jpg Binary files differnew file mode 100644 index 00000000..873a7a10 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_008.jpg diff --git a/doc/html/Beginner's Tutorial_Image_009.jpg b/doc/html/Beginner's Tutorial_Image_009.jpg Binary files differnew file mode 100644 index 00000000..7e29bb90 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_009.jpg diff --git a/doc/html/Beginner's Tutorial_Image_010.jpg b/doc/html/Beginner's Tutorial_Image_010.jpg Binary files differnew file mode 100644 index 00000000..693562b4 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_010.jpg diff --git a/doc/html/Beginner's Tutorial_Image_011.jpg b/doc/html/Beginner's Tutorial_Image_011.jpg Binary files differnew file mode 100644 index 00000000..4c6f6714 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_011.jpg diff --git a/doc/html/Beginner's Tutorial_Image_012.jpg b/doc/html/Beginner's Tutorial_Image_012.jpg Binary files differnew file mode 100644 index 00000000..b24ad6ae --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_012.jpg diff --git a/doc/html/Beginner's Tutorial_Image_013.jpg b/doc/html/Beginner's Tutorial_Image_013.jpg Binary files differnew file mode 100644 index 00000000..4d76add2 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_013.jpg diff --git a/doc/html/Beginner's Tutorial_Image_014.jpg b/doc/html/Beginner's Tutorial_Image_014.jpg Binary files differnew file mode 100644 index 00000000..19462cde --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_014.jpg diff --git a/doc/html/Beginner's Tutorial_Image_015.jpg b/doc/html/Beginner's Tutorial_Image_015.jpg Binary files differnew file mode 100644 index 00000000..e257bf42 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_015.jpg diff --git a/doc/html/Beginner's Tutorial_Image_016.jpg b/doc/html/Beginner's Tutorial_Image_016.jpg Binary files differnew file mode 100644 index 00000000..878027d6 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_016.jpg diff --git a/doc/html/Beginner's Tutorial_Image_017.jpg b/doc/html/Beginner's Tutorial_Image_017.jpg Binary files differnew file mode 100644 index 00000000..476ffd4b --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_017.jpg diff --git a/doc/html/Beginner's Tutorial_Image_018.jpg b/doc/html/Beginner's Tutorial_Image_018.jpg Binary files differnew file mode 100644 index 00000000..b0254408 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_018.jpg diff --git a/doc/html/Beginner's Tutorial_Image_019.jpg b/doc/html/Beginner's Tutorial_Image_019.jpg Binary files differnew file mode 100644 index 00000000..9e379b25 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_019.jpg diff --git a/doc/html/Beginner's Tutorial_Image_020.jpg b/doc/html/Beginner's Tutorial_Image_020.jpg Binary files differnew file mode 100644 index 00000000..0b1f02b9 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_020.jpg diff --git a/doc/html/Beginner's Tutorial_Image_021.jpg b/doc/html/Beginner's Tutorial_Image_021.jpg Binary files differnew file mode 100644 index 00000000..e241f40e --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_021.jpg diff --git a/doc/html/Beginner's Tutorial_Image_022.jpg b/doc/html/Beginner's Tutorial_Image_022.jpg Binary files differnew file mode 100644 index 00000000..5a36c7e6 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_022.jpg diff --git a/doc/html/Beginner's Tutorial_Image_023.gif b/doc/html/Beginner's Tutorial_Image_023.gif Binary files differnew file mode 100644 index 00000000..5786a91a --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_023.gif diff --git a/doc/html/Beginner's Tutorial_Image_024.gif b/doc/html/Beginner's Tutorial_Image_024.gif Binary files differnew file mode 100644 index 00000000..7176b9de --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_024.gif diff --git a/doc/html/Beginner's Tutorial_Image_034.png b/doc/html/Beginner's Tutorial_Image_034.png Binary files differnew file mode 100644 index 00000000..34379d67 --- /dev/null +++ b/doc/html/Beginner's Tutorial_Image_034.png diff --git a/doc/html/Camellia.html b/doc/html/Camellia.html new file mode 100644 index 00000000..e35bae17 --- /dev/null +++ b/doc/html/Camellia.html @@ -0,0 +1,47 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Encryption%20Algorithms.html">Encryption Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Camellia.html">Camellia</a> +</p></div> + +<div class="wikidoc"> +<h1>Camellia</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Jointly developed by Mitsubishi Electric and NTT of Japan, Camellia is a 128-bit block cipher that was first published on 2000. It has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt uses Camellia with 24 rounds and a 256-bit key operating in <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +XTS mode</a> (see the section <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Modes of Operation</a>).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="Kuznyechik.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Cascades.html b/doc/html/Cascades.html new file mode 100644 index 00000000..baebdef0 --- /dev/null +++ b/doc/html/Cascades.html @@ -0,0 +1,66 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Encryption%20Algorithms.html">Encryption Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Cascades.html">Cascades of ciphers</a> +</p></div> + +<div class="wikidoc"> +<h1>Cascades of ciphers</h1> +<p> </p> +<h2>AES-Twofish</h2> +<p>Two ciphers in a cascade [15, 16] operating in XTS mode (see the section <a href="Modes%20of%20Operation.html"> +<em>Modes of Operation</em></a>). Each 128-bit block is first encrypted with Twofish (256-bit key) in XTS mode and then with AES (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see +<a href="Header Key Derivation.html"><em>Header Key Derivation, Salt, and Iteration Count</em></a>). See above for information on the individual cascaded ciphers.</p> +<h2>AES-Twofish-Serpent</h2> +<p>Three ciphers in a cascade [15, 16] operating in XTS mode (see the section <a href="Modes%20of%20Operation.html"> +<em>Modes of Operation</em></a>). Each 128-bit block is first encrypted with Serpent (256-bit key) in XTS mode, then with Twofish (256-bit key) in XTS mode, and finally with AES (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption + keys are mutually independent (note that header keys are independent too, even though they are derived from a single password – see the section +<a href="Header Key Derivation.html"><em>Header Key Derivation, Salt, and Iteration Count</em></a>). See above for information on the individual cascaded ciphers.</p> +<h2>Serpent-AES</h2> +<p>Two ciphers in a cascade [15, 16] operating in XTS mode (see the section <a href="Modes%20of%20Operation.html"> +<em>Modes of Operation</em></a>). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode and then with Serpent (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that + header keys are independent too, even though they are derived from a single password – see the section +<a href="Header Key Derivation.html"><em>Header Key Derivation, Salt, and Iteration Count</em></a>). See above for information on the individual cascaded ciphers.</p> +<h2>Serpent-Twofish-AES</h2> +<p>Three ciphers in a cascade [15, 16] operating in XTS mode (see the section <a href="Modes%20of%20Operation.html"> +<em>Modes of Operation</em></a>). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode, then with Twofish (256- bit key) in XTS mode, and finally with Serpent (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All + encryption keys are mutually independent (note that header keys are independent too, even though they are derived from a single password – see the section +<a href="Header Key Derivation.html"><em>Header Key Derivation, Salt, and Iteration Count</em></a>). See above for information on the individual cascaded ciphers.</p> +<h2>Twofish-Serpent</h2> +<p>Two ciphers in a cascade [15, 16] operating in XTS mode (see the section <a href="Modes%20of%20Operation.html"> +<em>Modes of Operation</em></a>). Each 128-bit block is first encrypted with Serpent (256-bit key) in XTS mode and then with Twofish (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note + that header keys are independent too, even though they are derived from a single password – see the section +<a href="Header Key Derivation.html"><em>Header Key Derivation, Salt, and Iteration Count</em></a>). See above for information on the individual cascaded ciphers.</p> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/Changing Passwords and Keyfiles.html b/doc/html/Changing Passwords and Keyfiles.html new file mode 100644 index 00000000..d759a251 --- /dev/null +++ b/doc/html/Changing Passwords and Keyfiles.html @@ -0,0 +1,56 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Changing%20Passwords%20and%20Keyfiles.html">Changing Passwords and Keyfiles</a> +</p></div> + +<div class="wikidoc"> +<h1>Changing Passwords and Keyfiles</h1> +<p>Note that the volume header (which is encrypted with a header key derived from a password/keyfile) contains the master key (not to be confused with the password) with which the volume is encrypted. If an adversary is allowed to make a copy of your volume + before you change the volume password and/or keyfile(s), he may be able to use his copy or fragment (the old header) of the VeraCrypt volume to mount your volume using a compromised password and/or compromised keyfiles that were necessary to mount the volume + before you changed the volume password and/or keyfile(s).<br> +<br> +If you are not sure whether an adversary knows your password (or has your keyfiles) and whether he has a copy of your volume when you need to change its password and/or keyfiles, it is strongly recommended that you create a new VeraCrypt volume and move files + from the old volume to the new volume (the new volume will have a different master key).<br> +<br> +Also note that if an adversary knows your password (or has your keyfiles) and has access to your volume, he may be able to retrieve and keep its master key. If he does, he may be able to decrypt your volume even after you change its password and/or keyfile(s) + (because the master key does not change when you change the volume password and/or keyfiles). In such a case, create a new VeraCrypt volume and move all files from the old volume to this new one.<br> +<br> +The following sections of this chapter contain additional information pertaining to possible security issues connected with changing passwords and/or keyfiles:</p> +<ul> +<li><a href="Security%20Requirements%20and%20Precautions.html"><em>Security Requirements and Precautions</em></a> +</li><li><a href="Journaling%20File%20Systems.html"><em>Journaling File Systems</em></a> +</li><li><a href="Defragmenting.html"><em>Defragmenting</em></a> +</li><li><a href="Reallocated%20Sectors.html"><em>Reallocated Sectors</em></a> +</li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Choosing Passwords and Keyfiles.html b/doc/html/Choosing Passwords and Keyfiles.html new file mode 100644 index 00000000..89bf5deb --- /dev/null +++ b/doc/html/Choosing Passwords and Keyfiles.html @@ -0,0 +1,51 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Choosing%20Passwords%20and%20Keyfiles.html">Choosing Passwords and Keyfiles</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Choosing Passwords and Keyfiles</h1> +<p>It is very important that you choose a good password. You must avoid choosing one that contains only a single word that can be found in a dictionary (or a combination of such words). It must not contain any names, dates of birth, account numbers, or any + other items that could be easy to guess. A good password is a random combination of upper and lower case letters, numbers, and special characters, such as @ ^ = $ * + etc. We strongly recommend choosing a password consisting of more than 20 characters (the + longer, the better). Short passwords are easy to crack using brute-force techniques.<br> +<br> +To make brute-force attacks on a keyfile infeasible, the size of the keyfile must be at least 30 bytes. If a volume uses multiple keyfiles, then at least one of the keyfiles must be 30 bytes in size or larger. Note that the 30-byte limit assumes a large amount + of entropy in the keyfile. If the first 1024 kilobytes of a file contain only a small amount of entropy, it must not be used as a keyfile (regardless of the file size). If you are not sure what entropy means, we recommend that you let VeraCrypt generate a + file with random content and that you use it as a keyfile (select <em>Tools -> Keyfile Generator</em>).</p> +<p>When creating a volume, encrypting a system partition/drive, or changing passwords/keyfiles, you must not allow any third party to choose or modify the password/keyfile(s) before/while the volume is created or the password/keyfiles(s) changed. For example, + you must not use any password generators (whether website applications or locally run programs) where you are not sure that they are high-quality and uncontrolled by an attacker, and keyfiles must not be files that you download from the internet or that are + accessible to other users of the computer (whether they are administrators or not).</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Command Line Usage.html b/doc/html/Command Line Usage.html new file mode 100644 index 00000000..544e6d2c --- /dev/null +++ b/doc/html/Command Line Usage.html @@ -0,0 +1,258 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Command%20Line%20Usage.html">Command Line Usage</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Command Line Usage</h1> +<p>Note that this section applies to the Windows version of VeraCrypt. For information on command line usage applying to the +<strong>Linux and Mac OS X versions</strong>, please run: veracrypt –h</p> +<table border="1" cellspacing="0" cellpadding="0"> +<tbody> +<tr> +<td><em>/help</em> or <em>/?</em></td> +<td>Display command line help.</td> +</tr> +<tr> +<td><em>/truecrypt or /tc</em></td> +<td>Activate TrueCrypt compatibility mode which enables mounting volumes created with TrueCrypt 6.x and 7.x series.</td> +</tr> +<tr> +<td><em>/hash</em></td> +<td>It must be followed by a parameter indicating the PRF hash algorithm to use when mounting the volume. Possible values for /hash parameter are: sha256, sha-256, sha512, sha-512, whirlpool, ripemd160 and ripemd-160. When /hash is omitted, VeraCrypt will try + all possible PRF algorithms thus lengthening the mount operation time.</td> +</tr> +<tr> +<td id="volume"><em>/volume</em> or <em>/v</em></td> +<td> +<p>It must be followed by a parameter indicating the file and path name of a VeraCrypt volume to mount (do not use when dismounting) or the Volume ID of the disk/partition to mount.<br> +The syntax of the volume ID is <strong>ID:XXXXXX...XX</strong> where the XX part is a 64 hexadecimal characters string that represent the 32-Bytes ID of the desired volume to mount.<br> +<br> +To mount a partition/device-hosted volume, use, for example, /v \Device\Harddisk1\Partition3 (to determine the path to a partition/device, run VeraCrypt and click +<em>Select Device</em>). You can also mount a partition or dynamic volume using its volume name (for example, /v \\?\Volume{5cceb196-48bf-46ab-ad00-70965512253a}\). To determine the volume name use e.g. mountvol.exe. Also note that device paths are case-sensitive.<br> +<br> +You can also specify the Volume ID of the partition/device-hosted volume to mount, for example: /v ID:53B9A8D59CC84264004DA8728FC8F3E2EE6C130145ABD3835695C29FD601EDCA. The Volume ID value can be retrieved using the volume properties dialog.</p> +</td> +</tr> +<tr> +<td><em>/letter</em> or <em>/l</em></td> +<td>It must be followed by a parameter indicating the driver letter to mount the volume as. When /l is omitted and when /a is used, the first free drive letter is used.</td> +</tr> +<tr> +<td><em>/explore</em> or <em>/e</em></td> +<td>Open an Explorer window after a volume has been mounted.</td> +</tr> +<tr> +<td><em>/beep</em> or <em>/b</em></td> +<td>Beep after a volume has been successfully mounted or dismounted.</td> +</tr> +<tr> +<td><em>/auto</em> or <em>/a</em></td> +<td>If no parameter is specified, automatically mount the volume. If devices is specified as the parameter (e.g., /a devices), auto-mount all currently accessible device/partition-hosted VeraCrypt volumes. If favorites is specified as the parameter, auto-mount + favorite volumes. Note that /auto is implicit if /quit and /volume are specified. If you need to prevent the application window from appearing, use /quit.</td> +</tr> +<tr> +<td><em>/dismount</em> or <em>/d</em></td> +<td>Dismount volume specified by drive letter (e.g., /d x). When no drive letter is specified, dismounts all currently mounted VeraCrypt volumes.</td> +</tr> +<tr> +<td><em>/force</em> or <em>/f</em></td> +<td>Forces dismount (if the volume to be dismounted contains files being used by the system or an application) and forces mounting in shared mode (i.e., without exclusive access).</td> +</tr> +<tr> +<td><em>/keyfile</em> or <em>/k</em></td> +<td>It must be followed by a parameter specifying a keyfile or a keyfile search path. For multiple keyfiles, specify e.g.: /k c:\keyfile1.dat /k d:\KeyfileFolder /k c:\kf2 To specify a keyfile stored on a security token or smart card, use the following syntax: + token://slot/SLOT_NUMBER/file/FILE_NAME</td> +</tr> +<tr id="tryemptypass"> +<td><em>/tryemptypass </em></td> +<td>ONLY when default keyfile configured or when a keyfile is specified in the command line.<br> +If it is followed by <strong>y</strong> or <strong>yes</strong> or if no parameter is specified: try to mount using an empty password and the keyfile before displaying password prompt.<br> +if it is followed by <strong>n </strong>or<strong> no</strong>: don't try to mount using an empty password and the keyfile, and display password prompt right away.</td> +</tr> +<tr> +<td><em>/nowaitdlg</em></td> +<td>If it is followed by <strong>y</strong> or <strong>yes</strong> or if no parameter is specified: don’t display the waiting dialog while performing operations like mounting volumes.<br> +If it is followed by <strong>n</strong> or <strong>no</strong>: force the display waiting dialog is displayed while performing operations.</td> +</tr> +<tr> +<td><em>/tokenlib</em></td> +<td>It must be followed by a parameter indicating the PKCS #11 library to use for security tokens and smart cards. (e.g.: /tokenlib c:\pkcs11lib.dll)</td> +</tr> +<tr> +<td><em>/tokenpin</em></td> +<td>It must be followed by a parameter indicating the PIN to use in order to authenticate to the security token or smart card (e.g.: /tokenpin 0000). Warning: This method of entering a smart card PIN may be insecure, for example, when an unencrypted command + prompt history log is being saved to unencrypted disk.</td> +</tr> +<tr> +<td><em>/cache</em> or <em>/c</em></td> +<td>If it is followed by <strong>y</strong> or <strong>yes</strong> or if no parameter is specified: enable password cache; +<br> +If it is followed by <strong>n </strong>or<strong> no</strong>: disable password cache (e.g., /c n).<br> +If it is followed by <strong>f </strong>or<strong> favorites</strong>: temporary cache password when mounting multiple favorites (e.g., /c f).<br> +Note that turning the password cache off will not clear it (use /w to clear the password cache).</td> +</tr> +<tr> +<td><em>/history</em> or <em>/h</em></td> +<td>If it is followed by <strong>y</strong> or no parameter: enables saving history of mounted volumes; if it is followed by +<strong>n</strong>: disables saving history of mounted volumes (e.g., /h n).</td> +</tr> +<tr> +<td><em>/wipecache</em> or <em>/w</em></td> +<td>Wipes any passwords cached in the driver memory.</td> +</tr> +<tr> +<td><em>/password</em> or <em>/p</em></td> +<td>It must be followed by a parameter indicating the volume password. If the password contains spaces, it must be enclosed in quotation marks (e.g., /p ”My Password”). Use /p ”” to specify an empty password. +<em>Warning: This method of entering a volume password may be insecure, for example, when an unencrypted command prompt history log is being saved to unencrypted disk.</em></td> +</tr> +<tr> +<td><em>/pim</em></td> +<td>It must be followed by a positive integer indicating the PIM (Personal Iterations Multiplier) to use for the volume.</td> +</tr> +<tr> +<td><em>/quit</em> or <em>/q</em></td> +<td>Automatically perform requested actions and exit (main VeraCrypt window will not be displayed). If preferences is specified as the parameter (e.g., /q preferences), then program settings are loaded/saved and they override settings specified on the command + line. /q background launches the VeraCrypt Background Task (tray icon) unless it is disabled in the Preferences.</td> +</tr> +<tr> +<td><em>/silent</em> or <em>/s</em></td> +<td>If /q is specified, suppresses interaction with the user (prompts, error messages, warnings, etc.). If /q is not specified, this option has no effect.</td> +</tr> +<tr> +<td><em>/mountoption</em> or <em>/m</em></td> +<td> +<p>It must be followed by a parameter which can have one of the values indicated below.</p> +<p><strong>ro</strong> or<strong> readonly</strong>: Mount volume as read-only.</p> +<p><strong>rm</strong> or <strong>removable</strong>: Mount volume as removable medium (see section +<a href="Removable%20Medium%20Volume.html"> +<em>Volume Mounted as Removable Medium</em></a>).</p> +<p><strong>ts</strong> or <strong>timestamp</strong>: Do not preserve container modification timestamp.</p> +<p><strong>sm</strong> or <strong>system</strong>: Without pre-boot authentication, mount a partition that is within the key scope of system encryption (for example, a partition located on the encrypted system drive of another operating system that is not running). + Useful e.g. for backup or repair operations. Note: If you supply a password as a parameter of /p, make sure that the password has been typed using the standard US keyboard layout (in contrast, the GUI ensures this automatically). This is required due to the + fact that the password needs to be typed in the pre-boot environment (before Windows starts) where non-US Windows keyboard layouts are not available.</p> +<p><strong>bk</strong> or <strong>headerbak</strong>: Mount volume using embedded backup header. Note: All volumes created by VeraCrypt contain an embedded backup header (located at the end of the volume).</p> +<p><strong>recovery</strong>: Do not verify any checksums stored in the volume header. This option should be used only when the volume header is damaged and the volume cannot be mounted even with the mount option headerbak. Example: /m ro</p> +<p><strong>label=LabelValue</strong>: Use the given string value <strong>LabelValue</strong> as a label of the mounted volume in Windows Explorer. The maximum length for +<strong>LabelValue </strong> is 32 characters for NTFS volumes and 11 characters for FAT volumes. For example, +<em>/m label=MyDrive</em> will set the label of the drive in Explorer to <em>MyDrive</em>.<br> +<br> +Please note that this switch may be present several times in the command line in order to specify multiple mount options (e.g.: /m rm /m ts)</p> +</td> +</tr> +</tbody> +</table> +<h4>VeraCrypt Format.exe (VeraCrypt Volume Creation Wizard):</h4> +<table border="1" cellspacing="0" cellpadding="0"> +<tbody> +<tr> +<td>/create</td> +<td>Create a container based volume in command line mode. It must be followed by the file name of the container to be created.</td> +</tr> +<tr> +<td>/size</td> +<td> +<p>(Only with /create)<br> +It must be followed by a parameter indicating the size of the container file that will be created. This parameter is a number indicating the size in Bytes. It can have a suffixe 'K', 'M', 'G' or 'T' to indicate that the value is in Kilobytes, Megabytes, Gigabytes + or Terabytes respectively. For example:</p> +<ul> +<li>/size 5000000: the container size will be 5000000 bytes </li><li>/size 25K: the container size will be 25 KiloBytes. </li><li>/size 100M: the container size will be 100 MegaBytes. </li><li>/size 2G: the container size will be 2 GigaBytes. </li><li>/size 1T: the container size will be 1 TeraBytes. </li></ul> +</td> +</tr> +<tr> +<td> /password</td> +<td> (Only with /create)<br> +It must be followed by a parameter indicating the password of the container that will be created.</td> +</tr> +<tr> +<td> <em>/hash</em></td> +<td>(Only with /create)<br> +It must be followed by a parameter indicating the PRF hash algorithm to use when creating the volume. It has the same syntax as VeraCrypt.exe.</td> +</tr> +<tr> +<td>/encryption</td> +<td>(Only with /create)<br> +It must be followed by a parameter indicating the encryption algorithm to use. The default is AES if this switch is not specified. The parameter can have the following values (case insensitive): +<ul> +<li>AES </li><li>Serpent </li><li>Twofish </li><li>AES(Twofish) </li><li>AES(Twofish(Serpent)) </li><li>Serpent(AES) </li><li>Serpent(Twofish(AES)) </li><li>Twofish(Serpent) </li></ul> +</td> +</tr> +<tr> +<td>/filesystem</td> +<td>(Only with /create)<br> +It must be followed by a parameter indicating the file system to use for the volume. The parameter can have the following values: +<ul> +<li>None: don't use any filesystem </li><li>FAT: format using FAT/FAT32 </li><li>NTFS: format using NTFS. Please note that in this case a UAC prompt will be displayed unless the process is run with full administrative privileges. +</li></ul> +</td> +</tr> +<tr> +<td>/dynamic</td> +<td>(Only with /create)<br> +It has no parameters and it indicates that the volume will be created as a dynamic volume.</td> +</tr> +<tr> +<td>/force</td> +<td>(Only with /create)<br> +It has no parameters and it indicates that overwrite will be forced without requiring user confirmation.</td> +</tr> +<tr> +<td>/silent</td> +<td>(Only with /create)<br> +It has no parameters and it indicates that no message box or dialog will be displayed to the user. If there is any error, the operation will fail silently.</td> +</tr> +<tr> +<td><em>/noisocheck</em> or <em>/n</em></td> +<td>Do not verify that VeraCrypt Rescue Disks are correctly burned. <strong>WARNING</strong>: Never attempt to use this option to facilitate the reuse of a previously created VeraCrypt Rescue Disk. Note that every time you encrypt a system partition/drive, + you must create a new VeraCrypt Rescue Disk even if you use the same password. A previously created VeraCrypt Rescue Disk cannot be reused as it was created for a different master key.</td> +</tr> +</tbody> +</table> +<h4>Syntax</h4> +<p>VeraCrypt.exe [/tc] [/hash {sha256|sha-256|sha512|sha-512|whirlpool |ripemd160|ripemd-160}][/a [devices|favorites]] [/b] [/c [y|n|f]] [/d [drive letter]] [/e] [/f] [/h [y|n]] [/k keyfile or search path] [tryemptypass [y|n]] [/l drive letter] [/m {bk|rm|recovery|ro|sm|ts}] + [/p password] [/pim pimvalue] [/q [background|preferences]] [/s] [/tokenlib path] [/v volume] [/w]</p> +<p>"VeraCrypt Format.exe" [/n] [/create] [/size number[{K|M|G|T}]] [/p password] [/encryption {AES | Serpent | Twofish | AES(Twofish) | AES(Twofish(Serpent)) | Serpent(AES) | Serpent(Twofish(AES)) | Twofish(Serpent)}] [/hash {sha256|sha-256|sha512|sha-512|whirlpool|ripemd160|ripemd-160}] + [/filesystem {None|FAT|NTFS}] [/dynamic] [/force] [/silent]</p> +<p>Note that the order in which options are specified does not matter.</p> +<h4>Examples</h4> +<p>Mount the volume <em>d:\myvolume</em> as the first free drive letter, using the password prompt (the main program window will not be displayed):</p> +<p>veracrypt /q /v d:\myvolume</p> +<p>Dismount a volume mounted as the drive letter <em>X</em> (the main program window will not be displayed):</p> +<p>veracrypt /q /d x</p> +<p>Mount a volume called <em>myvolume.tc</em> using the password <em>MyPassword</em>, as the drive letter +<em>X</em>. VeraCrypt will open an explorer window and beep; mounting will be automatic:</p> +<p>veracrypt /v myvolume.tc /l x /a /p MyPassword /e /b</p> +<p>Create a 10 MB file container using the password <em>test</em> and formatted using FAT:</p> +<p><code>"C:\Program Files\VeraCrypt\VeraCrypt Format.exe" /create c:\Data\test.hc /password test /hash sha512 /encryption serpent /filesystem FAT /size 10M /force</code></p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Contact.html b/doc/html/Contact.html new file mode 100644 index 00000000..5e114af9 --- /dev/null +++ b/doc/html/Contact.html @@ -0,0 +1,53 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Contact.html">Contact</a> +</p></div> + +<div class="wikidoc"> +<h1><strong style="text-align:left">Contact us</strong></h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +You can contact us by sending a message to veracrypt-contact [at] lists dot sourceforge.net .<br> +You can also use the address veracrypt [at] idrix dot fr, which is associated with VeraCrypt Team PGP key.<em style="text-align:left"><br> +</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To contact IDRIX directly, you can use <a href="https://www.idrix.fr/Root/mos/Contact_Us/Itemid,3" target="_blank"> +our contact form</a>.</div> +</div> +<div> +<p> +We are also present on social media:<br> +<a title="VeraCrypt on Twitter" href="https://twitter.com/VeraCrypt_IDRIX" target="_blank"><img src="twitter_veracrypt.PNG" alt="VeraCrypt on Twitter" width="168" height="28"></a> +<a title="VeraCrypt on Facebook" href="https://www.facebook.com/veracrypt" target="_blank"><img src="Home_facebook_veracrypt.png" alt="VeraCrypt on Facebook" width="61" height="28"></a> +<a title="VeraCrypt on Reddit" href="https://www.reddit.com/r/VeraCrypt/" target="_blank"><img src="Home_reddit.png" alt="VeraCrypt on Reddit" width="94" height="28"></a> +</p> +</div> +</body></html> diff --git a/doc/html/Contributed Resources.html b/doc/html/Contributed Resources.html new file mode 100644 index 00000000..97045cac --- /dev/null +++ b/doc/html/Contributed Resources.html @@ -0,0 +1,65 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a class="active" href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div class="wikidoc"> +<p>Here you'll find useful resources contributed by VeraCrypt users.</p> +<h3>Third party binaries:</h3> +<ul> +<li>Linux Ubuntu <strong>PPA</strong> provided by user <a href="https://unit193.net/" target="_blank">"Unit 193"</a> (build done by Launchpad): +<ul> +<li><a href="https://launchpad.net/~unit193/+archive/ubuntu/encryption" target="_blank">https://launchpad.net/~unit193/+archive/ubuntu/encryption</a> +</li></ul> +</li><li>Linux <strong>Armv7</strong> GUI/console 32-bit build on ChromeBook by user <a href="https://www.codeplex.com/site/users/view/haggster"> +haggster</a>: +<ul> +<li><a href="http://sourceforge.net/projects/veracrypt/files/Contributions/ARM%20Linux/veracrypt-1.0f-1-setup-arm.tar.bz2/download" target="_blank">veracrypt-1.0f-1-setup-arm.tar.bz2</a> +</li></ul> +</li></ul> +<h3>Tutorials:</h3> +<ul> +<li><a href="http://schneckchen.in/veracrypt-anleitung-zum-daten-verschluesseln/" target="_blank">http://schneckchen.in/veracrypt-anleitung-zum-daten-verschluesseln/</a>: +<ul> +<li>German tutorial on VeraCrypt by Andreas Heinz. </li></ul> +</li><li><a href="http://howto.wared.fr/raspberry-pi-arch-linux-arm-installation-veracrypt/" target="_blank">http://howto.wared.fr/raspberry-pi-arch-linux-arm-installation-veracrypt/</a>: +<ul> +<li>French HowTo for building VeraCrypt on Raspberry Pi Arch Linux by <a href="http://howto.wared.fr/author/wared/" target="_blank"> +Edouard WATTECAMPS</a>. </li></ul> +</li><li><a href="http://sourceforge.net/projects/veracrypt/files/Contributions/clonezilla_using_veracrypt_ver_1.1.doc/download" target="_blank">clonezilla_using_veracrypt_ver_1.1.doc</a>: +<ul> +<li>Tutorial on using VeraCrypt in CloneZilla for accessing encrypted backups. By +<a href="https://www.codeplex.com/site/users/view/pjc123" target="_blank">pjc123</a>. +</li></ul> +</li><li><a href="https://bohdan-danishevsky.blogspot.fr/2016/11/raspberry-pi-raspbian-installing.html" target="_blank">https://bohdan-danishevsky.blogspot.fr/2016/11/raspberry-pi-raspbian-installing.html</a> +<ul> +<li>Tutorial on installing and using official VeraCrypt binaries on Raspberry Pi (Raspbian) by Bohdan Danishevsky. +</li></ul> +</li></ul> +<h3>Miscellaneous:</h3> +<ul> +<li><a href="http://sourceforge.net/projects/veracrypt/files/Contributions/vcsteg2.py/download" target="_blank">vcsteg2.py</a> : a Python script that tries to hide a VeraCrypt volume inside a video file (Steganography) +</li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Converting TrueCrypt volumes and partitions.html b/doc/html/Converting TrueCrypt volumes and partitions.html new file mode 100644 index 00000000..324c8c53 --- /dev/null +++ b/doc/html/Converting TrueCrypt volumes and partitions.html @@ -0,0 +1,43 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt volumes and partitions</a> +</p></div> + +<div class="wikidoc"> +<h1>Converting TrueCrypt volumes and partitions</h1> +<p>Starting from version 1.0f, TrueCrypt volumes and <strong>non-system</strong> partitions can be converted to VeraCrypt format using any of the following actions:</p> +<ul> +<li>Change Volume Password </li><li>Set Header Key Derivation Algorithm </li><li>Add/Remove key files </li><li>Remove all key files </li></ul> +<p>“TrueCrypt Mode” must be checked in the dialog as show below:</p> +<p> <img src="Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg" alt="" width="511" height="436"></p> +<p><strong>Note: </strong>Converting system partitions encrypted with TrueCrypt is not supported.</p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg b/doc/html/Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg Binary files differnew file mode 100644 index 00000000..12119bfd --- /dev/null +++ b/doc/html/Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg diff --git a/doc/html/Creating New Volumes.html b/doc/html/Creating New Volumes.html new file mode 100644 index 00000000..9dc7ef69 --- /dev/null +++ b/doc/html/Creating New Volumes.html @@ -0,0 +1,111 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Creating%20New%20Volumes.html">Creating New Volumes</a> +</p></div> + +<div class="wikidoc"> +<h1>Creating a New VeraCrypt Volume</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>To create a new VeraCrypt file-hosted volume or to encrypt a partition/device (requires administrator privileges), click on ‘Create Volume’ in the main program window. VeraCrypt Volume Creation Wizard should appear. As soon as the Wizard appears, + it starts collecting data that will be used in generating the master key, secondary key (XTS mode), and salt, for the new volume. The collected data, which should be as random as possible, include your mouse movements, key presses, and other values obtained + from the system (for more information, please see the section <a href="Random%20Number%20Generator.html"> +<em>Random Number Generator</em></a>). The Wizard provides help and information necessary to successfully create a new VeraCrypt volume. However, several items deserve further explanation:</p> +<h3>Hash Algorithm</h3> +<p>Allows you to select which hash algorithm VeraCrypt will use. The selected hash algorithm is used by the random number generator (as a pseudorandom mixing function), which generates the master key, secondary key (XTS mode), and salt (for more information, + please see the section <a href="Random%20Number%20Generator.html"> +<em>Random Number Generator</em></a>). It is also used in deriving the new volume header key and secondary header key (see the section +<a href="Header%20Key%20Derivation.html"> +<em>Header Key Derivation, Salt, and Iteration Count</em></a>).<br> +<br> +For information about the implemented hash algorithms, see the chapter <a href="Hash%20Algorithms.html"> +<em>Hash Algorithms.</em></a><br> +<br> +Note that the output of a hash function is <em>never </em>used directly as an encryption key. For more information, please refer to the chapter +<a href="Technical%20Details.html"><em>Technical Details</em></a>.</p> +<h3>Encryption Algorithm</h3> +<p>This allows you to select the encryption algorithm with which your new volume will be encrypted. Note that the encryption algorithm cannot be changed after the volume is created. For more information, please see the chapter +<a href="Encryption%20Algorithms.html"><em>Encryption Algorithms</em></a>.</p> +<h3 id="QuickFormat">Quick Format</h3> +<p>If unchecked, each sector of the new volume will be formatted. This means that the new volume will be +<em>entirely </em>filled with random data. Quick format is much faster but may be less secure because until the whole volume has been filled with files, it may be possible to tell how much data it contains (if the space was not filled with random data beforehand). + If you are not sure whether to enable or disable Quick Format, we recommend that you leave this option unchecked. Note that Quick Format can only be enabled when encrypting partitions/devices.</p> +<p>Important: When encrypting a partition/device within which you intend to create a hidden volume afterwards, leave this option unchecked.</p> +<h3 id="dynamic">Dynamic</h3> +<p>Dynamic VeraCrypt container is a pre-allocated NTFS sparse file whose physical size (actual disk space used) grows as new data is added to it. Note that the physical size of the container (actual disk space that the container uses) will not decrease when + files are deleted on the VeraCrypt volume. The physical size of the container can only +<em>increase </em>up to the maximum value that is specified by the user during the volume creation process. After the maximum specified size is reached, the physical size of the container will remain constant.<br> +<br> +Note that sparse files can only be created in the NTFS file system. If you are creating a container in the FAT file system, the option +<em>Dynamic </em>will be disabled (“grayed out”).<br> +<br> +Note that the size of a dynamic (sparse-file-hosted) VeraCrypt volume reported by Windows and by VeraCrypt will always be equal to its maximum size (which you specify when creating the volume). To find out current physical size of the container (actual disk + space it uses), right-click the container file (in a Windows Explorer window, not in VeraCrypt), then select +<em>Properties </em>and see the Size on disk value.</p> +<p>WARNING: Performance of dynamic (sparse-file-hosted) VeraCrypt volumes is significantly worse than performance of regular volumes. Dynamic (sparse-file-hosted) VeraCrypt volumes are also less secure, because it is possible to tell which volume sectors are + unused. Furthermore, if data is written to a dynamic volume when there is not enough free space in its host file system, the encrypted file system may get corrupted.</p> +<h3>Cluster Size</h3> +<p>Cluster is an allocation unit. For example, one cluster is allocated on a FAT file system for a one- byte file. When the file grows beyond the cluster boundary, another cluster is allocated. Theoretically, this means that the bigger the cluster size, the + more disk space is wasted; however, the better the performance. If you do not know which value to use, use the default.</p> +<h3>VeraCrypt Volumes on CDs and DVDs</h3> +<p>If you want a VeraCrypt volume to be stored on a CD or a DVD, first create a file-hosted VeraCrypt container on a hard drive and then burn it onto a CD/DVD using any CD/DVD burning software (or, under Windows XP or later, using the CD burning tool provided + with the operating system). Remember that if you need to mount a VeraCrypt volume that is stored on a read-only medium (such as a CD/DVD) under Windows 2000, you must format the VeraCrypt volume as FAT. The reason is that Windows 2000 cannot mount NTFS file + system on read-only media (Windows XP and later versions of Windows can).</p> +<h3>Hardware/Software RAID, Windows Dynamic Volumes</h3> +<p>VeraCrypt supports hardware/software RAID as well as Windows dynamic volumes.</p> +<p>Windows Vista or later: Dynamic volumes are displayed in the ‘Select Device’ dialog window as \Device\HarddiskVolumeN.</p> +<p>Windows XP/2000/2003: If you intend to format a Windows dynamic volume as a VeraCrypt volume, keep in mind that after you create the Windows dynamic volume (using the Windows Disk Management tool), you must restart the operating system in order for the volume + to be available/displayed in the ‘Select Device’ dialog window of the VeraCrypt Volume Creation Wizard. Also note that, in the ‘Select Device’ dialog window, a Windows dynamic volume is not displayed as a single device (item). Instead, + all volumes that the Windows dynamic volume consists of are displayed and you can select any of them in order to format the entire Windows dynamic volume.</p> +<h3>Additional Notes on Volume Creation</h3> +<p>After you click the ‘Format’ button in the Volume Creation Wizard window (the last step), there will be a short delay while your system is being polled for additional random data. Afterwards, the master key, header key, secondary key (XTS mode), + and salt, for the new volume will be generated, and the master key and header key contents will be displayed.<br> +<br> +For extra security, the portions of the randomness pool, master key, and header key can be prevented from being displayed by unchecking the checkbox in the upper right corner of the corresponding field:<br> +<br> +<img src="Beginner's Tutorial_Image_023.gif" alt="" width="338" height="51"><br> +<br> +Note that only the first 128 bits of the pool/keys are displayed (not the entire contents).<br> +<br> +You can create FAT (whether it will be FAT12, FAT16, or FAT32, is automatically determined from the number of clusters) or NTFS volumes (however, NTFS volumes can only be created by users with administrator privileges). Mounted VeraCrypt volumes can be reformatted + as FAT12, FAT16, FAT32, or NTFS anytime. They behave as standard disk devices so you can right-click the drive letter of the mounted VeraCrypt volume (for example in the ‘<em>Computer</em>’ or ‘<em>My Computer</em>’ list) and select + ‘Format’.<br> +<br> +For more information about creating VeraCrypt volumes, see also the section <a href="Hidden%20Volume.html"> +<em>Hidden Volume</em></a>.</p> +<p> </p> +<p><a href="Favorite%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</div> + +</body></html> diff --git a/doc/html/Data Leaks.html b/doc/html/Data Leaks.html new file mode 100644 index 00000000..ee37fd69 --- /dev/null +++ b/doc/html/Data Leaks.html @@ -0,0 +1,70 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Data%20Leaks.html">Data Leaks</a> +</p></div> + +<div class="wikidoc"> +<h2>Data Leaks</h2> +<p>When a VeraCrypt volume is mounted, the operating system and third-party applications may write to unencrypted volumes (typically, to the unencrypted system volume) unencrypted information about the data stored in the VeraCrypt volume (e.g. filenames and + locations of recently accessed files, databases created by file indexing tools, etc.), or the data itself in an unencrypted form (temporary files, etc.), or unencrypted information about the filesystem residing in the VeraCrypt volume. Note that Windows automatically + records large amounts of potentially sensitive data, such as the names and locations of files you open, applications you run, etc.</p> +<p>Also, starting from Windows 8, every time a VeraCrypt volume that is formatted using NTFS is mounted, an Event 98 is written for the system Events Log and it will contain the device name (\\device\VeraCryptVolumeXX) of the volume. This event log "feature" + was introduced in Windows 8 as part of newly introduced NTFS health checks as explained +<a href="https://blogs.msdn.microsoft.com/b8/2012/05/09/redesigning-chkdsk-and-the-new-ntfs-health-model/" target="_blank"> +here</a>. To avoid this leak, the VeraCrypt volume must be mounted <a href="Removable%20Medium%20Volume.html"> +as a removable medium</a>. Big thanks to Liran Elharar for discovering this leak and its workaround.<br> +<br> +In order to prevent data leaks, you must follow these steps (alternative steps may exist):</p> +<ul> +<li>If you do <em>not</em> need plausible deniability: +<ul> +<li>Encrypt the system partition/drive (for information on how to do so, see the chapter +<a href="System%20Encryption.html"><em>System Encryption</em></a>) and ensure that only encrypted or read-only filesystems are mounted during each session in which you work with sensitive data.<br> +<br> +or, </li><li>If you cannot do the above, download or create a "live CD" version of your operating system (i.e. a "live" system entirely stored on and booted from a CD/DVD) that ensures that any data written to the system volume is written to a RAM disk. When you need + to work with sensitive data, boot such a live CD/DVD and ensure that only encrypted and/or read-only filesystems are mounted during the session. +</li></ul> +</li><li>If you need plausible deniability: +<ul> +<li>Create a hidden operating system. VeraCrypt will provide automatic data leak protection. For more information, see the section +<a href="Hidden%20Operating%20System.html"> +<em>Hidden Operating System</em></a>.<br> +<br> +or, </li><li>If you cannot do the above, download or create a "live CD" version of your operating system (i.e. a "live" system entirely stored on and booted from a CD/DVD) that ensures that any data written to the system volume is written to a RAM disk. When you need + to work with sensitive data, boot such a live CD/DVD. If you use hidden volumes, follow the security requirements and precautions listed in the subsection +<a href="Security%20Requirements%20for%20Hidden%20Volumes.html"> +<em>Security Requirements and Precautions Pertaining to Hidden Volumes</em></a>. If you do not use hidden volumes, ensure that only non-system partition-hosted VeraCrypt volumes and/or read-only filesystems are mounted during the session. +</li></ul> +</li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Default Mount Parameters.html b/doc/html/Default Mount Parameters.html new file mode 100644 index 00000000..899c4280 --- /dev/null +++ b/doc/html/Default Mount Parameters.html @@ -0,0 +1,51 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Default%20Mount%20Parameters.html">Default Mount Parameters</a> +</p></div> + +<div class="wikidoc"> +<h2>Default Mount Parameters</h2> +<p>Starting from version 1.0f-2, it is possible to specify the PRF algorithm and the TrueCrypt mode that will be selected by default in the password dialog.</p> +<p>As show below, select the entry "Default Mount Parameters" under the menu "Settings":</p> +<p><img src="Home_VeraCrypt_menu_Default_Mount_Parameters.png" alt="Menu Default Mount Parameters" width="241" height="254"></p> +<p> </p> +<p>The following dialog will be displayed:</p> +<p><img src="Home_VeraCrypt_Default_Mount_Parameters.png" alt="Default Mount Parameters Dialog" width="267" height="144"></p> +<p>Make your modifications and then click OK.</p> +<p>The chosen values are then written to VeraCrypt main configuration file (Configuration.xml) making them persistent.</p> +<p>All subsequent password request dialogs will use the default values chosen previously. For example, if in the Default Mount Parameters dialog you check TrueCrypt Mode and you select SHA-512 as a PRF, then subsequent password dialogs will look like:<br> +<img src="Default Mount Parameters_VeraCrypt_password_using_default_parameters.png" alt="Mount Password Dialog using default values" width="499" height="205"></p> +<p> </p> +<p><strong>Note:</strong> The default mount parameters can be overridden by the <a href="Command%20Line%20Usage.html">Command Line</a> switches +<strong>/tc</strong> and <strong>/hash</strong> which always take precedence.</p> +<p> </p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Default Mount Parameters_VeraCrypt_password_using_default_parameters.png b/doc/html/Default Mount Parameters_VeraCrypt_password_using_default_parameters.png Binary files differnew file mode 100644 index 00000000..0c349d0b --- /dev/null +++ b/doc/html/Default Mount Parameters_VeraCrypt_password_using_default_parameters.png diff --git a/doc/html/Defragmenting.html b/doc/html/Defragmenting.html new file mode 100644 index 00000000..c7c16534 --- /dev/null +++ b/doc/html/Defragmenting.html @@ -0,0 +1,48 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Defragmenting.html">Defragmenting</a> +</p></div> + +<div class="wikidoc"> +<h1>Defragmenting</h1> +<p>When you (or the operating system) defragment the file system in which a file-hosted VeraCrypt container is stored, a copy of the VeraCrypt container (or of its fragment) may remain in the free space on the host volume (in the defragmented file system). + This may have various security implications. For example, if you change the volume password/keyfile(s) afterwards, and an adversary finds the old copy or fragment (the old header) of the VeraCrypt volume, he might use it to mount the volume using an old compromised + password (and/or using compromised keyfiles that were necessary to mount the volume before the volume header was re-encrypted). To prevent this and other possible security issues (such as those mentioned in the section +<a href="Volume%20Clones.html"><em>Volume Clones</em></a>), do one of the following:</p> +<ul> +<li>Use a partition/device-hosted VeraCrypt volume instead of file-hosted. </li><li><em>Securely</em> erase free space on the host volume (in the defragmented file system) after defragmenting. On Windows, this can be done using the Microsoft free utility +<code>SDelete</code> (<a href="https://technet.microsoft.com/en-us/sysinternals/bb897443.aspx" rel="nofollow">https://technet.microsoft.com/en-us/sysinternals/bb897443.aspx</a>). On Linux, the +<code>shred</code> utility from GNU coreutils package can be used for this purpose. +</li><li>Do not defragment file systems in which you store VeraCrypt volumes. </li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Digital Signatures.html b/doc/html/Digital Signatures.html new file mode 100644 index 00000000..17717b48 --- /dev/null +++ b/doc/html/Digital Signatures.html @@ -0,0 +1,99 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Miscellaneous.html">Miscellaneous</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Digital%20Signatures.html">Digital Signatures</a> +</p></div> + +<div class="wikidoc"> +<h1>Digital Signatures</h1> +<h3>Why Verify Digital Signatures</h3> +<p>It might happen that a VeraCrypt installation package you download from our server was created or modified by an attacker. For example, the attacker could exploit a vulnerability in the server software we use and alter the installation packages stored on + the server, or he/she could alter any of the files en route to you.<br> +<br> +Therefore, you should always verify the integrity and authenticity of each VeraCrypt distribution package you download or otherwise obtain from any source. In other words, you should always make sure that the file was created by us and it was not altered by + an attacker. One way to do so is to verify so-called digital signature(s) of the file.</p> +<h3>Types of Digital Signatures We Use</h3> +<p>We currently use two types of digital signatures:</p> +<ul> +<li><strong>PGP</strong> signatures (available for all binary and source code packages for all supported systems). +</li><li><strong>X.509</strong> signatures (available for binary packages for Windows). +</li></ul> +<h3>Advantages of X.509 Signatures</h3> +<p>X.509 signatures have the following advantages, in comparison to PGP signatures:</p> +<ul> +<li>It is much easier to verify that the key that signed the file is really ours (not attacker’s). +</li><li>You do not have to download or install any extra software to verify an X.509 signature (see below). +</li><li>You do not have to download and import our public key (it is embedded in the signed file). +</li><li>You do not have to download any separate signature file (the signature is embedded in the signed file). +</li></ul> +<h3>Advantages of PGP Signatures</h3> +<p>PGP signatures have the following advantages, in comparison to X.509 signatures:</p> +<ul> +<li>They do not depend on any certificate authority (which might be e.g. infiltrated or controlled by an adversary, or be untrustworthy for other reasons). +</li></ul> +<h3>How to Verify X.509 Signatures</h3> +<p>Please note that X.509 signatures are currently available only for the VeraCrypt self-extracting installation packages for Windows. An X.509 digital signature is embedded in each of those files along with the digital certificate of the VeraCrypt Foundation + issued by a public certification authority. To verify the integrity and authenticity of a self-extracting installation package for Windows, follow these steps:</p> +<ol> +<li>Download the VeraCrypt self-extracting installation package. </li><li>In the Windows Explorer, click the downloaded file (‘<em>VeraCrypt Setup.exe</em>’) with the right mouse button and select ‘<em>Properties</em>’ from the context menu. +</li><li>In the <em>Properties</em> dialog window, select the ‘<em>Digital Signatures</em>’ tab. +</li><li>On the ‘<em>Digital Signatures</em>’ tab, in the ‘<em>Signature list</em>’, double click the line saying "<em>IDRIX</em>" or +<em>"IDRIX SARL"</em>. </li><li>The ‘<em>Digital Signature Details</em>’ dialog window should appear now. If you see the following sentence at the top of the dialog window, then the integrity and authenticity of the package have been successfully verified:<br> +<br> +"<em>This digital signature is OK.</em>"<br> +<br> +If you do not see the above sentence, the file is very likely corrupted. Note: On some obsolete versions of Windows, some of the necessary certificates are missing, which causes the signature verification to fail. +</li></ol> +<h3 id="VerifyPGPSignature">How to Verify PGP Signatures</h3> +<p>To verify a PGP signature, follow these steps:</p> +<ol> +<li>Install any public-key encryption software that supports PGP signatures. For Windows, you can download +<a href="http://www.gpg4win.org/" target="_blank">Gpg4win</a>. For more information, you can visit +<a href="https://www.gnupg.org/">https://www.gnupg.org/</a>. </li><li>Create a private key (for information on how to do so, please see the documentation for the public-key encryption software). +</li><li>Download our PGP public key from <strong>IDRIX</strong> website (<a href="https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc" target="_blank">https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc</a>) or from a trusted public key repository + (ID=0x54DDD393), and import the downloaded key to your keyring (for information on how to do so, please see the documentation for the public-key encryption software). Please check that its fingerprint is +<strong>993B7D7E8E413809828F0F29EB559C7C54DDD393</strong>. </li><li>Sign the imported key with your private key to mark it as trusted (for information on how to do so, please see the documentation for the public-key encryption software).<br> +<br> +Note: If you skip this step and attempt to verify any of our PGP signatures, you will receive an error message stating that the signing key is invalid. +</li><li>Download the digital signature by downloading the <em>PGP Signature</em> of the file you want to verify (on the +<a href="Downloads.html">Downloads page</a>). +</li><li>Verify the downloaded signature (for information on how to do so, please see the documentation for the public-key encryption software). +</li></ol> +<p>Under Linux, these steps can be achieved using the following commands:</p> +<ul> +<li>Check that the fingerprint of the public key is <strong>993B7D7E8E413809828F0F29EB559C7C54DDD393</strong>: +<strong>gpg --with-fingerprint VeraCrypt_PGP_public_key.asc</strong> </li><li>If the fingerprint is the expected one, import the public key: <strong>gpg --import VeraCrypt_PGP_public_key.asc</strong> +</li><li>Verify the signature of the Linux setup archive (here for version 1.0e): <strong> +gpg --verify veracrypt-1.0e-setup.tar.bz2.sig veracrypt-1.0e-setup.tar.bz2</strong> +</li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Disclaimers.html b/doc/html/Disclaimers.html new file mode 100644 index 00000000..e5085d08 --- /dev/null +++ b/doc/html/Disclaimers.html @@ -0,0 +1,47 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Disclaimers.html">Disclaimers</a> +</p></div> + +<div class="wikidoc"> +<h2>Disclaimer of Warranty</h2> +<div align="justify" style="margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +THE CONTENT OF THIS WEBSITE (AND OF ANY ASSOCIATED WEBSITES/SERVERS) IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY. THE CONTENT OF THIS WEBSITE (AND OF ANY ASSOCIATED WEBSITES) MAY BE INACCURATE, INCORRECT, INVALID, + UNTRUE, FALSE, INCOMPLETE AND/OR MISLEADING. THE ENTIRE RISK AS TO THE QUALITY, CORRECTNESS, ACCURACY, OR COMPLETENESS OF THE CONTENT OF THIS WEBSITE (AND OF ANY ASSOCIATED WEBSITES) IS WITH YOU. THE AUTHOR(S), OWNER(S), PUBLISHER(S), AND ADMINISTRATOR(S) + OF THIS WEBSITE (AND ASSOCIATED WEBSITES/SERVERS), AND APPLICABLE INTELLECTUAL-PROPERTY OWNER(S) DISCLAIM ANY AND ALL WARRANTIES OF ANY KIND.</div> +<h2>Disclaimer of Liability</h2> +<div align="justify" style="margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +THE AUTHOR(S), OWNER(S), PUBLISHER(S), AND ADMINISTRATOR(S) OF THIS WEBSITE (AND ASSOCIATED WEBSITES/SERVERS), AND APPLICABLE INTELLECTUAL-PROPERTY OWNER(S) DISCLAIM ANY AND ALL LIABILITY AND IN NO EVENT WILL ANY OF THOSE PARTIES BE LIABLE TO YOU OR TO ANY + OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, PROCUREMENT OF SUBSTITUTE + SERVICES, OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT (INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF ANY USE OF THIS WEBSITE (OR ASSOCIATED WEBSITES/SERVERS) OR THE CONTENT THEREOF OR OF ANY THIRD-PARTY WEBSITE LINKED IN ANY + WAY FROM THIS WEBSITE (OR FROM ASSOCIATED WEBSITES), EVEN IF SUCH DAMAGES (OR THE POSSIBILITY OF SUCH DAMAGES) ARE/WERE PREDICTABLE OR KNOWN TO ANY AUTHOR, OWNER, PUBLISHER, ADMINISTRATOR, OR ANY OTHER PARTY.</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Documentation.html b/doc/html/Documentation.html new file mode 100644 index 00000000..a0ca310e --- /dev/null +++ b/doc/html/Documentation.html @@ -0,0 +1,146 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div class="wikidoc"> +<p><em style="text-align:left">This documentation is not guaranteed to be error-free and is provided "as is" without warranty of any kind. For more information, see +<a href="Disclaimers.html">Disclaimers</a>.</em></p> +<ul> +<li><a title="Preface" href="Preface.html"><strong>Preface</strong></a> +</li><li><strong><a href="Introduction.html">Introduction</a></strong> +</li><li><strong><a href="Beginner%27s%20Tutorial.html">Beginner's Tutorial</a></strong> +</li><li><strong><strong><a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a></strong></strong> +<ul> +<li><a href="Creating%20New%20Volumes.html">Creating a New VeraCrypt Volume</a> +</li><li><a href="Favorite%20Volumes.html">Favorite Volumes</a> +</li><li><a href="System%20Favorite%20Volumes.html">System Favorite Volumes</a> +</li></ul> +</li><li><strong><a href="System%20Encryption.html">System Encryption</a></strong> +<ul> +<li><a href="Hidden%20Operating%20System.html">Hidden Operating System</a> +</li><li><a href="Supported%20Systems%20for%20System%20Encryption.html">Operating Systems Supported for System Encryption</a> +</li><li><a href="VeraCrypt%20Rescue%20Disk.html">VeraCrypt Rescue Disk</a> +</li></ul> +</li><li><strong><a href="Plausible%20Deniability.html">Plausible Deniability</a></strong><br> +<ul> +<li><a href="Hidden%20Volume.html">Hidden Volume</a> +<ul> +<li><a href="Protection%20of%20Hidden%20Volumes.html">Protection of Hidden Volumes Against Damage</a> +</li><li><a href="Security%20Requirements%20for%20Hidden%20Volumes.html">Security Requirements and Precautions Pertaining to Hidden Volumes</a> +</li></ul> +</li><li><a href="VeraCrypt%20Hidden%20Operating%20System.html">Hidden Operating System</a> +</li></ul> +</li><li><strong><a href="Main%20Program%20Window.html">Main Program Window</a></strong> +<ul> +<li><a href="Program%20Menu.html">Program Menu</a> +</li><li><a href="Mounting%20VeraCrypt%20Volumes.html">Mounting Volumes</a> +</li></ul> +</li><li><strong><a href="Parallelization.html">Parallelization</a></strong> +</li><li><strong><a href="Pipelining.html">Pipelining</a></strong> +</li><li><strong><a href="Hardware%20Acceleration.html">Hardware acceleration</a></strong> +</li><li><strong><a href="Hot%20Keys.html">Hot keys</a></strong> +</li><li><strong><a href="Keyfiles%20in%20VeraCrypt.html">Keyfiles</a></strong> +</li><li><strong><a href="Security%20Tokens%20%26%20Smart%20Cards.html">Security Tokens & Smart Cards</a></strong> +</li><li><strong><a href="Portable%20Mode.html">Portable Mode</a></strong> +</li><li><strong><a href="TrueCrypt%20Support.html">TrueCrypt Support</a></strong> +</li><li><strong><a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt Volumes & Partitions</a></strong> +</li><li><strong><a href="Default%20Mount%20Parameters.html">Default Mount Parameters</a></strong> +</li><li><strong><a href="Language%20Packs.html">Language Packs</a></strong> +</li><li><strong><a href="Encryption%20Algorithms.html">Encryption Algorithms</a></strong> +<ul> +<li><a href="AES.html">AES</a> </li><li><a href="Camellia.html">Camellia</a> +</li><li><a href="Kuznyechik.html">Kuznyechik</a> +</li><li><a href="Serpent.html">Serpent</a> </li><li><a href="Twofish.html">Twofish</a> </li><li><a href="Cascades.html">Cascades of ciphers</a> +</li></ul> +</li><li><strong><a href="Hash%20Algorithms.html">Hash Algorithms</a></strong> +<ul> +<li><a href="RIPEMD-160.html">RIPEMD-160</a> +</li><li><a href="SHA-256.html">SHA-256</a> </li><li><a href="SHA-512.html">SHA-512</a> </li><li><a href="Whirlpool.html">Whirlpool</a> +</li><li><a href="Streebog.html">Streebog</a></li></ul> +</li><li><strong><a href="Supported%20Operating%20Systems.html">Supported Operating Systems</a></strong> +</li><li><strong><a href="Command%20Line%20Usage.html">Command Line Usage</a></strong> +</li><li><strong><a href="Security%20Model.html">Security Model</a></strong> +</li><li><strong><a href="Security%20Requirements%20and%20Precautions.html">Security Requirements And Precautions<br> +</a></strong> +<ul> +<li><a href="Data%20Leaks.html">Data Leaks</a> +<ul> +<li><a href="Paging%20File.html">Paging File</a> +</li><li><a href="Memory%20Dump%20Files.html">Memory Dump Files</a> +</li><li><a href="Hibernation%20File.html">Hibernation File</a> +</li></ul> +</li><li><a href="Unencrypted%20Data%20in%20RAM.html">Unencrypted Data in RAM</a> +</li><li><a href="Physical%20Security.html">Physical Security</a> +</li><li><a href="Malware.html">Malware</a> </li><li><a href="Multi-User%20Environment.html">Multi-User Environment</a> +</li><li><a href="Authenticity%20and%20Integrity.html">Authenticity and Integrity</a> +</li><li><a href="Choosing%20Passwords%20and%20Keyfiles.html">Choosing Passwords and Keyfiles</a> +</li><li><a href="Changing%20Passwords%20and%20Keyfiles.html">Changing Passwords and Keyfiles</a> +</li><li><a href="Trim%20Operation.html">Trim Operation</a> +</li><li><a href="Wear-Leveling.html">Wear-Leveling</a> +</li><li><a href="Reallocated%20Sectors.html">Reallocated Sectors</a> +</li><li><a href="Defragmenting.html">Defragmenting</a> +</li><li><a href="Journaling%20File%20Systems.html">Journaling File Systems</a> +</li><li><a href="Volume%20Clones.html">Volume Clones</a> +</li><li><a href="Additional%20Security%20Requirements%20and%20Precautions.html">Additional Security Requirements and Precautions</a> +</li></ul> +</li><li><strong><a href="How%20to%20Back%20Up%20Securely.html">How To Back Up Securely</a></strong> +</li><li><strong><a href="Miscellaneous.html">Miscellaneous</a></strong> +<ul> +<li><a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html">Using VeraCrypt Without Administrator Privileges</a> +</li><li><a href="Sharing%20over%20Network.html">Sharing Over Network</a> +</li><li><a href="VeraCrypt%20Background%20Task.html">VeraCrypt Background Task</a> +</li><li><a href="Removable%20Medium%20Volume.html">Volume Mounted as Removable Medium</a> +</li><li><a href="VeraCrypt%20System%20Files.html">VeraCrypt System Files & Application Data</a> +</li><li><a href="Removing%20Encryption.html">How To Remove Encryption</a> +</li><li><a href="Uninstalling%20VeraCrypt.html">Uninstalling VeraCrypt</a> +</li><li><a href="Digital%20Signatures.html">Digital Signatures</a> +</li></ul> +</li><li><strong><a href="Troubleshooting.html">Troubleshooting</a></strong> +</li><li><strong><a href="Incompatibilities.html">Incompatibilities</a></strong> +</li><li><strong><a href="Issues%20and%20Limitations.html">Kown Issues and Limitations</a></strong> +</li><li><strong><a href="FAQ.html">Frequently Asked Questions</a></strong> +</li><li><strong><strong><a href="Technical%20Details.html">Technical Details</a></strong></strong> +<ul> +<li><a href="Notation.html">Notation</a> +</li><li><a href="Encryption%20Scheme.html">Encryption Scheme</a> +</li><li><a href="Modes%20of%20Operation.html">Modes of Operation</a> +</li><li><a href="Header%20Key%20Derivation.html">Header Key Derivation, Salt, and Iteration Count</a> +</li><li><a href="Random%20Number%20Generator.html">Random Number Generator</a> +</li><li><a href="Keyfiles.html">Keyfiles</a> +</li><li><a title="PIM" href="Personal%20Iterations%20Multiplier%20(PIM).html">PIM</a> +</li><li><a href="VeraCrypt%20Volume%20Format%20Specification.html">VeraCrypt Volume Format Specification</a> +</li><li><a href="Standard%20Compliance.html">Compliance with Standards and Specifications</a> +</li><li><a href="Source%20Code.html">Source Code</a> +</li></ul> +</li><li><strong><a href="Contact.html">Contact</a></strong> +</li><li><strong><a href="Legal%20Information.html">Legal Information</a></strong> +</li><li><strong><a href="Release%20Notes.html">Version History</a></strong> +</li><li><strong><a href="Acknowledgements.html">Acknowledgements</a></strong> +</li><li><strong><a href="References.html">References</a></strong> +</li></ul> +</div> + +</body></html>
\ No newline at end of file diff --git a/doc/html/Encryption Algorithms.html b/doc/html/Encryption Algorithms.html new file mode 100644 index 00000000..0619fd65 --- /dev/null +++ b/doc/html/Encryption Algorithms.html @@ -0,0 +1,210 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Encryption%20Algorithms.html">Encryption Algorithms</a> +</p></div> + +<div class="wikidoc"> +<h1>Encryption Algorithms</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt volumes can be encrypted using the following algorithms:</div> +<table style="border-collapse:separate; border-spacing:0px; width:608px; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; border-width:0px 0px 1px 1px; border-style:solid; border-color:#ffffff #ffffff #000000 #000000"> +<tbody style="text-align:left"> +<tr style="text-align:left"> +<th style="width:151px; font-weight:normal; text-align:center; vertical-align:middle; color:#000000; border-width:1px 1px 1px 0px; border-style:solid solid solid none; padding:12px 0px; border-color:#000000 #000000 #000000 white"> +Algorithm</th> +<th style="width:225px; font-weight:normal; text-align:center; vertical-align:middle; color:#000000; border-width:1px 1px 1px 0px; border-style:solid solid solid none; padding:12px 0px; border-color:#000000 #000000 #000000 white"> +Designer(s)</th> +<th style="width:94px; font-weight:normal; text-align:center; vertical-align:middle; color:#000000; border-width:1px 1px 1px 0px; border-style:solid solid solid none; padding:12px 0px; border-color:#000000 #000000 #000000 white"> +Key Size<br> +(Bits)</th> +<th style="width:68px; font-weight:normal; text-align:center; vertical-align:middle; color:#000000; border-width:1px 1px 1px 0px; border-style:solid solid solid none; padding:12px 0px; border-color:#000000 #000000 #000000 white"> +Block Size (Bits)</th> +<th style="width:68px; font-weight:normal; text-align:center; vertical-align:middle; color:#000000; border-width:1px 1px 1px 0px; border-style:solid solid solid none; padding:12px 0px; border-color:#000000 #000000 #000000 white"> +<a href="Modes%20of%20Operation.html" style="color:#0080c0; text-decoration:none.html">Mode of Operation</a></th> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="AES.html" style="color:#0080c0; text-decoration:none.html">AES</a></td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +J. Daemen, V. Rijmen</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="Modes%20of%20Operation.html" style="color:#0080c0; text-decoration:none.html">XTS</a></td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="Camellia.html">Camellia</a></td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<p align="center" style="margin-left:0cm"><font face="Arial, serif"><font size="2" style="font-size:9pt">Mitsubishi Electric and NTT of Japan</font></font></p> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +XTS</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<p align="center" style="margin-left:0cm"><a href="Kuznyechik.html">Kuznyechik</a></p> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<p align="center" style="margin-left:0cm"><font face="Arial, serif"><font size="2" style="font-size:9pt">National Standard of the Russian Federation<br> +GOST R 34.12-2015</font></font></p> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + 128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + XTS</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="Serpent.html" style="color:#0080c0; text-decoration:none.html">Serpent</a></td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +R. Anderson, E. Biham, L. Knudsen</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +XTS</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="Twofish.html" style="color:#0080c0; text-decoration:none.html">Twofish</a></td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +B. Schneier, J. Kelsey, D. Whiting,<br> +D. Wagner, C. Hall, N. Ferguson</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +XTS</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="Cascades.html" style="color:#0080c0; text-decoration:none.html">AES-Twofish</a></td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256; 256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +XTS</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="Cascades.html" style="color:#0080c0; text-decoration:none.html">AES-Twofish-Serpent</a></td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256; 256; 256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +XTS</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="Cascades.html" style="color:#0080c0; text-decoration:none.html">Serpent-AES</a></td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256; 256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +XTS</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="Cascades.html" style="color:#0080c0; text-decoration:none.html">Serpent-Twofish-AES</a></td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256; 256; 256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +XTS</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +<a href="Cascades.html" style="color:#0080c0; text-decoration:none.html">Twofish-Serpent</a></td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +256; 256</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +128</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> +XTS</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +</tbody> +</table> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +For information about XTS mode, please see the section <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Modes of Operation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="AES.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Encryption Scheme.html b/doc/html/Encryption Scheme.html new file mode 100644 index 00000000..b77a0aaf --- /dev/null +++ b/doc/html/Encryption Scheme.html @@ -0,0 +1,89 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Encryption%20Scheme.html">Encryption Scheme</a> +</p></div> + +<div class="wikidoc"> +<h1>Encryption Scheme</h1> +<p>When mounting a VeraCrypt volume (assume there are no cached passwords/keyfiles) or when performing pre-boot authentication, the following steps are performed:</p> +<ol> +<li>The first 512 bytes of the volume (i.e., the standard volume header) are read into RAM, out of which the first 64 bytes are the salt (see +<a href="VeraCrypt%20Volume%20Format%20Specification.html"> +<em>VeraCrypt Volume Format Specification</em></a>). For system encryption (see the chapter +<a href="System%20Encryption.html"><em>System Encryption</em></a>), the last 512 bytes of the first logical drive track are read into RAM (the VeraCrypt Boot Loader is stored in the first track of the system drive and/or + on the VeraCrypt Rescue Disk). </li><li>Bytes 65536–66047 of the volume are read into RAM (see the section <a href="VeraCrypt%20Volume%20Format%20Specification.html"> +<em>VeraCrypt Volume Format Specification</em></a>). For system encryption, bytes 65536–66047 of the first partition located behind the active partition* are read (see the section +<a href="Hidden%20Operating%20System.html"> +Hidden Operating System</a>). If there is a hidden volume within this volume (or within the partition behind the boot partition), we have read its header at this point; otherwise, we have just read random data (whether or not there is a hidden volume within + it has to be determined by attempting to decrypt this data; for more information see the section +<a href="Hidden%20Volume.html"><em>Hidden Volume</em></a>). +</li><li>Now VeraCrypt attempts to decrypt the standard volume header read in (1). All data used and generated in the course of the process of decryption are kept in RAM (VeraCrypt never saves them to disk). The following parameters are unknown† and have + to be determined through the process of trial and error (i.e., by testing all possible combinations of the following): +<ol type="a"> +<li>PRF used by the header key derivation function (as specified in PKCS #5 v2.0; see the section +<a href="Header%20Key%20Derivation.html"> +<em>Header Key Derivation, Salt, and Iteration Count</em></a>), which can be one of the following: +<p>HMAC-SHA-512, HMAC-SHA-256, HMAC-RIPEMD-160, HMAC-Whirlpool. If a PRF is explicitly specified by the user, it will be used directly without trying the other possibilities.</p> +<p>A password entered by the user (to which one or more keyfiles may have been applied – see the section +<a href="Keyfiles%20in%20VeraCrypt.html"> +<em>Keyfiles</em></a>), a PIM value (if specified) and the salt read in (1) are passed to the header key derivation function, which produces a sequence of values (see the section +<a href="Header%20Key%20Derivation.html"> +<em>Header Key Derivation, Salt, and Iteration Count</em></a>) from which the header encryption key and secondary header key (XTS mode) are formed. (These keys are used to decrypt the volume header.)</p> +</li><li>Encryption algorithm: AES-256, Serpent, Twofish, AES-Serpent, AES-Twofish- Serpent, etc. +</li><li>Mode of operation: only XTS is supported </li><li>Key size(s) </li></ol> +</li><li>Decryption is considered successful if the first 4 bytes of the decrypted data contain the ASCII string “VERA”, and if the CRC-32 checksum of the last 256 bytes of the decrypted data (volume header) matches the value located at byte #8 of the + decrypted data (this value is unknown to an adversary because it is encrypted – see the section +<a href="VeraCrypt%20Volume%20Format%20Specification.html"> +<em>VeraCrypt Volume Format Specification</em></a>). If these conditions are not met, the process continues from (3) again, but this time, instead of the data read in (1), the data read in (2) are used (i.e., possible hidden volume header). If the conditions + are not met again, mounting is terminated (wrong password, corrupted volume, or not a VeraCrypt volume). +</li><li>Now we know (or assume with very high probability) that we have the correct password, the correct encryption algorithm, mode, key size, and the correct header key derivation algorithm. If we successfully decrypted the data read in (2), we also know that + we are mounting a hidden volume and its size is retrieved from data read in (2) decrypted in (3). +</li><li>The encryption routine is reinitialized with the primary master key** and the secondary master key (XTS mode – see the section +<a href="Modes%20of%20Operation.html"><em>Modes of Operation</em></a>), which are retrieved from the decrypted volume header (see the section +<a href="VeraCrypt%20Volume%20Format%20Specification.html"> +<em>VeraCrypt Volume Format Specification</em></a>). These keys can be used to decrypt any sector of the volume, except the volume header area (or the key data area, for system encryption), which has been encrypted using the header keys. The volume is mounted. +</li></ol> +<p>See also section <a href="Modes%20of%20Operation.html"> +<em>Modes of Operation</em></a> and section <a href="Header%20Key%20Derivation.html"> +<em>Header Key Derivation, Salt, and Iteration Count</em></a> and also the chapter +<a href="Security%20Model.html"><em>Security Model</em></a>.</p> +<p>* If the size of the active partition is less than 256 MB, then the data is read from the +<em>second</em> partition behind the active one (Windows 7 and later, by default, do not boot from the partition on which they are installed).</p> +<p>† These parameters are kept secret <em>not</em> in order to increase the complexity of an attack, but primarily to make VeraCrypt volumes unidentifiable (indistinguishable from random data), which would be difficult to achieve if these parameters + were stored unencrypted within the volume header. Also note that if a non-cascaded encryption algorithm is used for system encryption, the algorithm +<em>is</em> known (it can be determined by analyzing the contents of the unencrypted VeraCrypt Boot Loader stored in the first logical drive track or on the VeraCrypt Rescue Disk).</p> +<p>** The master keys were generated during the volume creation and cannot be changed later. Volume password change is accomplished by re-encrypting the volume header using a new header key (derived from a new password).</p> +<p> </p> +<p><a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/FAQ.html b/doc/html/FAQ.html new file mode 100644 index 00000000..e264fac8 --- /dev/null +++ b/doc/html/FAQ.html @@ -0,0 +1,734 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="FAQ.html">Frequently Asked Questions</a> +</p></div> + +<div class="wikidoc"> +<h1>Frequently Asked Questions</h1> +<div style="text-align:left; margin-bottom:19px; padding-top:0px; padding-bottom:0px; margin-top:0px"> +Last Updated December 23th, 2015</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">This document is not guaranteed to be error-free and is provided "as is" without warranty of any kind. For more information, see +<a href="Disclaimers.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Disclaimers</a>.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Can TrueCrypt and VeraCrypt be running on the same machine?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. There are generally no conflicts between TrueCrypt and VeraCrypt, thus they can be installed and used on the same machine. On Windows however, if they are both used to mount the same volume, two drives may appear when mounting it. This can be solved by + running the following command in an elevated command prompt (using Run as an administrator) before mounting any volume: +<strong>mountvol.exe /r</strong>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Can I use my TrueCrypt volumes in VeraCrypt?</strong></div> +Yes. Starting from version 1.0f, VeraCrypt supports mounting TrueCrypt volumes.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Can I convert my TrueCrypt volumes to VeraCrypt format?</strong></div> +Yes. Starting from version 1.0f, VeraCrypt offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This can achieved using the "Change Volume Password" or "Set Header Key Derivation Algorithm" actions. Just check + the "TrueCrypt Mode", enter you TrueCrypt password and perform the operation. After that, you volume will have the VeraCrypt format.<br> +Before doing the conversion, it is advised to backup the volume header using TrueCrypt. You can delete this backup safely once the conversion is done and after checking that the converted volume is mounted properly by VeraCrypt.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">What's the difference between TrueCrypt and VeraCrypt?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks.<br> +It also solves many vulnerabilities and security issues found in TrueCrypt.<br> +As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we use +<span style="text-decoration:underline">327661</span>. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses +<span style="text-decoration:underline">655331 </span>for RIPEMD160 and <span style="text-decoration:underline"> +500000 </span>iterations for SHA-2 and Whirlpool.<br> +This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted + data.</div> +</div> +<br id="PasswordLost" style="text-align:left"> +<strong style="text-align:left">I forgot my password – is there any way ('backdoor') to recover the files from my VeraCrypt volume?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +We have not implemented any 'backdoor' in VeraCrypt (and will never implement any even if asked to do so by a government agency), because it would defeat the purpose of the software. VeraCrypt does not allow decryption of data without knowing the correct password + or key. We cannot recover your data because we do not know and cannot determine the password you chose or the key you generated using VeraCrypt. The only way to recover your files is to try to "crack" the password or the key, but it could take thousands or + millions of years (depending on the length and quality of the password or keyfiles, on the software/hardware performance, algorithms, and other factors). Back in 2010, there was news about the +<a href="http://www.webcitation.org/query?url=g1.globo.com/English/noticia/2010/06/not-even-fbi-can-de-crypt-files-daniel-dantas.html" target="_blank"> +FBI failing to decrypt a TrueCrypt volume after a year of trying</a>. While we can't verify if this is true or just a "psy-op" stunt, in VeraCrypt we have increased the security of the key derivation to a level where any brute-force of the password is virtually + impossible, provided that all security requirements are respected.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Is there a "Quick Start Guide" or some tutorial for beginners?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. The first chapter, <strong style="text-align:left"><a href="Beginner%27s%20Tutorial.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html">Beginner's Tutorial</a></strong>, in the VeraCrypt + User Guide contains screenshots and step-by-step instructions on how to create, mount, and use a VeraCrypt volume.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I encrypt a partition/drive where Windows is installed?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, see the chapter <a href="System%20Encryption.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +System Encryption</a> in the VeraCrypt User Guide.</div> +<div id="BootingHang" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong>The system encryption Pre Test fails because the bootloader hangs with the messaging "booting" after successfully verifying the password. How to make the Pre Test succeed?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +There two known workarounds for this issue (Both require having a Windows Installation disk):</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<ol> +<li>Boot your machine using a Windows Installation disk and select to repair your computer. Choose "Command Prompt" option and when it opens, type the commands below and then restart your system: +<ul> +<li>BootRec /fixmbr </li><li>BootRec /FixBoot </li></ul> +</li><li>Delete the 100 MB System Reserved partition located at the beginning of your drive and set the system partition next to it as the active partition (both can be done using diskpart utility available in Windows Installation disk repair option). After that, + run Startup Repair after rebooting on Windows Installation disk. The following link contains detailed instructions: +<a href="https://www.sevenforums.com/tutorials/71363-system-reserved-partition-delete.html" target="_blank"> +https://www.sevenforums.com/tutorials/71363-system-reserved-partition-delete.html</a> +</li></ol> +</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<div id="PreTestFail" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong>The system encryption Pre Test fails even though the password was correctly entered in the bootloader. How to make the Pre Test succeed?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +This can be caused by the TrueCrypt driver that clears BIOS memory before VeraCrypt is able to read it. In this case, uninstalling TrueCrypt solves the issue.<br> +This can also be caused by some hardware drivers and other software that access BIOS memory. There is no generic solution for this and affected users should identify such software and remove it from the system.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I directly play a video (.avi, .mpg, etc.) stored on a VeraCrypt volume?</strong></div> +</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, VeraCrypt-encrypted volumes are like normal disks. You provide the correct password (and/or keyfile) and mount (open) the VeraCrypt volume. When you double click the icon of the video file, the operating system launches the application associated with + the file type – typically a media player. The media player then begins loading a small initial portion of the video file from the VeraCrypt-encrypted volume to RAM (memory) in order to play it. While the portion is being loaded, VeraCrypt is automatically + decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the media player. While this portion is being played, the media player begins loading another small portion of the video file from the VeraCrypt-encrypted volume to + RAM (memory) and the process repeats.<br style="text-align:left"> +<br style="text-align:left"> +The same goes for video recording: Before a chunk of a video file is written to a VeraCrypt volume, VeraCrypt encrypts it in RAM and then writes it to the disk. This process is called on-the-fly encryption/decryption and it works for all file types (not only + for video files).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Will VeraCrypt be open-source and free forever?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, it will. We will never create a commercial version of VeraCrypt, as we believe in open-source and free security software.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Is it possible to donate to the VeraCrypt project?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. You can use the donation buttons at <a href="https://www.veracrypt.fr/en/Donation.html" target="_blank"> +https://www.veracrypt.fr/en/donation/</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Why is VeraCrypt open-source? What are the advantages?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +As the source code for VeraCrypt is publicly available, independent researchers can verify that the source code does not contain any security flaw or secret 'backdoor'. If the source code were not available, reviewers would need to reverse-engineer the executable + files. However, analyzing and understanding such reverse-engineered code is so difficult that it is practically +<em style="text-align:left">impossible</em> to do (especially when the code is as large as the VeraCrypt code).<br style="text-align:left"> +<br style="text-align:left"> +Remark: A similar problem also affects cryptographic hardware (for example, a self-encrypting storage device). It is very difficult to reverse-engineer it to verify that it does not contain any security flaw or secret 'backdoor'.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">VeraCrypt is open-source, but has anybody actually reviewed the source code?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. An <a href="http://blog.quarkslab.com/security-assessment-of-veracrypt-fixes-and-evolutions-from-truecrypt.html" target="_blank"> +audit</a> has been performed by <a href="https://quarkslab.com/" target="_blank"> +Quarkslab</a>. The technical report can be downloaded from <a href="http://blog.quarkslab.com/resources/2016-10-17-audit-veracrypt/16-08-215-REP-VeraCrypt-sec-assessment.pdf">here</a>. VeraCrypt 1.19 addressed the issues found by this audit.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">As VeraCrypt is open-source software, independent researchers can verify that the source code does not contain any security flaw or secret 'backdoor'. Can they also verify that the official executable files were built from the + published source code and contain no additional code?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, they can. In addition to reviewing the source code, independent researchers can compile the source code and compare the resulting executable files with the official ones. They may find some differences (for example, timestamps or embedded digital signatures) + but they can analyze the differences and verify that they do not form malicious code.</div> +<div id="UsbFlashDrive" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">How can I use VeraCrypt on a USB flash drive? </strong> +</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +You have three options:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Encrypt the entire USB flash drive. However, you will not be able run VeraCrypt from the USB flash drive. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Create two or more partitions on your USB flash drive. Leave the first partition non encrypted and encrypt the other partition(s). You can store VeraCrypt on the first partition in order to run it directly from the USB flash drive.<br style="text-align:left"> +Note: Windows can only access the primary partition of a USB flash drive, nevertheless the extra partitions remain accessible through VeraCrypt. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Create a VeraCrypt file container on the USB flash drive (for information on how to do so, see the chapter +<strong style="text-align:left"><a href="Beginner%27s%20Tutorial.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Beginner's Tutorial</a></strong>, in the +<a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +VeraCrypt User Guide</a>). If you leave enough space on the USB flash drive (choose an appropriate size for the VeraCrypt container), you will also be able to store VeraCrypt on the USB flash drive (along with the container – not +<em style="text-align:left">in</em> the container) and you will be able to run VeraCrypt from the USB flash drive (see also the chapter +<a href="Portable%20Mode.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Portable Mode</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +VeraCrypt User Guide</a>). </li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Does VeraCrypt also encrypt file names and folder names? +</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. The entire file system within a VeraCrypt volume is encrypted (including file names, folder names, and contents of every file). This applies to both types of VeraCrypt volumes – i.e., to file containers (virtual VeraCrypt disks) and to VeraCrypt-encrypted + partitions/devices.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Does VeraCrypt use parallelization?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. Increase in encryption/decryption speed is directly proportional to the number of cores/processors your computer has. For more information, please see the chapter +<a href="Parallelization.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Parallelization</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can data be read from and written to an encrypted volume/drive as fast as if the drive was not encrypted?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, since VeraCrypt uses pipelining and parallelization. For more information, please see the chapters +<a href="Pipelining.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Pipelining</a> and <a href="Parallelization.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Parallelization</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Does VeraCrypt support hardware-accelerated encryption?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. For more information, please see the chapter <a href="Hardware%20Acceleration.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hardware Acceleration</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Is it possible to boot Windows installed in a hidden VeraCrypt volume?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, it is. For more information, please see the section <a href="Hidden%20Operating%20System.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Will I be able to mount my VeraCrypt volume (container) on any computer?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, <a href="VeraCrypt%20Volume.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt volumes</a> are independent of the operating system. You will be able to mount your VeraCrypt volume on any computer on which you can run VeraCrypt (see also the question '<em style="text-align:left">Can I use VeraCrypt on Windows if I do not have + administrator privileges?</em>').</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I unplug or turn off a hot-plug device (for example, a USB flash drive or USB hard drive) when there is a mounted VeraCrypt volume on it?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Before you unplug or turn off the device, you should always dismount the VeraCrypt volume in VeraCrypt first, and then perform the '<em style="text-align:left">Eject</em>' operation if available (right-click the device in the '<em style="text-align:left">Computer</em>' + or '<em style="text-align:left">My Computer</em>' list), or use the '<em style="text-align:left">Safely Remove Hardware</em>' function (built in Windows, accessible via the taskbar notification area). Otherwise, data loss may occur.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">What is a hidden operating system?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +See the section <a href="Hidden%20Operating%20System.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">What is plausible deniability?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +See the chapter <a href="Plausible%20Deniability.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Plausible Deniability</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div id="SystemReinstallUpgrade" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Will I be able to mount my VeraCrypt partition/container after I reinstall or upgrade the operating system?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, <a href="VeraCrypt%20Volume.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt volumes</a> are independent of the operating system. However, you need to make sure your operating system installer does not format the partition where your VeraCrypt volume resides.<br style="text-align:left"> +<br style="text-align:left"> +Note: If the system partition/drive is encrypted and you want to reinstall or upgrade Windows, you need to decrypt it first (select +<em style="text-align:left">System</em> > <em style="text-align:left">Permanently Decrypt System Partition/Drive</em>). However, a running operating system can be +<em style="text-align:left">updated</em> (security patches, service packs, etc.) without any problems even when the system partition/drive is encrypted.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I upgrade from an older version of VeraCrypt to the latest version without any problems?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Generally, yes. However, before upgrading, please read the <a href="Release%20Notes.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +release notes</a> for all versions of VeraCrypt that have been released since your version was released. If there are any known issues or incompatibilities related to upgrading from your version to a newer one, they will be listed in the +<a href="Release%20Notes.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +release notes</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I upgrade VeraCrypt if the system partition/drive is encrypted or do I have to decrypt it first?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Generally, you can upgrade to the latest version without decrypting the system partition/drive (just run the VeraCrypt installer and it will automatically upgrade VeraCrypt on the system). However, before upgrading, please read the +<a href="Release%20Notes.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +release notes</a> for all versions of VeraCrypt that have been released since your version was released. If there are any known issues or incompatibilities related to upgrading from your version to a newer one, they will be listed in the +<a href="Release%20Notes.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +release notes</a>. Note that this FAQ answer is also valid for users of a <a href="Hidden%20Operating%20System.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden operating system</a>. Also note that you cannot <em style="text-align:left"> +down</em>grade VeraCrypt if the system partition/drive is encrypted.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">I use pre-boot authentication. Can I prevent a person (adversary) that is watching me start my computer from knowing that I use VeraCrypt?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. To do so, boot the encrypted system, start VeraCrypt, select <em style="text-align:left"> +Settings</em> > <em style="text-align:left">System Encryption</em>, enable the option '<em style="text-align:left">Do not show any texts in the pre-boot authentication screen</em>' and click +<em style="text-align:left">OK</em>. Then, when you start the computer, no texts will be displayed by the VeraCrypt boot loader (not even when you enter the wrong password). The computer will appear to be "frozen" while you can type your password. It is, however, + important to note that if the adversary can analyze the content of the hard drive, he can still find out that it contains the VeraCrypt boot loader.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">I use pre-boot authentication. Can I configure the VeraCrypt Boot Loader to display only a fake error message?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. To do so, boot the encrypted system, start VeraCrypt, select <em style="text-align:left"> +Settings</em> > <em style="text-align:left">System Encryption</em>, enable the option '<em style="text-align:left">Do not show any texts in the pre-boot authentication screen</em>' and enter the fake error message in the corresponding field (for example, + the "<em style="text-align:left">Missing operating system</em>" message, which is normally displayed by the Windows boot loader if it finds no Windows boot partition). It is, however, important to note that if the adversary can analyze the content of the hard + drive, he can still find out that it contains the VeraCrypt boot loader.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I configure VeraCrypt to mount automatically whenever Windows starts a non-system VeraCrypt volume that uses the same password as my system partition/drive (i.e. my pre-boot authentication password)?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. To do so, follow these steps:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mount the volume (to the drive letter to which you want it to be mounted every time). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Right-click the mounted volume in the drive list in the main VeraCrypt window and select '<em style="text-align:left">Add to System Favorites</em>'. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The System Favorites Organizer window should appear now. In this window, enable the option '<em style="text-align:left">Mount system favorite volumes when Windows starts</em>' and click +<em style="text-align:left">OK</em>. </li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +For more information, see the chapter <a href="System%20Favorite%20Volumes.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +System Favorite Volumes</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can a volume be automatically mounted whenever I log on to Windows?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. To do so, follow these steps:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mount the volume (to the drive letter to which you want it to be mounted every time). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Right-click the mounted volume in the drive list in the main VeraCrypt window and select '<em style="text-align:left">Add to Favorites</em>'. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The <a href="Favorite%20Volumes.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Favorites</a> Organizer window should appear now. In this window, enable the option '<em style="text-align:left">Mount selected volume upon logon</em>' and click +<em style="text-align:left">OK</em>. </li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Then, when you log on to Windows, you will be asked for the volume password (and/or keyfiles) and if it is correct, the volume will be mounted.<br style="text-align:left"> +<br style="text-align:left"> +Alternatively, if the volumes are partition/device-hosted and if you do not need to mount them to particular drive letters every time, you can follow these steps:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Select <em style="text-align:left">Settings</em> > <em style="text-align:left"> +Preferences. </em>The <em style="text-align:left">Preferences</em> window should appear now. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +In the section '<em style="text-align:left">Actions to perform upon logon to Windows</em>', enable the option '<em style="text-align:left">Mount all devices-hosted VeraCrypt volumes</em>' and click +<em style="text-align:left">OK</em>. </li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: VeraCrypt will not prompt you for a password if you have enabled caching of the +<a href="System%20Encryption.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +pre-boot authentication</a> password (<em style="text-align:left">Settings</em> > '<em style="text-align:left">System Encryption</em>') and the volumes use the same password as the system partition/drive.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can a volume be automatically mounted whenever its host device gets connected to the computer?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. For example, if you have a VeraCrypt container on a USB flash drive and you want VeraCrypt to mount it automatically when you insert the USB flash drive into the USB port, follow these steps:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mount the volume (to the drive letter to which you want it to be mounted every time). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Right-click the mounted volume in the drive list in the main VeraCrypt window and select '<em style="text-align:left">Add to Favorites</em>'. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The <a href="Favorite%20Volumes.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Favorites</a> Organizer window should appear now. In this window, enable the option '<em style="text-align:left">Mount selected volume when its host device gets connected</em>' and click +<em style="text-align:left">OK</em>. </li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Then, when you insert the USB flash drive into the USB port, you will be asked for the volume password (and/or keyfiles) (unless it is cached) and if it is correct, the volume will be mounted.<br style="text-align:left"> +<br style="text-align:left"> +Note: VeraCrypt will not prompt you for a password if you have enabled caching of the +<a href="System%20Encryption.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +pre-boot authentication</a> password (<em style="text-align:left">Settings</em> > '<em style="text-align:left">System Encryption</em>') and the volume uses the same password as the system partition/drive.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can my pre-boot authentication password be cached so that I can use it mount non-system volumes during the session?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. Select <em style="text-align:left">Settings</em> > '<em style="text-align:left">System Encryption</em>' and enable the following option: '<em style="text-align:left">Cache pre-boot authentication password in driver memory</em>'.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a name="notraces" style="text-align:left; color:#0080c0; text-decoration:none"></a><br style="text-align:left"> +<strong style="text-align:left">I live in a country that violates basic human rights of its people. Is it possible to use VeraCrypt without leaving any 'traces' on unencrypted Windows?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. This can be achieved by running VeraCrypt in <a href="Portable%20Mode.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +portable mode</a> under <a href="http://www.nu2.nu/pebuilder/" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +BartPE</a> or in a similar environment. BartPE stands for "Bart's Preinstalled Environment", which is essentially the Windows operating system prepared in a way that it can be entirely stored on and booted from a CD/DVD (registry, temporary files, etc., are + stored in RAM – hard drive is not used at all and does not even have to be present). The freeware +<a href="http://www.nu2.nu/pebuilder/" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +Bart's PE Builder</a> can transform a Windows XP installation CD into a BartPE CD. Note that you do not even need any special VeraCrypt plug-in for BartPE. Follow these steps:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Create a BartPE CD and boot it. (Note: You must perform each of the following steps from within BartPE.) +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Download the VeraCrypt self-extracting package to the RAM disk (which BartPE automatically creates). +<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">Note</strong>: If the adversary can intercept data you send or receive over the Internet and you need to prevent the adversary from knowing you downloaded VeraCrypt, consider downloading it via +<a href="https://geti2p.net/en/" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +<strong style="text-align:left">I2P</strong></a>, <a href="http://www.torproject.org/" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +<strong style="text-align:left">Tor</strong></a>, or a similar anonymizing network. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Verify the digital signatures of the downloaded file (see <a href="Digital%20Signatures.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +this</a> section of the documentation for more information). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Run the downloaded file, and select <em style="text-align:left">Extract</em> (instead of +<em style="text-align:left">Install</em>) on the second page of the VeraCrypt Setup wizard. Extract the contents to the RAM disk. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Run the file <em style="text-align:left">VeraCrypt.exe</em> from the RAM disk. </li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: You may also want to consider creating a hidden operating system (see the section +<a href="Hidden%20Operating%20System.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>). See also the chapter <a href="Plausible%20Deniability.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Plausible Deniability</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I encrypt my system partition/drive if I don't have a US keyboard?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, VeraCrypt supports all keyboard layouts. Because of BIOS requirement, the pre-boot password is typed using +<strong>US keyboard layout. </strong>During the system encryption process, VeraCrypt automatically and transparently switches the keyboard to US layout in order to ensure that the password value typed will match the one typed in pre-boot mode. Thus, in order + to avoid wrong password errors, one must type the password using the same keys as when creating the system encryption.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I save data to the decoy system partition without risking damage to the hidden system partition?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. You can write data to the decoy system partition anytime without any risk that the hidden volume will get damaged (because the decoy system is +<em style="text-align:left">not</em> installed within the same partition as the hidden system). For more information, see the section +<a href="Hidden%20Operating%20System.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I use VeraCrypt on Windows if I do not have administrator privileges?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +See the chapter '<a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html">Using VeraCrypt Without Administrator Privileges</a>' + in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Does VeraCrypt save my password to a disk?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +No.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">How does VeraCrypt verify that the correct password was entered?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +See the section <a href="Encryption%20Scheme.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Encryption Scheme</a> (chapter <a href="Technical%20Details.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Technical Details</a>) in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div id="encrypt-in-place" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I encrypt a partition/drive without losing the data currently stored on it?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, but the following conditions must be met:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If you want to encrypt an entire system drive (which may contain multiple partitions) or a system partition (in other words, if you want to encrypt a drive or partition where Windows is installed), you can do so provided that you use Windows XP or a later version + of Windows (such as Windows 7) <span style="text-align:left; font-size:10px; line-height:12px"> +(select '<em style="text-align:left">System</em>' > '<em style="text-align:left">Encrypt System Partition/Drive</em>' and then follow the instructions in the wizard)</span>. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If you want to encrypt a non-system partition in place, you can do so provided that it contains an NTFS filesystem and that you use Windows Vista or a later version of Windows (for example, Windows 7) +<span style="text-align:left; font-size:10px; line-height:12px">(click '<em style="text-align:left">Create Volume</em>' > '<em style="text-align:left">Encrypt a non-system partition</em>' > '<em style="text-align:left">Standard volume</em>' > '<em style="text-align:left">Select + Device</em>' > '<em style="text-align:left">Encrypt partition in place</em>' and then follow the instructions in the wizard)</span>. +</li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I run VeraCrypt if I don't install it?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, see the chapter <a href="Portable%20Mode.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Portable Mode</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +VeraCrypt User Guide</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a name="tpm" style="text-align:left; color:#0080c0; text-decoration:none"></a><br style="text-align:left"> +<strong style="text-align:left">Some encryption programs use TPM to prevent attacks. Will VeraCrypt use it too?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +No. Those programs use TPM to protect against attacks that <em style="text-align:left"> +require</em> the attacker to have administrator privileges, or physical access to the computer, and the attacker needs you to use the computer after such an access. +<em style="text-align:left">However, if any of these conditions is met, it is actually impossible to secure the computer</em> (see below) and, therefore, you must stop using it (instead of relying on TPM). +<br style="text-align:left"> +<br style="text-align:left"> +If the attacker has administrator privileges, he can, for example, reset the TPM, capture the content of RAM (containing master keys) or content of files stored on mounted VeraCrypt volumes (decrypted on the fly), which can then be sent to the attacker over + the Internet or saved to an unencrypted local drive (from which the attacker might be able to read it later, when he gains physical access to the computer). +<br style="text-align:left"> +<br style="text-align:left"> +If the attacker can physically access the computer hardware (and you use it after such an access), he can, for example, attach a malicious component to it (such as a hardware keystroke logger) that will capture the password, the content of RAM (containing master + keys) or content of files stored on mounted VeraCrypt volumes (decrypted on the fly), which can then be sent to the attacker over the Internet or saved to an unencrypted local drive (from which the attacker might be able to read it later, when he gains physical + access to the computer again). <br style="text-align:left"> +<br style="text-align:left"> +The only thing that TPM is almost guaranteed to provide is a false sense of security (even the name itself, "Trusted Platform Module", is misleading and creates a false sense of security). As for real security, TPM is actually redundant (and implementing redundant + features is usually a way to create so-called bloatware). <br style="text-align:left"> +<br style="text-align:left"> +For more information, please see the sections <a title="Physical%20Security"" style="text-align:left; color:#0080c0; text-decoration:none"> +Physical Security</a> and <a href="Malware.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Malware</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Do I have to dismount VeraCrypt volumes before shutting down or restarting Windows?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +No. VeraCrypt automatically dismounts all mounted VeraCrypt volumes on system shutdown/restart.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Which type of VeraCrypt volume is better – partition or file container?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="VeraCrypt%20Volume.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html">File containers</a> are normal files so you can work with them as with any normal files (file containers + can be, for example, moved, renamed, and deleted the same way as normal files). <a href="VeraCrypt%20Volume.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Partitions/drives</a> may be better as regards performance. Note that reading and writing to/from a file container may take significantly longer when the container is heavily fragmented. To solve this problem, defragment the file system in which the container + is stored (when the VeraCrypt volume is dismounted).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">What's the recommended way to back up a VeraCrypt volume?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +See the chapter <a href="How%20to%20Back%20Up%20Securely.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +How to Back Up Securely</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">What will happen if I format a VeraCrypt partition?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +See the question '<em style="text-align:left"><a href="#changing-filesystem" style="text-align:left; color:#0080c0; text-decoration:none">Is it possible to change the file system of an encrypted volume?</a></em>'</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left"><a name="changing-filesystem" style="text-align:left; color:#0080c0; text-decoration:none"></a>Is it possible to change the file system of an encrypted volume?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, when mounted, VeraCrypt volumes can be formatted as FAT12, FAT16, FAT32, NTFS, or any other file system. VeraCrypt volumes behave as standard disk devices so you can right-click the device icon (for example in the '<em style="text-align:left">Computer</em>' + or '<em style="text-align:left">My Computer</em>' list) and select '<em style="text-align:left">Format</em>'. The actual volume contents will be lost. However, the whole volume will remain encrypted. If you format a VeraCrypt-encrypted partition when the VeraCrypt + volume that the partition hosts is not mounted, then the volume will be destroyed, and the partition will not be encrypted anymore (it will be empty).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Is it possible to mount a VeraCrypt container that is stored on a CD or DVD?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. However, if you need to mount a VeraCrypt volume that is stored on a read-only medium (such as a CD or DVD) under Windows 2000, the file system within the VeraCrypt volume must be FAT (Windows 2000 cannot mount an NTFS file system on read-only media).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Is it possible to change the password for a hidden volume?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, the password change dialog works both for standard and <a href="Hidden%20Volume.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden volumes</a>. Just type the password for the hidden volume in the 'Current Password' field of the 'Volume Password Change' dialog.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px; font-size:10px; line-height:12px"> +Remark: VeraCrypt first attempts to decrypt the standard <a href="VeraCrypt%20Volume%20Format%20Specification.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +volume header</a> and if it fails, it attempts to decrypt the area within the volume where the hidden volume header may be stored (if there is a hidden volume within). In case it is successful, the password change applies to the hidden volume. (Both attempts + use the password typed in the 'Current Password' field.)</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">When I use HMAC-RIPEMD-160, is the size of the header encryption key only 160 bits?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +No, VeraCrypt never uses an output of a hash function (nor of a HMAC algorithm) directly as an encryption key. See the section +<a href="Header%20Key%20Derivation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Header Key Derivation, Salt, and Iteration Count</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a> for more information.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">How do I burn a VeraCrypt container larger than 2 GB onto a DVD?</strong><br style="text-align:left"> +<br style="text-align:left"> +The DVD burning software you use should allow you to select the format of the DVD. If it does, select the UDF format (ISO format does not support files larger than 2 GB).</div> +<div id="disk_defragmenter" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I use tools like <em style="text-align:left"> +chkdsk</em>, Disk Defragmenter, etc. on the contents of a mounted VeraCrypt volume?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, VeraCrypt volumes behave like real physical disk devices, so it is possible to use any filesystem checking/repairing/defragmenting tools on the contents of a mounted VeraCrypt volume.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Does VeraCrypt support 64-bit versions of Windows?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, it does. <span style="text-align:left; font-size:10px; line-height:12px">Note: 64-bit versions of Windows load only drivers that are digitally signed with a digital certificate issued by a certification authority approved for issuing kernel-mode code signing + certificates. VeraCrypt complies with this requirement (the VeraCrypt driver is <a href="Digital%20Signatures.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +digitally signed</a> with the digital certificate of IDRIX, which was issued by the certification authority Thawte).</span></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can I mount my VeraCrypt volume under Windows, Mac OS X, and Linux?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, VeraCrypt volumes are fully cross-platform.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">How can I uninstall VeraCrypt on Linux?</strong> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To uninstall VeraCrypt on Linux, run the following command in Terminal as root: <strong> +veracrypt-uninstall.sh</strong>. On Ubuntu, you can use "<strong>sudo veracrypt-uninstall.sh</strong>".</div> +</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Is there a list of all operating systems that VeraCrypt supports?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, see the chapter <a href="Supported%20Operating%20Systems.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Supported Operating Systems</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +VeraCrypt User Guide</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Is it possible to install an application to a VeraCrypt volume and run it from there?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">What will happen when a part of a VeraCrypt volume becomes corrupted?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +In encrypted data, one corrupted bit usually corrupts the whole ciphertext block in which it occurred. The ciphertext block size used by VeraCrypt is 16 bytes (i.e., 128 bits). The +<a href="Modes%20of%20Operation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +mode of operation</a> used by VeraCrypt ensures that if data corruption occurs within a block, the remaining blocks are not affected. See also the question '<em style="text-align:left">What do I do when the encrypted filesystem on my VeraCrypt volume is corrupted?</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">What do I do when the encrypted filesystem on my VeraCrypt volume is corrupted?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +File system within a VeraCrypt volume may become corrupted in the same way as any normal unencrypted file system. When that happens, you can use filesystem repair tools supplied with your operating system to fix it. In Windows, it is the '<em style="text-align:left">chkdsk</em>' + tool. VeraCrypt provides an easy way to use this tool on a VeraCrypt volume: Right-click the mounted volume in the main VeraCrypt window (in the drive list) and from the context menu select '<em style="text-align:left">Repair Filesystem</em>'.</div> +<div id="reset_volume_password" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">We use VeraCrypt in a corporate/enterprise environment. Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes. Note that there is no "backdoor" implemented in VeraCrypt. However, there is a way to "reset" volume passwords/<a href="Keyfiles.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html">keyfiles</a> + and <a href="System%20Encryption.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +pre-boot authentication</a> passwords. After you create a volume, back up its header to a file (select +<em style="text-align:left">Tools</em> -> <em style="text-align:left">Backup Volume Header</em>) before you allow a +<a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +non-admin user</a> to use the volume. Note that the <a href="VeraCrypt%20Volume%20Format%20Specification.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +volume header</a> (which is encrypted with a <a href="Header%20Key%20Derivation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +header key</a> derived from a password/keyfile) contains the <a href="Encryption%20Scheme.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +master key</a> with which the volume is encrypted. Then ask the user to choose a password, and set it for him/her (<em style="text-align:left">Volumes</em> -> +<em style="text-align:left">Change Volume Password</em>); or generate a user keyfile for him/her. Then you can allow the user to use the volume and to change the password/keyfiles without your assistance/permission. In case he/she forgets his/her password or + loses his/her keyfile, you can "reset" the volume password/keyfiles to your original admin password/keyfiles by restoring the volume header from the backup file (<em style="text-align:left">Tools</em> -> +<em style="text-align:left">Restore Volume Header</em>). <br style="text-align:left"> +<br style="text-align:left"> +Similarly, you can reset a <a href="System%20Encryption.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +pre-boot authentication</a> password<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html">. +</a>To create a backup of the master key data (that will be stored on a <a href="VeraCrypt%20Rescue%20Disk.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Rescue Disk</a> and encrypted with your administrator password), select '<em style="text-align:left">System</em>' > '<a href="VeraCrypt%20Rescue%20Disk.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"><em style="text-align:left.html">Create + Rescue Disk</em></a>'. To set a user <a href="System%20Encryption.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +pre-boot authentication</a> password, select '<em style="text-align:left">System</em>' > '<em style="text-align:left">Change Password</em>'. To restore your administrator password, boot the VeraCrypt Rescue Disk, select '<em style="text-align:left">Repair + Options</em>' > '<em style="text-align:left">Restore key data</em>' and enter your administrator password. +<br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">Note: It is not required to burn each +<a href="VeraCrypt%20Rescue%20Disk.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Rescue Disk</a> ISO image to a CD/DVD. You can maintain a central repository of ISO images for all workstations (rather than a repository of CDs/DVDs). For more information see the section +<a href="Command%20Line%20Usage.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Command Line Usage</a> (option <em style="text-align:left">/noisocheck</em>).</span></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can our commercial company use VeraCrypt free of charge?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Provided that you comply with the terms and conditions of the <a href="VeraCrypt%20License.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt License</a>, you can install and run VeraCrypt free of charge on an arbitrary number of your computers.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">We share a volume over a network. Is there a way to have the network share automatically restored when the system is restarted?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Please see the chapter '<a href="Sharing%20over%20Network.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Sharing over Network</a>' in the +<a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +VeraCrypt User Guide</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">It is possible to access a single VeraCrypt volume simultaneously from multiple operating systems (for example, a volume shared over a network)?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Please see the chapter '<a href="Sharing%20over%20Network.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Sharing over Network</a>' in the +<a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +VeraCrypt User Guide</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Can a user access his or her VeraCrypt volume via a network?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Please see the chapter '<a href="Sharing%20over%20Network.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Sharing over Network</a>' in the +<a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +VeraCrypt User Guide</a>.</div> +<div id="non_system_drive_letter" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">I encrypted a non-system partition, but its original drive letter is still visible in the '<span style="text-align:left; font-style:italic">My Computer</span>' list. When I double click this drive letter, Windows asks if I want + to format the drive. Is there a way to hide or free this drive letter? </strong> +</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, to free the drive letter follow these steps:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Right-click the '<em style="text-align:left">Computer</em>' (or '<span style="text-align:left; font-style:italic">My Computer</span>') icon on your desktop or in the Start Menu and select +<span style="text-align:left; font-style:italic">Manage</span>. The '<span style="text-align:left; font-style:italic">Computer Management</span>' window should appear. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +From the list on the left, select '<span style="text-align:left; font-style:italic">Disk Management</span>' (within the +<span style="text-align:left; font-style:italic">Storage</span> sub-tree). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Right-click the encrypted partition/device and select <span style="text-align:left; font-style:italic"> +Change Drive Letter and Paths</span>. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Click <span style="text-align:left; font-style:italic">Remove</span>. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If Windows prompts you to confirm the action, click <span style="text-align:left; font-style:italic"> +Yes</span>. </li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left"><br style="text-align:left"> +When I plug in my encrypted USB flash drive, Windows asks me if I want to format it. Is there a way to prevent that?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, but you will need to remove the drive letter assigned to the device. For information on how to do so, see the question '<em style="text-align:left">I encrypted a non-system partition, but its original drive letter is still visible in the 'My Computer' + list.</em>'</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left"><br style="text-align:left"> +How do I remove or undo encryption if I do not need it anymore? How do I permanently decrypt a volume? +</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Please see the section '<a href="Removing%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html">How to Remove Encryption</a>' in the +<a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +VeraCrypt User Guide</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">What will change when I enable the option '<em style="text-align:left">Mount volumes as removable media</em>'?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Please see the section '<a href="Removable%20Medium%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Volume Mounted as Removable Medium</a>' in the +<a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +VeraCrypt User Guide</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Is the online documentation available for download as a single file?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Yes, the documentation is contained in the file <em style="text-align:left">VeraCrypt User Guide.pdf</em> that is included in all official VeraCrypt distribution packages. You can also download the PDF using the link available at the home page +<a href="https://www.veracrypt.fr/en/Downloads.html" target="_blank">https://www.veracrypt.fr/en/downloads/</a>. Note that you do +<em style="text-align:left">not</em> have to install VeraCrypt to obtain the PDF documentation. Just run the self-extracting installation package and then select +<em style="text-align:left">Extract</em> (instead of <em style="text-align:left"> +Install</em>) on the second page of the VeraCrypt Setup wizard. Also note that when you +<em style="text-align:left">do</em> install VeraCrypt, the PDF documentation is automatically copied to the folder to which VeraCrypt is installed, and is accessible via the VeraCrypt user interface (by pressing F1 or choosing +<em style="text-align:left">Help</em> > <em style="text-align:left">User's Guide</em>).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">Do I have to "wipe" free space and/or files on a VeraCrypt volume?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<span style="text-align:left; font-size:10px; line-height:12px">Remark: to "wipe" = to securely erase; to overwrite sensitive data in order to render them unrecoverable. +</span><br style="text-align:left"> +<br style="text-align:left"> +If you believe that an adversary will be able to decrypt the volume (for example that he will make you reveal the password), then the answer is yes. Otherwise, it is not necessary, because the volume is entirely encrypted.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">How does VeraCrypt know which encryption algorithm my VeraCrypt volume has been encrypted with?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Please see the section <a href="Encryption%20Scheme.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Encryption Scheme</a> (chapter <a href="Technical%20Details.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Technical Details</a>) in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none"> +documentation</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">How can I perform a Windows built-in backup on a VeraCrypt volume? The VeraCrypt volume doesn't show up in the list of available backup paths.<br> +</strong> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Windows built-in backup utility looks only for physical driver, that's why it doesn't display the VeraCrypt volume. Nevertheless, you can still backup on a VeraCrypt volume by using a trick: activate sharing on the VeraCrypt volume through Explorer interface + (of course, you have to put the correct permission to avoid unauthorized access) and then choose the option "Remote shared folder" (it is not remote of course but Windows needs a network path). There you can type the path of the shared drive (for example \\ServerName\sharename) + and the backup will be configured correctly.</div> +</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Is the encryption used by VeraCrypt vulnerable to Quantum attacks?</strong> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt uses block ciphers (AES, Serpent, Twofish) for its encryption. Quantum attacks against these block ciphers are just a faster brute-force since the best know attack against these algorithms is exhaustive search (related keys attacks are irrelevant + to our case because all keys are random and independent from each other).<br> +Since VeraCrypt always uses 256-bit random and independent keys, we are assured of a 128-bit security<br> +level against quantum algorithms which makes VeraCrypt encryption immune to such attacks.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong>How to make a VeraCrypt volume available for Windows Search indexing?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +In order to be able to index a VeraCrypt volume through Windows Search, the volume must be mounted at boot time (System Favorite) or the Windows Search services must be restart after the volume is mounted. This is needed because Windows Search can only index + drives that are available when it starts.</div> +<strong style="text-align:left">I haven't found any answer to my question in the FAQ – what should I do?</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Please search the VeraCrypt documentation and website.</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Favorite Volumes.html b/doc/html/Favorite Volumes.html new file mode 100644 index 00000000..a813f843 --- /dev/null +++ b/doc/html/Favorite Volumes.html @@ -0,0 +1,112 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Favorite%20Volumes.html">Favorite Volumes</a> +</p></div> + +<div class="wikidoc"> +<h2 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:14px; margin-bottom:17px"> +Favorite Volumes</h2> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>Favorite volumes are useful, for example, in any the following cases:</p> +<ul> +<li>You have a volume that always needs to be <strong>mounted to a particular drive letter</strong>. +</li><li>You have a volume that needs to be <strong>automatically mounted when its host device gets connected to the computer +</strong>(for example, a container located on a USB flash drive or external USB hard drive). +</li><li>You have a volume that needs to be <strong>automatically mounted when you log on +</strong>to the operating system. </li><li>You have a volume that always needs to be <strong>mounted as read-only </strong> +or removable medium. </li></ul> +<h3>To configure a VeraCrypt volume as a favorite volume, follow these steps:</h3> +<ol> +<li>Mount the volume (to the drive letter to which you want it to be mounted every time). +</li><li>Right-click the mounted volume in the drive list in the main VeraCrypt window and select ‘<em>Add to Favorites</em>’. +</li><li>The Favorite Volumes Organizer window should appear now. In this window, you can set various options for the volume (see below). +</li><li>Click <em>OK</em>. </li></ol> +<strong>Favorite volumes can be mounted in several ways: </strong>To mount all favorite volumes, select +<em>Favorites </em>> <em>Mount Favorite Volumes </em>or press the ‘<em>Mount Favorite Volumes</em>’ hot key (<em>Settings +</em>> <em>Hot Keys</em>). To mount only one of the favorite volumes, select it from the list contained in the +<em>Favorites </em>menu. When you do so, you are asked for its password (and/or keyfiles) (unless it is cached) and if it is correct, the volume is mounted. If it is already mounted, an Explorer window is opened for it. +<h3>Selected or all favorite volumes can be mounted automatically whenever you log on to Windows</h3> +<p>To set this up, follow these steps:</p> +<ol> +<li>Mount the volume you want to have mounted automatically when you log on (mount it to the drive letter to which you want it to be mounted every time). +</li><li>Right-click the mounted volume in the drive list in the main VeraCrypt window and select ‘<em>Add to Favorites</em>’. +</li><li>The Favorites Organizer window should appear now. In this window, enable the option ‘<em>Mount selected volume upon logon</em>’ and click +<em>OK</em>. </li></ol> +<p>Then, when you log on to Windows, you will be asked for the volume password (and/or keyfiles) and if it is correct, the volume will be mounted.<br> +<br> +Note: VeraCrypt will not prompt you for a password if you have enabled caching of the pre-boot authentication password (<em>Settings +</em>> ‘<em>System Encryption</em>’) and the volumes use the same password as the system partition/drive.</p> +<p>Selected or all favorite volumes can be mounted automatically whenever its host device gets connected to the computer. To set this up, follow these steps:</p> +<ol> +<li>Mount the volume (to the drive letter to which you want it to be mounted every time). +</li><li>Right-click the mounted volume in the drive list in the main VeraCrypt window and select ‘<em>Add to Favorites</em>’. +</li><li>The Favorites Organizer window should appear now. In this window, enable the option ‘<em>Mount selected volume when its host device gets connected</em>’ and click +<em>OK</em>. </li></ol> +<p>Then, when you insert e.g. a USB flash drive on which a VeraCrypt volume is located into the USB port, you will be asked for the volume password (and/or keyfiles) (unless it is cached) and if it is correct, the volume will be mounted.<br> +<br> +Note: VeraCrypt will not prompt you for a password if you have enabled caching of the pre-boot authentication password (<em>Settings +</em>> ‘<em>System Encryption</em>’) and the volume uses the same password as the system partition/drive.</p> +<p>A special label can be assigned to each favorite volume. This label is not the same as the filesystem label and it is shown within the VeraCrypt user interface instead of the volume path. To assign such a label, follow these steps:</p> +<ol> +<li>Select <em>Favorites </em>> ‘<em>Organize Favorite Volumes</em>’. +</li><li>The Favorite Volumes Organizer window should appear now. In this window, select the volume whose label you want to edit. +</li><li>Enter the label in the ‘<em>Label of selected favorite volume</em>’ input field and click OK. +</li></ol> +<p>Note that the Favorite Volumes Organizer window (<em>Favorites </em>> ‘<em>Organize Favorite Volumes</em>’) allows you to +<strong>set various other options for each favorite volume</strong>. For example, any of them can be mounted as read-only or as removable medium. To set any of these options, follow these steps:</p> +<ol> +<li>Select <em>Favorites </em>> ‘<em>Organize Favorite Volumes</em>’. +</li><li>The Favorite Volumes Organizer window should appear now. In this window, select the volume whose options you want to set. +</li><li>Set the options and click OK. </li></ol> +<p>The order in which system favorite volumes are displayed in the Favorites Organizer window (<em>Favorites +</em>> ‘<em>Organize Favorite Volumes</em>’) is <strong>the order in which the volumes are mounted +</strong>when you select <em>Favorites </em>> <em>Mount Favorite Volumes </em> +or when you press the ‘<em>Mount Favorite Volumes</em>’ hotkey (<em>Settings +</em>> <em>Hot Keys</em>). You can use the <em>Move Up </em>and <em>Move Down </em> +buttons to change the order of the volumes.<br> +<br> +Note that a favorite volume can also be a <strong>partition that is within the key scope of system encryption mounted without pre-boot authentication +</strong>(for example, a partition located on the encrypted system drive of another operating system that is not running). When you mount such a volume and add it to favorites, you will no longer have to select +<em>System </em>> <em>Mount Without Pre-Boot Authentication </em>or to enable the mount option ‘<em>Mount partition using system encryption without pre- boot authentication</em>’. You can simply mount the favorite volume (as explained above) + without setting any options, as the mode in which the volume is mounted is saved in the configuration file containing the list of your favorite volumes.</p> +<p>Warning: When the drive letter assigned to a favorite volume (saved in the configuration file) is not free, the volume is not mounted and no error message is displayed.<br> +<br> +<strong>To remove a volume form the list of favorite volumes</strong>, select <em> +Favorites </em>> <em>Organize Favorite Volumes</em>, select the volume, click <em> +Remove</em>, and click OK.</p> +<p> </p> +<p><a href="System%20Favorite%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</div> +</body></html> diff --git a/doc/html/Hardware Acceleration.html b/doc/html/Hardware Acceleration.html new file mode 100644 index 00000000..76afc60c --- /dev/null +++ b/doc/html/Hardware Acceleration.html @@ -0,0 +1,69 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hardware%20Acceleration.html">Hardware Acceleration</a> +</p></div> + +<div class="wikidoc"> +<h1>Hardware Acceleration</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Some processors (CPUs) support hardware-accelerated <a href="AES.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +AES</a> encryption,* which is typically 4-8 times faster than encryption performed by the purely software implementation on the same processors.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +By default, VeraCrypt uses hardware-accelerated AES on computers that have a processor where the Intel AES-NI instructions are available. Specifically, VeraCrypt uses the AES-NI instructions that perform so-called AES rounds (i.e. the main portions of the AES + algorithm).** VeraCrypt does not use any of the AES-NI instructions that perform key generation.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: By default, VeraCrypt uses hardware-accelerated AES also when an encrypted Windows system is booting or resuming from hibernation (provided that the processor supports the Intel AES-NI instructions).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To find out whether VeraCrypt can use hardware-accelerated AES on your computer, select +<em style="text-align:left">Settings</em> > <em style="text-align:left">Performance/</em><em>Driver Configuration</em> and check the field labeled '<em style="text-align:left">Processor (CPU) in this computer supports hardware acceleration for AES</em>'.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To find out whether a processor you want to purchase supports the Intel AES-NI instructions (also called "AES New Instructions"), which VeraCrypt uses for hardware-accelerated AES, please check the documentation for the processor or contact the vendor/manufacturer. + Alternatively, click <a href="http://ark.intel.com/search/advanced/?AESTech=true" style="text-align:left; color:#0080c0; text-decoration:none"> +here</a> to view an official list of Intel processors that support the AES-NI instructions. However, note that some Intel processors, which the Intel website lists as AES-NI-supporting, actually support the AES-NI instructions only with a Processor Configuration + update (for example, i7-2630/2635QM, i7-2670/2675QM, i5-2430/2435M, i5-2410/2415M). In such cases, you should contact the manufacturer of the motherboard/computer for a BIOS update that includes the latest Processor Configuration update for the processor.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If you want to disable hardware acceleration of AES (e.g. because you want VeraCrypt to use only a fully open-source implementation of AES), you can do so by selecting<em style="text-align:left"> Settings</em> > +<em style="text-align:left">Performance and Driver Options </em>and disabling the option '<em style="text-align:left">Accelerate AES encryption/decryption by using the AES instructions of the processor</em>'. Note that when this setting is changed, the operating + system needs to be restarted to ensure that all VeraCrypt components internally perform the requested change of mode. Also note that when you create a VeraCrypt Rescue Disk, the state of this option is written to the Rescue Disk and used whenever you boot + from it (affecting the pre-boot and initial boot phase). To create a new VeraCrypt Rescue Disk, select +<em style="text-align:left">System</em> > <em style="text-align:left">Create Rescue Disk</em>.</div> +<p> </p> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* In this chapter, the word 'encryption' also refers to decryption.</span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">** Those instructions are +<em style="text-align:left">AESENC</em>, <em style="text-align:left">AESENCLAST</em>, +<em style="text-align:left">AESDEC</em>, and <em style="text-align:left">AESDECLAST</em> and they perform the following AES transformations: +<em style="text-align:left">ShiftRows</em>, <em style="text-align:left">SubBytes</em>, +<em style="text-align:left">MixColumns</em>, <em style="text-align:left">InvShiftRows</em>, +<em style="text-align:left">InvSubBytes</em>, <em style="text-align:left">InvMixColumns</em>, and +<em style="text-align:left">AddRoundKey</em> (for more details about these transformations, see [3])</span><span style="text-align:left; font-size:10px; line-height:12px">.</span></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Hash Algorithms.html b/doc/html/Hash Algorithms.html new file mode 100644 index 00000000..c8f4131b --- /dev/null +++ b/doc/html/Hash Algorithms.html @@ -0,0 +1,58 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hash%20Algorithms.html">Hash Algorithms</a> +</p></div> + +<div class="wikidoc"> +<h1>Hash Algorithms</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +In the Volume Creation Wizard, in the password change dialog window, and in the Keyfile Generator dialog window, you can select a hash algorithm. A user-selected hash algorithm is used by the VeraCrypt Random Number Generator as a pseudorandom "mixing" function, + and by the header key derivation function (HMAC based on a hash function, as specified in PKCS #5 v2.0) as a pseudorandom function. When creating a new volume, the Random Number Generator generates the master key, secondary key (XTS mode), and salt. For more + information, please see the section <a href="Random%20Number%20Generator.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Random Number Generator</a> and section <a href="Header%20Key%20Derivation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Header Key Derivation, Salt, and Iteration Count</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt currently supports the following hash algorithms:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="RIPEMD-160.html"><strong style="text-align:left.html">RIPEMD-160</strong></a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="SHA-256.html"><strong style="text-align:left.html">SHA-256</strong></a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="SHA-512.html"><strong style="text-align:left.html">SHA-512</strong></a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Whirlpool.html"><strong style="text-align:left.html">Whirlpool</strong></a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left"><a href="Streebog.html">Streebog</a></strong> +</li></ul> +<p><a href="RIPEMD-160.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Header Key Derivation.html b/doc/html/Header Key Derivation.html new file mode 100644 index 00000000..1a6a9c72 --- /dev/null +++ b/doc/html/Header Key Derivation.html @@ -0,0 +1,86 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Header%20Key%20Derivation.html">Header Key Derivation, Salt, and Iteration Count</a> +</p></div> + +<div class="wikidoc"> +<h1>Header Key Derivation, Salt, and Iteration Count</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Header key is used to encrypt and decrypt the encrypted area of the VeraCrypt volume header (for +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +system encryption</a>, of the keydata area), which contains the master key and other data (see the sections +<a href="Encryption%20Scheme.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Encryption Scheme</a> and <a href="VeraCrypt%20Volume%20Format%20Specification.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Volume Format Specification</a>). In volumes created by VeraCrypt (and for +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +system encryption</a>), the area is encrypted in XTS mode (see the section <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Modes of Operation</a>). The method that VeraCrypt uses to generate the header key and the secondary header key (XTS mode) is PBKDF2, specified in PKCS #5 v2.0; see +<a href="References.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +[7]</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +512-bit salt is used, which means there are 2<sup style="text-align:left; font-size:85%">512</sup> keys for each password. This significantly decreases vulnerability to 'off-line' dictionary/'rainbow table' attacks (pre-computing all the keys for a dictionary + of passwords is very difficult when a salt is used) [7]. The salt consists of random values generated by the +<a href="Random%20Number%20Generator.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt random number generator</a> during the volume creation process. The header key derivation function is based on HMAC-SHA-512, HMAC-SHA-256, HMAC-RIPEMD-160, or HMAC-Whirlpool (see [8, 9, 20, 22]) – the user selects which. The length of the derived + key does not depend on the size of the output of the underlying hash function. For example, a header key for the AES-256 cipher is always 256 bits long even if HMAC-RIPEMD-160 is used (in XTS mode, an additional 256-bit secondary header key is used; hence, + two 256-bit keys are used for AES-256 in total). For more information, refer to [7]. A large number of iterations of the key derivation function have to be performed to derive a header key, which increases the time necessary to perform an exhaustive search + for passwords (i.e., brute force attack) [7].</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>Prior to version 1.12, VeraCrypt always used a fixed number of iterations depending on the volume type and the derivation algorithm used:</p> +<ul> +<li>For system partition encryption (boot encryption), <strong>200000</strong> iterations are used for the HMAC-SHA-256 derivation function and +<strong>327661</strong> iterations are used for HMAC-RIPEMD-160. </li><li>For standard containers and other partitions, <strong>655331</strong> iterations are used for HMAC-RIPEMD-160 and +<strong>500000</strong> iterations are used for HMAC-SHA-512, HMAC-SHA-256 and HMAC-Whirlpool. +</li></ul> +<p>Starting from version 1.12, the <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html"> +PIM </a>field (<a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">Personal Iterations Multiplier</a>) enables users to have more control over the number of iterations used by the key derivation function.</p> +<p>When a <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html"> +PIM </a>value is not specified or if it is equal to zero, VeraCrypt uses the default values expressed above.</p> +<p>When a <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html"> +PIM </a>value is given by the user, the number of iterations of the key derivation function is calculated as follows:</p> +<ul> +<li>For system partition encryption (boot encryption): Iterations = <strong>PIM x 2048</strong> +</li><li>For standard containers and other partitions: Iterations = <strong>15000 + (PIM x 1000)</strong> +</li></ul> +</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Header keys used by ciphers in a cascade are mutually independent, even though they are derived from a single password (to which keyfiles may have been applied). For example, for the AES-Twofish-Serpent cascade, the header key derivation function is instructed + to derive a 768-bit encryption key from a given password (and, for XTS mode, in addition, a 768-bit +<em style="text-align:left">secondary</em> header key from the given password). The generated 768-bit header key is then split into three 256-bit keys (for XTS mode, the +<em style="text-align:left">secondary</em> header key is split into three 256-bit keys too, so the cascade actually uses six 256-bit keys in total), out of which the first key is used by Serpent, the second key is used by Twofish, and the third by AES (in addition, + for XTS mode, the first secondary key is used by Serpent, the second secondary key is used by Twofish, and the third secondary key by AES). Hence, even when an adversary has one of the keys, he cannot use it to derive the other keys, as there is no feasible + method to determine the password from which the key was derived (except for brute force attack mounted on a weak password).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="Random%20Number%20Generator.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Hibernation File.html b/doc/html/Hibernation File.html new file mode 100644 index 00000000..ac046dc8 --- /dev/null +++ b/doc/html/Hibernation File.html @@ -0,0 +1,67 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Data%20Leaks.html">Data Leaks</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hibernation%20File.html">Hibernation File</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Hibernation File</h1> +<p>Note: The issue described below does not affect you if the system partition or system drive is encrypted<span>* +</span>(for more information, see the chapter <a href="System%20Encryption.html"> +<em>System Encryption</em></a>) and if the hibernation file is located on one the partitions within the key scope of system encryption (which it typically is, by default), for example, on the partition where Windows is installed. When the computer hibernates, + data are encrypted on the fly before they are written to the hibernation file.</p> +<p>When a computer hibernates (or enters a power-saving mode), the content of its system memory is written to a so-called hibernation file on the hard drive. You can configure VeraCrypt (<em>Settings</em> > +<em>Preferences</em> > <em>Dismount all when: Entering power saving mode</em>) to automatically dismount all mounted VeraCrypt volumes, erase their master keys stored in RAM, and cached passwords (stored in RAM), if there are any, before a computer hibernates + (or enters a power-saving mode). However, keep in mind, that if you do not use system encryption (see the chapter +<a href="System%20Encryption.html"><em>System Encryption</em></a>), VeraCrypt still cannot reliably prevent the contents of sensitive files opened in RAM from being saved unencrypted to a hibernation file. Note that + when you open a file stored on a VeraCrypt volume, for example, in a text editor, then the content of the file is stored unencrypted in RAM (and it may remain unencrypted in RAM until the computer is turned off).<br> +<br> +Note that when Windows enters Sleep mode, it may be actually configured to enter so-called Hybrid Sleep mode, which involves hibernation. Also note that the operating system may be configured to hibernate or enter the Hybrid Sleep mode when you click or select + "Shut down" (for more information, please see the documentation for your operating system).<br> +<br> +<strong>To prevent the issues described above</strong>, encrypt the system partition/drive (for information on how to do so, see the chapter +<a href="System%20Encryption.html"><em>System Encryption</em></a>) and make sure that the hibernation file is located on one of the partitions within the key scope of system encryption (which it typically is, by default), + for example, on the partition where Windows is installed. When the computer hibernates, data will be encrypted on the fly before they are written to the hibernation file.</p> +<p>Note: You may also want to consider creating a hidden operating system (for more information, see the section +<a href="Hidden%20Operating%20System.html"> +<em>Hidden Operating System</em></a>)<span>.</span></p> +<p>Alternatively, if you cannot use system encryption, disable or prevent hibernation on your computer at least for each session during which you work with any sensitive data and during which you mount a VeraCrypt volume.</p> +<p><span>* </span>Disclaimer: As Windows XP and Windows 2003 do not provide any API for encryption of hibernation files, VeraCrypt has to modify undocumented components of Windows XP/2003 in order to allow users to encrypt hibernation files. Therefore, VeraCrypt + cannot guarantee that Windows XP/2003 hibernation files will always be encrypted. In response to our public complaint regarding the missing API, Microsoft began providing a public API for encryption of hibernation files on Windows Vista and later versions + of Windows. VeraCrypt has used this API and therefore is able to safely encrypt hibernation files under Windows Vista and later versions of Windows. Therefore, if you use Windows XP/2003 and want the hibernation file to be safely encrypted, we strongly recommend + that you upgrade to Windows Vista or later.</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Hidden Operating System.html b/doc/html/Hidden Operating System.html new file mode 100644 index 00000000..9d37abe6 --- /dev/null +++ b/doc/html/Hidden Operating System.html @@ -0,0 +1,49 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="System%20Encryption.html">System Encryption</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hidden%20Operating%20System.html">Hidden Operating System</a> +</p></div> + +<div class="wikidoc"> +<h1>Hidden Operating System</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +It may happen that you are forced by somebody to decrypt the operating system. There are many situations where you cannot refuse to do so (for example, due to extortion). VeraCrypt allows you to create a hidden operating system whose existence should be impossible + to prove (provided that certain guidelines are followed). Thus, you will not have to decrypt or reveal the password for the hidden operating system. For more information, see the section +<a href="VeraCrypt%20Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a> in the chapter <a href="Plausible%20Deniability.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Plausible Deniability</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> + </div> +<p><a href="Supported%20Systems%20for%20System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</body></html> diff --git a/doc/html/Hidden Volume.html b/doc/html/Hidden Volume.html new file mode 100644 index 00000000..612cca74 --- /dev/null +++ b/doc/html/Hidden Volume.html @@ -0,0 +1,97 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Plausible%20Deniability.html">Plausible Deniability</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hidden%20Volume.html">Hidden Volume</a> +</p></div> + +<div class="wikidoc"> +<h1>Hidden Volume</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +It may happen that you are forced by somebody to reveal the password to an encrypted volume. There are many situations where you cannot refuse to reveal the password (for example, due to extortion). Using a so-called hidden volume allows you to solve such situations + without revealing the password to your volume.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<img src="Beginner's Tutorial_Image_024.gif" alt="The layout of a standard VeraCrypt volume before and after a hidden volume was created within it." width="606" height="412"></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">The layout of a standard VeraCrypt volume before and after a hidden volume was created within it.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +The principle is that a VeraCrypt volume is created within another VeraCrypt volume (within the free space on the volume). Even when the outer volume is mounted, it should be impossible to prove whether there is a hidden volume within it or not*, because free + space on <em style="text-align:left">any </em>VeraCrypt volume is always filled with random data when the volume is created** and no part of the (dismounted) hidden volume can be distinguished from random data. Note that VeraCrypt does not modify the file + system (information about free space, etc.) within the outer volume in any way.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +The password for the hidden volume must be substantially different from the password for the outer volume. To the outer volume, (before creating the hidden volume within it) you should copy some sensitive-looking files that you actually do NOT want to hide. + These files will be there for anyone who would force you to hand over the password. You will reveal only the password for the outer volume, not for the hidden one. Files that really are sensitive will be stored on the hidden volume.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +A hidden volume can be mounted the same way as a standard VeraCrypt volume: Click +<em style="text-align:left">Select File</em> or <em style="text-align:left">Select Device +</em>to select the outer/host volume (important: make sure the volume is <em style="text-align:left"> +not</em> mounted). Then click <em style="text-align:left">Mount</em>, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer + volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt first attempts to decrypt the standard volume header using the entered password. If it fails, it loads the area of the volume where a hidden volume header can be stored (i.e. bytes 65536–131071, which contain solely random data when there is + no hidden volume within the volume) to RAM and attempts to decrypt it using the entered password. Note that hidden volume headers cannot be identified, as they appear to consist entirely of random data. If the header is successfully decrypted (for information + on how VeraCrypt determines that it was successfully decrypted, see the section <a href="Encryption%20Scheme.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Encryption Scheme</a>), the information about the size of the hidden volume is retrieved from the decrypted header (which is still stored in RAM), and the hidden volume is mounted (its size also determines its offset).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +A hidden volume can be created within any type of VeraCrypt volume, i.e., within a file-hosted volume or partition/device-hosted volume (requires administrator privileges). To create a hidden VeraCrypt volume, click on +<em style="text-align:left">Create Volume </em>in the main program window and select +<em style="text-align:left">Create a hidden VeraCrypt volume</em>. The Wizard will provide help and all information necessary to successfully create a hidden VeraCrypt volume.</div> +<div id="hidden_volume_size_issue" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +When creating a hidden volume, it may be very difficult or even impossible for an inexperienced user to set the size of the hidden volume such that the hidden volume does not overwrite data on the outer volume. Therefore, the Volume Creation Wizard automatically + scans the cluster bitmap of the outer volume (before the hidden volume is created within it) and determines the maximum possible size of the hidden volume.***</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If there are any problems when creating a hidden volume, refer to the chapter <a href="Troubleshooting.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Troubleshooting</a> for possible solutions.<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +Note that it is also possible to create and boot an operating system residing in a hidden volume (see the section +<a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a> in the chapter <a href="Plausible%20Deniability.html"> +Plausible Deniability</a>).</div> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* Provided that all the instructions in the VeraCrypt Volume Creation Wizard have been followed and provided that the requirements and precautions listed in the subsection +<a href="Security%20Requirements%20for%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions Pertaining to Hidden Volumes</a> are followed<em style="text-align:left">.</em></span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">** Provided that the options +<em style="text-align:left">Quick Format</em> and <em style="text-align:left">Dynamic</em> are disabled and provided that the volume does not contain a filesystem that has been encrypted in place (VeraCrypt does not allow the user to create a hidden volume + within such a volume). For information on the method used to fill free volume space with random data, see chapter +<a href="Technical%20Details.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Technical Details</a>, section <a href="VeraCrypt%20Volume%20Format%20Specification.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Volume Format Specification</a><em style="text-align:left">.</em></span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">*** The wizard scans the cluster bitmap to determine the size of the uninterrupted area of free space (if there is any) whose end is aligned with the end of the outer volume. This area accommodates + the hidden volume and therefore the size of this area limits the maximum possible size of the hidden volume. On Linux and Mac OS X, the wizard actually does not scan the cluster bitmap, but the driver detects any data written to the outer volume and uses their + position as previously described.</span></p> +<p> </p> +<p><a href="Protection%20of%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div><div class="ClearBoth"></div></body></html> diff --git a/doc/html/Home_VeraCrypt_Default_Mount_Parameters.png b/doc/html/Home_VeraCrypt_Default_Mount_Parameters.png Binary files differnew file mode 100644 index 00000000..8481ef37 --- /dev/null +++ b/doc/html/Home_VeraCrypt_Default_Mount_Parameters.png diff --git a/doc/html/Home_VeraCrypt_menu_Default_Mount_Parameters.png b/doc/html/Home_VeraCrypt_menu_Default_Mount_Parameters.png Binary files differnew file mode 100644 index 00000000..2cf2665f --- /dev/null +++ b/doc/html/Home_VeraCrypt_menu_Default_Mount_Parameters.png diff --git a/doc/html/Home_facebook_veracrypt.png b/doc/html/Home_facebook_veracrypt.png Binary files differnew file mode 100644 index 00000000..42f39af7 --- /dev/null +++ b/doc/html/Home_facebook_veracrypt.png diff --git a/doc/html/Home_reddit.png b/doc/html/Home_reddit.png Binary files differnew file mode 100644 index 00000000..32db76b7 --- /dev/null +++ b/doc/html/Home_reddit.png diff --git a/doc/html/Home_utilities-file-archiver-3.png b/doc/html/Home_utilities-file-archiver-3.png Binary files differnew file mode 100644 index 00000000..c2d97fc3 --- /dev/null +++ b/doc/html/Home_utilities-file-archiver-3.png diff --git a/doc/html/Hot Keys.html b/doc/html/Hot Keys.html new file mode 100644 index 00000000..af31f469 --- /dev/null +++ b/doc/html/Hot Keys.html @@ -0,0 +1,40 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hot%20Keys.html">Hot Keys</a> +</p></div> + +<div class="wikidoc"> +<h1>Hot Keys</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +To set system-wide VeraCrypt hot keys, click Settings -> Hot Keys. Note that hot keys work only when VeraCrypt or the VeraCrypt Background Task is running.</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/How to Back Up Securely.html b/doc/html/How to Back Up Securely.html new file mode 100644 index 00000000..5f6282d9 --- /dev/null +++ b/doc/html/How to Back Up Securely.html @@ -0,0 +1,112 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="How%20to%20Back%20Up%20Securely.html">How to Back Up Securely</a> +</p></div> +<div class="wikidoc"> +<div> +<h2>How to Back Up Securely</h2> +<p>Due to hardware or software errors/malfunctions, files stored on a VeraCrypt volume may become corrupted. Therefore, we strongly recommend that you backup all your important files regularly (this, of course, applies to any important data, not just to encrypted + data stored on VeraCrypt volumes).</p> +<h3>Non-System Volumes</h3> +<p>To back up a non-system VeraCrypt volume securely, it is recommended to follow these steps:</p> +<ol> +<li>Create a new VeraCrypt volume using the VeraCrypt Volume Creation Wizard (do not enable the +<em>Quick Format</em> option or the <em>Dynamic</em> option). It will be your <em> +backup</em> volume so its size should match (or be greater than) the size of your +<em>main</em> volume.<br> +<br> +If the <em>main</em> volume is a hidden VeraCrypt volume (see the section <a href="Hidden%20Volume.html"> +<em>Hidden Volume</em></a>), the <em>backup</em> volume must be a hidden VeraCrypt volume too. Before you create the hidden +<em>backup</em> volume, you must create a new host (outer) volume for it without enabling the +<em>Quick Format</em> option. In addition, especially if the <em>backup</em> volume is file-hosted, the hidden +<em>backup</em> volume should occupy only a very small portion of the container and the outer volume should be almost completely filled with files (otherwise, the plausible deniability of the hidden volume might be adversely affected). +</li><li>Mount the newly created <em>backup</em> volume. </li><li>Mount the <em>main</em> volume. </li><li>Copy all files from the mounted <em>main</em> volume directly to the mounted <em> +backup</em> volume. </li></ol> +<h4>IMPORTANT: If you store the backup volume in any location that an adversary can repeatedly access (for example, on a device kept in a bank’s safe deposit box), you should repeat all of the above steps (including the step 1) each time you want to back + up the volume (see below).</h4> +<p>If you follow the above steps, you will help prevent adversaries from finding out:</p> +<ul> +<li>Which sectors of the volumes are changing (because you always follow step 1). This is particularly important, for example, if you store the backup volume on a device kept in a bank’s safe deposit box (or in any other location that an adversary can + repeatedly access) and the volume contains a hidden volume (for more information, see the subsection +<a href="Security%20Requirements%20for%20Hidden%20Volumes.html"> +<em>Security Requirements and Precautions Pertaining to Hidden Volumes</em></a> in the chapter +<a href="Plausible%20Deniability.html"><em>Plausible Deniability</em></a>). +</li><li>That one of the volumes is a backup of the other. </li></ul> +<h3>System Partitions</h3> +<p>Note: In addition to backing up files, we recommend that you also back up your VeraCrypt Rescue Disk (select +<em>System</em> > <em>Create Rescue Disk</em>). For more information, see the section Vera<em>Crypt Rescue Disk</em>.</p> +<p>To back up an encrypted system partition securely and safely, it is recommended to follow these steps:</p> +<ol> +<li>If you have multiple operating systems installed on your computer, boot the one that does not require pre-boot authentication.<br> +<br> +If you do not have multiple operating systems installed on your computer, you can boot a WinPE or BartPE CD/DVD (‘live’ Windows entirely stored on and booted from a CD/DVD; for more information, search the section +<a href="FAQ.html"><em>Frequently Asked Questions</em></a> for the keyword ‘BartPE’).<br> +<br> +If none of the above is possible, connect your system drive as a secondary drive to another computer and then boot the operating system installed on the computer.<br> +<br> +Note: For security reasons, if the operating system that you want to back up resides in a hidden VeraCrypt volume (see the section +<a href="Hidden%20Operating%20System.html"> +<em>Hidden Operating System</em></a>), then the operating system that you boot in this step must be either another hidden operating system or a "live- CD" operating system (see above). For more information, see the subsection +<a href="Security%20Requirements%20for%20Hidden%20Volumes.html"> +<em>Security Requirements and Precautions Pertaining to Hidden Volumes</em></a> in the chapter +<a href="Plausible%20Deniability.html"><em>Plausible Deniability</em></a>. +</li><li>Create a new non-system VeraCrypt volume using the VeraCrypt Volume Creation Wizard (do not enable the +<em>Quick Format</em> option or the <em>Dynamic</em> option). It will be your <em> +backup</em> volume so its size should match (or be greater than) the size of the system partition that you want to back up.<br> +<br> +If the operating system that you want to back up is installed in a hidden VeraCrypt volume (see the section +<em>Hidden Operating System</em>), the <em>backup</em> volume must be a hidden VeraCrypt volume too. Before you create the hidden +<em>backup</em> volume, you must create a new host (outer) volume for it without enabling the +<em>Quick Format</em> option. In addition, especially if the <em>backup</em> volume is file-hosted, the hidden +<em>backup</em> volume should occupy only a very small portion of the container and the outer volume should be almost completely filled with files (otherwise, the plausible deniability of the hidden volume might be adversely affected). +</li><li>Mount the newly created <em>backup</em> volume. </li><li>Mount the system partition that you want to back up by following these steps: +<ol type="a"> +<li>Click <em>Select Device</em> and then select the system partition that you want to back up (in case of a hidden operating system, select the partition containing the hidden volume in which the operating system is installed). +</li><li>Click <em>OK</em>. </li><li>Select <em>System</em> > <em>Mount Without Pre-Boot Authentication</em>. </li><li>Enter your pre-boot authentication password and click <em>OK</em>. </li></ol> +</li><li>Mount the <em>backup</em> volume and then use a third-party program or a Windows tool to create an image of the filesystem that resides on the system partition (which was mounted as a regular VeraCrypt volume in the previous step) and store the image directly + on the mounted backup volume. </li></ol> +<h4>IMPORTANT: If you store the backup volume in any location that an adversary can repeatedly access (for example, on a device kept in a bank’s safe deposit box), you should repeat all of the above steps (including the step 2) each time you want to back + up the volume (see below).</h4> +<p>If you follow the above steps, you will help prevent adversaries from finding out:</p> +<ul> +<li>Which sectors of the volumes are changing (because you always follow step 2). This is particularly important, for example, if you store the backup volume on a device kept in a bank’s safe deposit box (or in any other location that an adversary can + repeatedly access) and the volume contains a hidden volume (for more information, see the subsection +<a href="Security%20Requirements%20for%20Hidden%20Volumes.html"> +<em>Security Requirements and Precautions Pertaining to Hidden Volumes</em></a> in the chapter +<a href="Plausible%20Deniability.html"><em>Plausible Deniability</em></a>). +</li><li>That one of the volumes is a backup of the other. </li></ul> +<h3>General Notes</h3> +<p>If you store the backup volume in any location where an adversary can make a copy of the volume, consider encrypting the volume with a cascade of ciphers (for example, with AES-Twofish- Serpent). Otherwise, if the volume is encrypted only with a single encryption + algorithm and the algorithm is later broken (for example, due to advances in cryptanalysis), the attacker might be able to decrypt his copies of the volume. The probability that three distinct encryption algorithms will be broken is significantly lower than + the probability that only one of them will be broken.</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Incompatibilities.html b/doc/html/Incompatibilities.html new file mode 100644 index 00000000..84610d9e --- /dev/null +++ b/doc/html/Incompatibilities.html @@ -0,0 +1,74 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Incompatibilities.html">Incompatibilities</a> +</p></div> + +<div class="wikidoc"> +<h1>Incompatibilities</h1> +<h4 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:12px; margin-bottom:1px"> +Activation of Adobe Photoshop® and Other Products Using FLEXnet Publisher® / SafeCast</h4> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Note: The issue described below does <strong style="text-align:left"> +not</strong> affect you if you use a non-cascade encryption algorithm (i.e., AES, Serpent, or Twofish).* The issue also does +<strong style="text-align:left">not</strong> affect you if you do not use <a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +system encryption</a> (pre-boot authentication).</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Acresso FLEXnet Publisher activation software, formerly Macrovision SafeCast, (used for activation of third-party software, such as Adobe Photoshop) writes data to the first drive track. If this happens when your system partition/drive is encrypted by VeraCrypt, + a portion of the VeraCrypt Boot Loader will be damaged and you will not be able to start Windows. In that case, please use your +<a href="VeraCrypt%20Rescue%20Disk.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Rescue Disk</a> to regain access to your system. There are two ways to do so:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +You may keep the third-party software activated but you will need to boot your system from the VeraCrypt Rescue Disk CD/DVD +<em style="text-align:left">every time</em>. Just insert your Rescue Disk into your CD/DVD drive and then enter your password in the Rescue Disk screen. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If you do not want to boot your system from the VeraCrypt Rescue Disk CD/DVD every time, you can restore the VeraCrypt Boot Loader on the system drive. To do so, in the Rescue Disk screen, select +<em style="text-align:left">Repair Options</em> > <em style="text-align:left"> +Restore VeraCrypt Boot Loader</em>. However, note that this will deactivate the third-party software. +</li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +For information on how to use your VeraCrypt Rescue Disk, please see the chapter <a href="VeraCrypt%20Rescue%20Disk.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Rescue Disk</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible permanent solution</strong>: decrypt the system partition/drive, and then re-encrypt it using a non-cascade encryption algorithm (i.e., AES, Serpent, or Twofish).*</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Please note that this not a bug in VeraCrypt (the issue is caused by inappropriate design of the third-party activation software).</div> +<p> </p> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* The reason is that the VeraCrypt Boot Loader is smaller than the one used for cascades of ciphers and, therefore, there is enough space in the first drive track for a backup of the VeraCrypt + Boot Loader. Hence, whenever the VeraCrypt Boot Loader is damaged, its backup copy is run automatically instead.</span><br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> + See also: <a href="Issues%20and%20Limitations.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html"> +Known Issues & Limitations</a>, <a href="Troubleshooting.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Troubleshooting</a></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Introduction.html b/doc/html/Introduction.html new file mode 100644 index 00000000..90783867 --- /dev/null +++ b/doc/html/Introduction.html @@ -0,0 +1,56 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Introduction.html">Introduction</a> +</p> +</div> + +<div class="wikidoc"> +<h1>Introduction</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt is a software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user + intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta + data, etc).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Files can be copied to and from a mounted VeraCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied + from an encrypted VeraCrypt volume. Similarly, files that are being written or copied to the VeraCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM. Note that this does +<span style="text-align:left; font-style:italic">not</span> mean that the <span style="text-align:left; font-style:italic"> +whole</span> file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for VeraCrypt. For an illustration of how this is accomplished, see the following paragraph.<br style="text-align:left"> +<br style="text-align:left"> +Let's suppose that there is an .avi video file stored on a VeraCrypt volume (therefore, the video file is entirely encrypted). The user provides the correct password (and/or keyfile) and mounts (opens) the VeraCrypt volume. When the user double clicks the icon + of the video file, the operating system launches the application associated with the file type – typically a media player. The media player then begins loading a small initial portion of the video file from the VeraCrypt-encrypted volume to RAM (memory) + in order to play it. While the portion is being loaded, VeraCrypt is automatically decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the media player. While this portion is being played, the media player begins loading + another small portion of the video file from the VeraCrypt-encrypted volume to RAM (memory) and the process repeats. This process is called on-the-fly encryption/decryption and it works for all file types (not only for video files).</div> +<p>Note that VeraCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume + will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you + have to mount the volume (and provide the correct password and/or keyfile). For a quick start guide, please see the chapter Beginner's Tutorial.</p> +</div> +</body></html> diff --git a/doc/html/Issues and Limitations.html b/doc/html/Issues and Limitations.html new file mode 100644 index 00000000..a7be3f60 --- /dev/null +++ b/doc/html/Issues and Limitations.html @@ -0,0 +1,100 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Issues%20and%20Limitations.html">Known Issues and Limitations</a> +</p></div> + +<div class="wikidoc"> +<h1>Known Issues & Limitations</h1> +<h3>Known Issues</h3> +<ul> +<li>On Windows, it may happen that two drive letters are assigned to a mounted volume instead of a single one. This is caused by an issue with Windows Mount Manager cache and it can be solve by typing the command "<strong>mountvol.exe /r</strong>" in an elevated + command prompt (run as an administrator) before mounting any volume. If the issue persists after rebooting, the following procedure can be used to solve it: +<ul> +<li>Check the registry key "HKEY_LOCAL_MACHINE\SYSTEM\MountedDevices" using regedit. Scroll down and you'll find entries starting with "\DosDevices\" or "\Global??\" which indicate the drive letters that are taken by the system. Before mounting any volume, + double click on each one and remove the ones contains the name "VeraCrypt" and "TrueCrypt". +<br> +Also, there are other entries whose name start with "#{" and "\??\Volume{": double click on each one of them and remove the ones whose data value contains the name "VeraCrypt" and "TrueCrypt". +</li></ul> +</li></ul> +<h3 id="limitations">Limitations</h3> +<ul> +<li>[<em>Note: This limitation does not apply to users of Windows Vista and later versions of Windows.</em>] On Windows XP/2003, VeraCrypt does not support encrypting an entire system drive that contains extended (logical) partitions. You can encrypt an entire + system drive provided that it contains only primary partitions. Extended (logical) partitions must not be created on any system drive that is partially or fully encrypted (only primary partitions may be created on it). +<em>Note</em>: If you need to encrypt an entire drive containing extended partitions, you can encrypt the system partition and, in addition, create partition-hosted VeraCrypt volumes within any non- system partitions on the drive. Alternatively, you may want + to consider upgrading to Windows Vista or a later version of Windows. </li><li>VeraCrypt currently does not support encrypting a system drive that has been converted to a dynamic disk. +</li><li>To work around a Windows XP issue, the VeraCrypt boot loader is always automatically configured for the version of the operating system under which it is installed. When the version of the system changes (for example, the VeraCrypt boot loader is installed + when Windows Vista is running but it is later used to boot Windows XP) you may encounter various known and unknown issues (for example, on some notebooks, Windows XP may fail to display the log-on screen). Note that this affects multi-boot configurations, + VeraCrypt Rescue Disks, and decoy/hidden operating systems (therefore, if the hidden system is e.g. Windows XP, the decoy system should be Windows XP too). +</li><li>The ability to mount a partition that is within the key scope of system encryption without pre- boot authentication (for example, a partition located on the encrypted system drive of another operating system that is not running), which can be done e.g. + by selecting <em>System</em> > <em>Mount Without Pre-Boot Authentication,</em> is limited to primary partitions (extended/logical partitions cannot be mounted this way). +</li><li>Due to a Windows 2000 issue, VeraCrypt does not support the Windows Mount Manager under Windows 2000. Therefore, some Windows 2000 built-in tools, such as Disk Defragmenter, do not work on VeraCrypt volumes. Furthermore, it is not possible to use the Mount + Manager services under Windows 2000, e.g., assign a mount point to a VeraCrypt volume (i.e., attach a VeraCrypt volume to a folder). +</li><li>VeraCrypt does not support pre-boot authentication for operating systems installed within VHD files, except when booted using appropriate virtual-machine software such as Microsoft Virtual PC. +</li><li>The Windows Volume Shadow Copy Service is currently supported only for partitions within the key scope of system encryption (e.g. a system partition encrypted by VeraCrypt, or a non- system partition located on a system drive encrypted by VeraCrypt, mounted + when the encrypted operating system is running). Note: For other types of volumes, the Volume Shadow Copy Service is not supported because the documentation for the necessary API is not available. +</li><li>Windows boot settings cannot be changed from within a hidden operating system if the system does not boot from the partition on which it is installed. This is due to the fact that, for security reasons, the boot partition is mounted as read-only when the + hidden system is running. To be able to change the boot settings, please start the decoy operating system. +</li><li>Encrypted partitions cannot be resized except partitions on an entirely encrypted system drive that are resized while the encrypted operating system is running. +</li><li id="SysEncUpgrade">When the system partition/drive is encrypted, the system cannot be upgraded (for example, from Windows XP to Windows Vista) or repaired from within the pre-boot environment (using a Windows setup CD/DVD or the Windows pre-boot component). + In such cases, the system partition/drive must be decrypted first. Note: A running operating system can be +<em>updated</em> (security patches, service packs, etc.) without any problems even when the system partition/drive is encrypted. +</li><li>System encryption is supported only on drives that are connected locally via an ATA/SCSI interface (note that the term ATA also refers to SATA and eSATA). +</li><li>When system encryption is used (this also applies to hidden operating systems), VeraCrypt does not support multi-boot configuration changes (for example, changes to the number of operating systems and their locations). Specifically, the configuration must + remain the same as it was when the VeraCrypt Volume Creation Wizard started to prepare the process of encryption of the system partition/drive (or creation of a hidden operating system).<br> +<br> +Note: The only exception is the multi-boot configuration where a running VeraCrypt-encrypted operating system is always located on drive #0, and it is the only operating system located on the drive (or there is one VeraCrypt-encrypted decoy and one VeraCrypt-encrypted + hidden operating system and no other operating system on the drive), and the drive is connected or disconnected before the computer is turned on (for example, using the power switch on an external eSATA drive enclosure). There may be any additional operating + systems (encrypted or unencrypted) installed on other drives connected to the computer (when drive #0 is disconnected, drive #1 becomes drive #0, etc.) +</li><li>When the notebook battery power is low, Windows may omit sending the appropriate messages to running applications when the computer is entering power saving mode. Therefore, VeraCrypt may fail to auto-dismount volumes in such cases. +</li><li>Preserving of any timestamp of any file (e.g. a container or keyfile) is not guaranteed to be reliably and securely performed (for example, due to filesystem journals, timestamps of file attributes, or the operating system failing to perform it for various + documented and undocumented reasons). Note: When you write to a file-hosted hidden volume, the timestamp of the container may change. This can be plausibly explained as having been caused by changing the (outer) volume password. Also note that VeraCrypt never + preserves timestamps of system favorite volumes (regardless of the settings). </li><li>Special software (e.g., a low-level disk editor) that writes data to a disk drive in a way that circumvents drivers in the driver stack of the class ‘DiskDrive’ (GUID of the class is 4D36E967- E325-11CE-BFC1-08002BE10318) can write unencrypted + data to a non-system drive hosting a mounted VeraCrypt volume (‘Partition0’) and to encrypted partitions/drives that are within the key scope of active system encryption (VeraCrypt does not encrypt such data written that way). Similarly, software + that writes data to a disk drive circumventing drivers in the driver stack of the class ‘Storage Volume’ (GUID of the class is 71A27CDD-812A-11D0-BEC7-08002BE2092F) can write unencrypted data to VeraCrypt partition-hosted volumes (even if they + are mounted). </li><li>For security reasons, when a hidden operating system is running, VeraCrypt ensures that all local unencrypted filesystems and non-hidden VeraCrypt volumes are read-only. However, this does not apply to filesystems on CD/DVD-like media and on custom, atypical, + or non-standard devices/media (for example, any devices/media whose class is other than the Windows device class ‘Storage Volume’ or that do not meet the requirements of this class (GUID of the class is 71A27CDD-812A-11D0-BEC7-08002BE2092F)). +</li><li>Device-hosted VeraCrypt volumes located on floppy disks are not supported. Note: You can still create file-hosted VeraCrypt volumes on floppy disks. +</li><li>Windows Server editions don't allow the use of mounted VeraCrypt volumes as a path for server backup. This can solved by activating sharing on the VeraCrypt volume through Explorer interface (of course, you have to put the correct permission to avoid unauthorized + access) and then choosing the option "Remote shared folder" (it is not remote of course but Windows needs a network path). There, you can type the path of the shared drive (for example \\ServerName\sharename) and the backup will be configured correctly. +</li><li>Due to Microsoft design flaws in NTFS sparse files handling, you may encounter system errors when writing data to large Dynamic volumes (more than few hundreds GB). To avoid this, the recommended size for a Dynamic volume container file for maximum compatibility + is 300 GB. The following link gives more details concerning this limitation: <a href="http://www.flexhex.com/docs/articles/sparse-files.phtml#msdn" target="_blank"> +http://www.flexhex.com/docs/articles/sparse-files.phtml#msdn</a> </li><li>Windows 8 introduced a new feature called "<strong>Hybrid boot and shutdown</strong>" to give users the impression that booting is quick. This feature is enabled by default and it has side effects on VeraCrypt volumes usage. It is advised to disable this + feature (e.g. this <a href="https://www.maketecheasier.com/disable-hybrid-boot-and-shutdown-in-windows-8/" target="_blank"> +link </a>explains how). Some examples of issues: +<ul> +<li>after a shutdown and a restart, mounted volume will continue to be mounted without typing the password: this due to the fact the new Windows 8 shutdown is not a real shutdown but a disguised hibernate/sleep. +</li><li>when using system encryption and when there are System Favorites configured to be mounted at boot time: after shutdown and restart, these system favorites will not be mounted. +</li></ul> +</li><li>Windows system Repair/Recovery Disk can't be created when a VeraCrypt volume is mounted as a fixed disk (which is the default). To solve this, either dismount all volumes or mount volumes are removable media. +</li><li>Further limitations are listed in the section <a href="Security%20Model.html"> +<em>Security Model</em></a>. </li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Journaling File Systems.html b/doc/html/Journaling File Systems.html new file mode 100644 index 00000000..b04a6e47 --- /dev/null +++ b/doc/html/Journaling File Systems.html @@ -0,0 +1,46 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Journaling%20File%20Systems.html">Journaling File Systems</a> +</p></div> + +<div class="wikidoc"> +<h1>Journaling File Systems</h1> +<p>When a file-hosted VeraCrypt container is stored in a journaling file system (such as NTFS or Ext3), a copy of the VeraCrypt container (or of its fragment) may remain in the free space on the host volume. This may have various security implications. For + example, if you change the volume password/keyfile(s) and an adversary finds the old copy or fragment (the old header) of the VeraCrypt volume, he might use it to mount the volume using an old compromised password (and/or using compromised keyfiles using an + old compromised password (and/or using compromised keyfiles that were necessary to mount the volume before the volume header was re- encrypted). Some journaling file systems also internally record file access times and other potentially sensitive information. + If you need plausible deniability (see section <a href="Plausible%20Deniability.html"> +<em>Plausible Deniability</em></a>), you must not store file-hosted VeraCrypt containers in journaling file systems. To prevent possible security issues related to journaling file systems, do one the following:</p> +<ul> +<li>Use a partition/device-hosted VeraCrypt volume instead of file-hosted. </li><li>Store the container in a non-journaling file system (for example, FAT32). </li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Keyfiles in VeraCrypt.html b/doc/html/Keyfiles in VeraCrypt.html new file mode 100644 index 00000000..c64773b4 --- /dev/null +++ b/doc/html/Keyfiles in VeraCrypt.html @@ -0,0 +1,215 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Keyfiles%20in%20VeraCrypt.html">Keyfiles</a> +</p></div> + +<div class="wikidoc"> +<h1>Keyfiles</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +Keyfile is a file whose content is combined with a password (for information on the method used to combine a keyfile with password, see the section +<a href="Keyfiles.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Keyfiles</a> in the chapter <a href="Technical%20Details.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Technical Details</a>). Until the correct keyfile is provided, no volume that uses the keyfile can be mounted.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +You do not have to use keyfiles. However, using keyfiles has some advantages:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +May improve protection against brute force attacks (significant particularly if the volume password is not very strong). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Allows the use of security tokens and smart cards (see below). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Allows multiple users to mount a single volume using different user passwords or PINs. Just give each user a security token or smart card containing the same VeraCrypt keyfile and let them choose their personal password or PIN that will protect their security + token or smart card. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Allows managing multi-user <em style="text-align:left">shared</em> access (all keyfile holders must present their keyfiles before a volume can be mounted). +</li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Any kind of file (for example, .txt, .exe, mp3**, .avi) can be used as a VeraCrypt keyfile (however, we recommend that you prefer compressed files, such as .mp3, .jpg, .zip, etc). +<br style="text-align:left"> +<br style="text-align:left"> +Note that VeraCrypt never modifies the keyfile contents. You can select more than one keyfile; the order does not matter. You can also let VeraCrypt generate a file with random content and use it as a keyfile. To do so, select +<em style="text-align:left">Tools > Keyfile Generator</em>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: Keyfiles are currently not supported for system encryption.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +WARNING: If you lose a keyfile or if any bit of its first 1024 kilobytes changes, it will be impossible to mount volumes that use the keyfile!</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left"><strong style="text-align:left">WARNING: If password caching is enabled, the password cache also contains the processed contents of keyfiles used to successfully mount a volume. Then it is possible to remount the volume even if the + keyfile is not available/accessible.</strong> To prevent this, click '</em>Wipe Cache<em style="text-align:left">' or disable password caching (for more information, please see the subsection +</em>'Settings -> Preferences'<em style="text-align:left">, item </em>'Cache passwords in driver memory'<em style="text-align:left"> in the section +</em><a href="Program%20Menu.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Program Menu</a>).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +See also the section <a href="Choosing%20Passwords%20and%20Keyfiles.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Choosing Passwords and Keyfiles</a> in the chapter <a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions</a>.</div> +<p> </p> +<h3 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px"> +Keyfiles Dialog Window</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If you want to use keyfiles (i.e. "apply" them) when creating or mounting volumes, or changing passwords, look for the '<em style="text-align:left">Use keyfiles</em>' option and the +<em style="text-align:left">Keyfiles</em> button below a password input field.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<img src="Keyfiles in VeraCrypt_Image_040.gif" alt="VeraCrypt Keyfiles dialog" width="450" height="164"></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +These control elements appear in various dialog windows and always have the same functions. Check the +<em style="text-align:left">Use keyfiles </em>option and click <em style="text-align:left"> +Keyfiles. </em>The keyfile dialog window should appear where you can specify keyfiles (to do so, click +<em style="text-align:left">Add File</em>s or <em style="text-align:left">Add Token Files</em>)<em style="text-align:left"> or</em> keyfile search paths (click +<em style="text-align:left">Add Path</em>).</div> +<p> </p> +<h3 id="SmartCard" style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px"> +Security Tokens and Smart Cards</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt can directly use keyfiles stored on a security token or smart card that complies with the PKCS #11 (2.0 or later) standard [23] and that allows the user to store a file (data object) on the token/card. To use such files as VeraCrypt keyfiles, + click <em style="text-align:left">Add Token Files</em> (in the keyfile dialog window).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Access to a keyfile stored on a security token or smart card is typically protected by PIN codes, which can be entered either using a hardware PIN pad or via the VeraCrypt GUI. It can also be protected by other means, such as fingerprint readers.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +In order to allow VeraCrypt to access a security token or smart card, you need to install a PKCS #11 (2.0 or later) software library for the token or smart card first. Such a library may be supplied with the device or it may be available for download from the + website of the vendor or other third parties.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If your security token or smart card does not contain any file (data object) that you could use as a VeraCrypt keyfile, you can use VeraCrypt to import any file to the token or smart card (if it is supported by the device). To do so, follow these steps:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +In the keyfile dialog window, click <em style="text-align:left">Add Token Files</em>. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If the token or smart card is protected by a PIN, password, or other means (such as a fingerprint reader), authenticate yourself (for example, by entering the PIN using a hardware PIN pad). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The 'Security Token Keyfile' dialog window should appear. In it, click <em style="text-align:left"> +Import Keyfile to Token</em> and then select the file you want to import to the token or smart card. +</li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note that you can import for example 512-bit keyfiles with random content generated by VeraCrypt (see +<em style="text-align:left">Tools > Keyfile Generator</em> below).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To close all opened security token sessions, either select <em style="text-align:left"> +Tools</em> > <em style="text-align:left">Close All Security Token Sessions</em> or define and use a hotkey combination (<em style="text-align:left">Settings</em> > +<em style="text-align:left">Hot Keys > Close All Security Token Sessions</em>).</div> +<p> </p> +<h3 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px"> +Keyfile Search Path</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +By adding a folder in the keyfile dialog window (click <em style="text-align:left"> +Add Path</em>), you specify a <em style="text-align:left">keyfile search path</em>. All files found in the keyfile search path* will be used as keyfiles except files that have the Hidden file attribute set.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left"><em style="text-align:left">Important: Note that folders (and files they contain) and hidden files found in a keyfile search path are ignored.</em></strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Keyfile search paths are especially useful if you, for example, store keyfiles on a USB memory stick that you carry with you. You can set the drive letter of the USB memory stick as a default keyfile search path. To do so, select +<em style="text-align:left">Settings </em>-> <em style="text-align:left">Default Keyfiles</em>. Then click +<br style="text-align:left"> +<em style="text-align:left">Add Path</em>, browse to the drive letter assigned to the USB memory stick, and click +<em style="text-align:left">OK</em>. Now each time you mount a volume (and if the option +<em style="text-align:left">Use keyfiles</em> is checked in the password dialog window), VeraCrypt will scan the path and use all files that it finds on the USB memory stick as keyfiles.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left"><em style="text-align:left">WARNING: When you add a folder (as opposed to a file) to the list of keyfiles, only the path is remembered, not the filenames! This means e.g. that if you create a new file in the folder or if you + copy an additional file to the folder, then all volumes that used keyfiles from the folder will be impossible to mount (until you remove the newly added file from the folder). +</em></strong></div> +<p> </p> +<h3 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px"> +Empty Password & Keyfile</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +When a keyfile is used, the password may be empty, so the keyfile may become the only item necessary to mount the volume (which we do not recommend). If default keyfiles are set and enabled when mounting a volume, then before prompting for a password, VeraCrypt + first automatically attempts to mount using an empty password plus default keyfiles (however, this does not apply to the '<em style="text-align:left">Auto-Mount Devices</em>' function). If you need to set Mount Options (e.g., mount as read-only, protect hidden + volume etc.) for a volume being mounted this way, hold down the <em style="text-align:left"> +Control </em>(<em style="text-align:left">Ctrl</em>) key while clicking <em style="text-align:left"> +Mount </em>(or select <em style="text-align:left">Mount with Options </em>from the +<em style="text-align:left">Volumes </em>menu). This will open the <em style="text-align:left"> +Mount Options </em>dialog.</div> +<p> </p> +<h3 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px"> +Quick Selection</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Keyfiles and keyfile search paths can be quickly selected in the following ways:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Right-click the <em style="text-align:left">Keyfiles</em> button in the password entry dialog window and select one of the menu items. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Drag the corresponding file/folder icons to the keyfile dialog window or to the password entry dialog. +</li></ul> +<p> </p> +<h3 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px"> +Volumes -> Add/Remove Keyfiles to/from Volume</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +This function allows you to re-encrypt a volume header with a header encryption key derived from any number of keyfiles (with or without a password), or no keyfiles at all. Thus, a volume which is possible to mount using only a password can be converted to + a volume that require keyfiles (in addition to the password) in order to be possible to mount. Note that the volume header contains the master encryption key with which the volume is encrypted. Therefore, the data stored on the volume will +<em style="text-align:left">not</em> be lost after you use this function.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +This function can also be used to change/set volume keyfiles (i.e., to remove some or all keyfiles, and to apply new ones).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Remark: This function is internally equal to the Password Change function.<br style="text-align:left"> +<br style="text-align:left"> +When VeraCrypt re-encrypts a volume header, the original volume header is first overwritten 256 times with random data to prevent adversaries from using techniques such as magnetic force microscopy or magnetic force scanning tunneling microscopy [17] to recover + the overwritten header (however, see also the chapter <a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions</a>).</div> +<p> </p> +<h3 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px"> +Volumes -> Remove All Keyfiles from Volume</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +This function allows you to re-encrypt a volume header with a header encryption key derived from a password and no keyfiles (so that it can be mounted using only a password, without any keyfiles). Note that the volume header contains the master encryption key + with which the volume is encrypted. Therefore, the data stored on the volume will +<em style="text-align:left">not</em> be lost after you use this function.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Remark: This function is internally equal to the Password Change function.<br style="text-align:left"> +<br style="text-align:left"> +When VeraCrypt re-encrypts a volume header, the original volume header is first overwritten 256 times with random data to prevent adversaries from using techniques such as magnetic force microscopy or magnetic force scanning tunneling microscopy [17] to recover + the overwritten header (however, see also the chapter <a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions</a>).</div> +<p> </p> +<h3 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px"> +Tools > Keyfile Generator</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +You can use this function to generate a file or more with random content, which you can use as a keyfile(s) (recommended). This function uses the VeraCrypt Random Number Generator. Note that, by default, only one key file is generated and the resulting file + size is 64 bytes (i.e., 512 bits), which is also the maximum possible VeraCrypt password length. It is also possible to generate multiple files and specify their size (either a fixed value for all of them or let VeraCrypt choose file sizes randomly). In all + cases, the file size must be comprised between 64 bytes and 1048576 bytes (which is equal to 1MB, the maximum number of a key file bytes processed by VeraCrypt).</div> +<h3 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:13px; margin-bottom:4px"> +Settings -> Default Keyfiles</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Use this function to set default keyfiles and/or default keyfile search paths. This function is particularly useful if you, for example, store keyfiles on a USB memory stick that you carry with you. You can add its drive letter to the default keyfile configuration. + To do so, click <em style="text-align:left">Add Path</em>, browse to the drive letter assigned to the USB memory stick, and click +<em style="text-align:left">OK</em>. Now each time you mount a volume (and if <em style="text-align:left"> +Use keyfiles</em> is checked in the password dialog), VeraCrypt will scan the path and use all files that it finds there as keyfiles.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left"><em style="text-align:left">WARNING: When you add a folder (as opposed to a file) to your default keyfile list, only the path is remembered, not the filenames! This means e.g. that if you create a new file in the folder or if + you copy an additional file to the folder, then all volumes that used keyfiles from the folder will be impossible to mount (until you remove the newly added file from the folder). +<br style="text-align:left"> +<br style="text-align:left"> +</em></strong><span style="text-align:left; font-style:italic">IMPORTANT: Note that when you set default keyfiles and/or default keyfile search paths, the filenames and paths are saved unencrypted in the file +</span>Default Keyfiles.xml<span style="text-align:left; font-style:italic">. For more information, please see the chapter +</span><a href="VeraCrypt%20System%20Files.html" style="text-align:left; color:#0080c0; text-decoration:none">VeraCrypt System Files & Application Data</a><span style="text-align:left; font-style:italic.html">. +</span></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left"><br style="text-align:left"> +</em></div> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* Found at the time when you are mounting the volume, changing its password, or performing any other operation that involves re-encryption of the volume header.<br style="text-align:left"> +** However, if you use an MP3 file as a keyfile, you must ensure that no program modifies the ID3 tags within the MP3 file (e.g. song title, name of artist, etc.). Otherwise, it will be impossible to mount volumes that use the keyfile.<br style="text-align:left"> +</span></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Keyfiles in VeraCrypt_Image_040.gif b/doc/html/Keyfiles in VeraCrypt_Image_040.gif Binary files differnew file mode 100644 index 00000000..4fc413e0 --- /dev/null +++ b/doc/html/Keyfiles in VeraCrypt_Image_040.gif diff --git a/doc/html/Keyfiles.html b/doc/html/Keyfiles.html new file mode 100644 index 00000000..03627dbb --- /dev/null +++ b/doc/html/Keyfiles.html @@ -0,0 +1,81 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Keyfiles.html">Keyfiles</a> +</p></div> + +<div class="wikidoc"> +<h1>Keyfiles</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>VeraCrypt keyfile is a file whose content is combined with a password. The user can use any kind of file as a VeraCrypt keyfile. The user can also generate a keyfile using the built-in keyfile generator, which utilizes the VeraCrypt RNG to generate a file + with random content (for more information, see the section <a href="Random%20Number%20Generator.html"> +<em>Random Number Generator</em></a>).</p> +<p>The maximum size of a keyfile is not limited; however, only its first 1,048,576 bytes (1 MB) are processed (all remaining bytes are ignored due to performance issues connected with processing extremely large files). The user can supply one or more keyfiles + (the number of keyfiles is not limited).</p> +<p>Keyfiles can be stored on PKCS-11-compliant [23] security tokens and smart cards protected by multiple PIN codes (which can be entered either using a hardware PIN pad or via the VeraCrypt GUI).</p> +<p>Keyfiles are processed and applied to a password using the following method:</p> +<ol> +<li>Let <em>P</em> be a VeraCrypt volume password supplied by user (may be empty) +</li><li>Let <em>KP</em> be the keyfile pool </li><li>Let <em>kpl</em> be the size of the keyfile pool <em>KP</em>, in bytes (64, i.e., 512 bits); +<p>kpl must be a multiple of the output size of a hash function H</p> +</li><li>Let <em>pl</em> be the length of the password <em>P</em>, in bytes (in the current version: 0 ≤ +<em>pl</em> ≤ 64) </li><li>if <em>kpl > pl</em>, append (<em>kpl – pl</em>) zero bytes to the password +<em>P</em> (thus <em>pl = kpl</em>) </li><li>Fill the keyfile pool <em>KP</em> with <em>kpl</em> zero bytes. </li><li>For each keyfile perform the following steps: +<ol type="a"> +<li>Set the position of the keyfile pool cursor to the beginning of the pool </li><li>Initialize the hash function <em>H</em> </li><li>Load all bytes of the keyfile one by one, and for each loaded byte perform the following steps: +<ol type="i"> +<li>Hash the loaded byte using the hash function <em>H</em> without initializing the hash, to obtain an intermediate hash (state) +<em>M.</em> Do not finalize the hash (the state is retained for next round). </li><li>Divide the state <em>M</em> into individual bytes.<br> +For example, if the hash output size is 4 bytes, (<em>T</em><sub>0</sub> || <em>T</em><sub>1</sub> || +<em>T</em><sub>2</sub> || <em>T</em><sub>3</sub>) = <em>M</em> </li><li>Write these bytes (obtained in step 7.c.ii) individually to the keyfile pool with the modulo 2<sup>8</sup> addition operation (not by replacing the old values in the pool) at the position of the pool cursor. After a byte is written, the pool cursor position + is advanced by one byte. When the cursor reaches the end of the pool, its position is set to the beginning of the pool. +</li></ol> +</li></ol> +</li><li>Apply the content of the keyfile pool to the password <em>P</em> using the following method: +<ol type="a"> +<li>Divide the password <em>P</em> into individual bytes <em>B</em><sub>0</sub>...<em>B</em><sub>pl-1</sub>.<br> +Note that if the password was shorter than the keyfile pool, then the password was padded with zero bytes to the length of the pool in Step 5 (hence, at this point the length of the password is always greater than or equal to the length of the keyfile pool). +</li><li>Divide the keyfile pool <em>KP</em> into individual bytes <em>G</em><sub>0</sub>...<em>G</em><sub>kpl-1</sub> +</li><li>For 0 ≤ i < kpl perform: Bi = Bi ⊕ Gi </li><li><em>P</em> = <em>B</em><sub>0</sub> || <em>B</em><sub>1</sub> || ... || <em>B</em><sub>pl-2</sub> || +<em>B</em><sub>pl-1</sub> </li></ol> +</li><li>The password <em>P</em> (after the keyfile pool content has been applied to it) is now passed to the header key derivation function PBKDF2 (PKCS #5 v2), which processes it (along with salt and other data) using a cryptographically secure hash algorithm + selected by the user (e.g., SHA-512). See the section <a href="Header%20Key%20Derivation.html"> +<em>Header Key Derivation, Salt, and Iteration Count</em></a> for more information. +</li></ol> +<p>The role of the hash function <em>H</em> is merely to perform diffusion [2]. CRC-32 is used as the hash function +<em>H</em>. Note that the output of CRC-32 is subsequently processed using a cryptographically secure hash algorithm: The keyfile pool content (in addition to being hashed using CRC-32) is applied to the password, which is then passed to the header key derivation + function PBKDF2 (PKCS #5 v2), which processes it (along with salt and other data) using a cryptographically secure hash algorithm selected by the user (e.g., SHA-512). The resultant values are used to form the header key and the secondary header key (XTS mode).</p> +<p> </p> +<p><a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Kuznyechik.html b/doc/html/Kuznyechik.html new file mode 100644 index 00000000..e5d5d0cc --- /dev/null +++ b/doc/html/Kuznyechik.html @@ -0,0 +1,44 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Encryption%20Algorithms.html">Encryption Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Kuznyechik.html">Kuznyechik</a> +</p></div> +<div class="wikidoc"> +<h1>Kuznyechik</h1> +<p>Kuznyechik is a 128-bit block cipher first published in 2015 and defined in the National Standard of the Russian Federation <a href="http://tc26.ru/en/standard/gost/GOST_R_34_12_2015_ENG.pdf">GOST R 34.12-2015</a> and also in +<a href="https://tools.ietf.org/html/rfc7801">RFC 7801</a>. It supersedes the old GOST-89 block cipher although it doesn't obsolete it.</p> +<p>VeraCrypt uses Kuznyechik with 10 rounds and a 256-bit key operating in <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +XTS mode</a> (see the section <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Modes of Operation</a>).</p> +<p><a href="Serpent.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Language Packs.html b/doc/html/Language Packs.html new file mode 100644 index 00000000..6076a3b2 --- /dev/null +++ b/doc/html/Language Packs.html @@ -0,0 +1,54 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Language%20Packs.html">Language Packs</a> +</p></div> + +<div class="wikidoc"> +<h1>Language Packs</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +Language packs contain third-party translations of the VeraCrypt user interface texts. Note that language packs are currently supported only by the Windows version of VeraCrypt.</div> +<h3>Installation</h3> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Since version 1.0e, all language packs are included in the VeraCrypt Windows installer and they can be found in VeraCrypt installation directory. To select a new language, run VeraCrypt, select +<em style="text-align:left">Settings </em>-> <em style="text-align:left">Language</em>, then select your language and click +<em style="text-align:left">OK</em>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To revert to English, select <em style="text-align:left">Settings</em> -> <em style="text-align:left"> +Language</em>. Then select <em style="text-align:left">English</em> and click <em style="text-align:left"> +OK</em>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +You can still download an archive containing all language packs for the latest version (1.19) from +<a href="https://launchpad.net/veracrypt/trunk/1.19/+download/VeraCrypt_1.19_Language_Files.zip"> +the following link</a>.</div> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/Legal Information.html b/doc/html/Legal Information.html new file mode 100644 index 00000000..797a4ba3 --- /dev/null +++ b/doc/html/Legal Information.html @@ -0,0 +1,65 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Legal%20Information.html">Legal Information</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Legal Information</h1> +<h3>License</h3> +<p>The text of the license under which VeraCrypt is distributed is contained in the file +<em>License.txt</em> that is included in the VeraCrypt binary and source code distribution packages.</p> +<p>More information on the license <a href="VeraCrypt%20License.html"> +can be found here</a>.</p> +<h3>Copyright Information</h3> +<p>This software as a whole:<br> +<br> +Copyright © 2013-2016 IDRIX. All rights reserved.<br> +<br> +Portions of this software:</p> +<p>Copyright © 2013-2016 IDRIX. All rights reserved.<br> +<br> +Copyright © 2003-2012 TrueCrypt Developers Association. All rights reserved.</p> +<p>Copyright © 1998-2000 Paul Le Roux. All rights reserved.<br> +<br> +Copyright © 1998-2008 Brian Gladman, Worcester, UK. All rights reserved.</p> +<p>Copyright © 1995-2017 Jean-loup Gailly and Mark Adler.</p> +<p>Copyright © 2016 Disk Cryptography Services for EFI (DCS), Alex Kolotnikov</p> +<p>Copyright © 1999-2014 Dieter Baron and Thomas Klausner.</p> +<p>Copyright © 2013, Alexey Degtyarev. All rights reserved.</p> +<p>Copyright © 1999-2013,2014,2015,2016 Jack Lloyd. All rights reserved.<br> +<br> +For more information, please see the legal notices attached to parts of the source code.</p> +<h3>Trademark Information</h3> +<p>Any trademarks mentioned in this document are the sole property of their respective owners.</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Main Program Window.html b/doc/html/Main Program Window.html new file mode 100644 index 00000000..4970fe7c --- /dev/null +++ b/doc/html/Main Program Window.html @@ -0,0 +1,110 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Main%20Program%20Window.html">Main Program Window</a> +</p></div> + +<div class="wikidoc"> +<h1>Main Program Window</h1> +<h3>Select File</h3> +<p>Allows you to select a file-hosted VeraCrypt volume. After you select it, you can perform various operations on it (e.g., mount it by clicking ‘Mount’). It is also possible to select a volume by dragging its icon to the ‘VeraCrypt.exe’ + icon (VeraCrypt will be automatically launched then) or to the main program window.</p> +<h3>Select Device</h3> +<p>Allows you to select a VeraCrypt partition or a storage device (such as a USB memory stick). After it is selected, you can perform various operations with it (e.g., mount it by clicking ‘Mount’).<br> +<br> +Note: There is a more comfortable way of mounting VeraCrypt partitions/devices – see the section +<em>Auto-Mount Devices</em> for more information.</p> +<h3>Mount</h3> +<p>After you click ‘Mount’, VeraCrypt will try to mount the selected volume using cached passwords (if there are any) and if none of them works, it prompts you for a password. If you enter the correct password (and/or provide correct keyfiles), + the volume will be mounted.</p> +<p>Important: Note that when you exit the VeraCrypt application, the VeraCrypt driver continues working and no VeraCrypt volume is dismounted.</p> +<h3 id="AutoMountDevices">Auto-Mount Devices</h3> +<p>This function allows you to mount VeraCrypt partitions/devices without having to select them manually (by clicking ‘Select Device’). VeraCrypt scans headers of all available partitions/devices on your system (except DVD drives and similar devices) + one by one and tries to mount each of them as a VeraCrypt volume. Note that a VeraCrypt partition/device cannot be identified, nor the cipher it has been encrypted with. Therefore, the program cannot directly “find” VeraCrypt partitions. Instead, + it has to try mounting each (even unencrypted) partition/device using all encryption algorithms and all cached passwords (if there are any). Therefore, be prepared that this process may take a long time on slow computers.<br> +<br> +If the password you enter is wrong, mounting is attempted using cached passwords (if there are any). If you enter an empty password and if +<em>Use keyfiles</em> is unchecked, only the cached passwords will be used when attempting to auto-mount partitions/devices. If you do not need to set mount options, you can bypass the password prompt by holding down the +<em>Shift</em> key when clicking <em>Auto- Mount Devices</em> (only cached passwords will be used, if there are any).<br> +<br> +Drive letters will be assigned starting from the one that is selected in the drive list in the main window.</p> +<h3>Dismount</h3> +<p>This function allows you to dismount the VeraCrypt volume selected in the drive list in the main window. To dismount a VeraCrypt volume means to close it and make it impossible to read/write from/to the volume.</p> +<h3>Dismount All</h3> +<p>Note: The information in this section applies to all menu items and buttons with the same or similar caption (for example, it also applies to the system tray menu item +<em>Dismount All</em>).<br> +<br> +This function allows you to dismount multiple VeraCrypt volumes. To dismount a VeraCrypt volume means to close it and make it impossible to read/write from/to the volume. This function dismounts all mounted VeraCrypt volumes except the following:</p> +<ul> +<li>Partitions/drives within the key scope of active system encryption (e.g., a system partition encrypted by VeraCrypt, or a non-system partition located on a system drive encrypted by VeraCrypt, mounted when the encrypted operating system is running). +</li><li>VeraCrypt volumes that are not fully accessible to the user account (e.g. a volume mounted from within another user account). +</li><li>VeraCrypt volumes that are not displayed in the VeraCrypt application window. For example, system favorite volumes attempted to be dismounted by an instance of VeraCrypt without administrator privileges when the option '<em>Allow only administrators to + view and dismount system favorite volumes in VeraCrypt</em>' is enabled. </li></ul> +<h3>Wipe Cache</h3> +<p>Clears all passwords (which may also contain processed keyfile contents) cached in driver memory. When there are no passwords in the cache, this button is disabled. For information on password cache, see the section +<a href="Mounting%20VeraCrypt%20Volumes.html"> +<em>Cache Password in Driver Memory</em></a>.</p> +<h3>Never Save History</h3> +<p>If this option disabled, the file names and/or paths of the last twenty files/devices that were attempted to be mounted as VeraCrypt volumes will be saved in the History file (whose content can be displayed by clicking on the Volume combo-box in the main + window).<br> +<br> +When this option is enabled, VeraCrypt clears the registry entries created by the Windows file selector for VeraCrypt, and sets the “current directory” to the user’s home directory (in portable mode, to the directory from which VeraCrypt was + launched) whenever a container or keyfile is selected via the Windows file selector. Therefore, the Windows file selector will not remember the path of the last mounted container (or the last selected keyfile). However, note that the operations described in + this paragraph are <em>not</em> guaranteed to be performed reliably and securely (see e.g. +<a href="Security%20Requirements%20and%20Precautions.html"> +<em>Security Requirements and Precautions</em></a>) so we strongly recommend that you encrypt the system partition/drive instead of relying on them (see +<a href="System%20Encryption.html"><em>System Encryption</em></a>).<br> +<br> +Furthermore, if this option is enabled, the volume path input field in the main VeraCrypt window is cleared whenever you hide VeraCrypt.<br> +<br> +Note: You can clear the volume history by selecting <em>Tools</em> -> <em>Clear Volume History</em>.</p> +<h3>Exit</h3> +<p>Terminates the VeraCrypt application. The driver continues working and no VeraCrypt volumes are dismounted. When running in ‘portable’ mode, the VeraCrypt driver is unloaded when it is no longer needed (e.g., when all instances of the main application + and/or of the Volume Creation Wizard are closed and no VeraCrypt volumes are mounted). However, if you force dismount on a</p> +<p>VeraCrypt volume when VeraCrypt runs in portable mode, or mount a writable NTFS-formatted volume on Windows Vista or later, the VeraCrypt driver may +<em>not</em> be unloaded when you exit VeraCrypt (it will be unloaded only when you shut down or restart the system). This prevents various problems caused by a bug in Windows (for instance, it would be impossible to start VeraCrypt again as long as there are + applications using the dismounted volume).</p> +<h3>Volume Tools</h3> +<h4>Change Volume Password</h4> +<p>See the section <a href="Program%20Menu.html"> +<em>Volumes -> Change Volume Password</em></a>.</p> +<h4>Set Header Key Derivation Algorithm</h4> +<p>See the section <a href="Program%20Menu.html"> +<em>Volumes -> Set Header Key Derivation Algorithm</em></a>.</p> +<h4>Backup Volume Header</h4> +<p>See the section <a href="Program%20Menu.html#tools-backup-volume-header"> +<em>Tools -> Backup Volume Header</em></a>.</p> +<h4>Restore Volume Header</h4> +<p>See the section <a href="Program%20Menu.html#tools-restore-volume-header"> +<em>Tools -> Restore Volume Header</em></a>.</p> +<p> </p> +<p><a href="Program%20Menu.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Malware.html b/doc/html/Malware.html new file mode 100644 index 00000000..b45d69fc --- /dev/null +++ b/doc/html/Malware.html @@ -0,0 +1,61 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Malware.html">Malware</a> +</p></div> + +<div class="wikidoc"> +<h1>Malware</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The term 'malware' refers collectively to all types of malicious software, such as computer viruses, Trojan horses, spyware, or generally any piece of software (including VeraCrypt or an operating system component) that has been altered, prepared, or can be + controlled, by an attacker. Some kinds of malware are designed e.g. to log keystrokes, including typed passwords (such captured passwords are then either sent to the attacker over the Internet or saved to an unencrypted local drive from which the attacker + might be able to read it later, when he or she gains physical access to the computer). If you use VeraCrypt on a computer infected with any kind of malware, VeraCrypt may become unable to secure data on the computer.* Therefore, you must +<em style="text-align:left">not</em> use VeraCrypt on such a computer.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +It is important to note that VeraCrypt is encryption software, <em style="text-align:left"> +not</em> anti-malware software. It is your responsibility to prevent malware from running on the computer. If you do not, VeraCrypt may become unable to secure data on the computer.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +There are many rules that you should follow to help prevent malware from running on your computer. Among the most important rules are the following: Keep your operating system, Internet browser, and other critical software, up-to-date. In Windows XP or later, + turn on DEP for all programs.** Do not open suspicious email attachments, especially executable files, even if they appear to have been sent by your relatives or friends (their computers might be infected with malware sending malicious emails from their computers/accounts + without their knowledge). Do not follow suspicious links contained in emails or on websites (even if the email/website appears to be harmless or trustworthy). Do not visit any suspicious websites. Do not download or install any suspicious software. Consider + using good, trustworthy, anti-malware software.</div> +<p><br style="text-align:left"> +</p> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* In this section (<em style="text-align:left">Malware</em>), the phrase "data on the computer" means data on internal and external storage devices/media (including removable devices and network + drives) connected to the computer.</span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">** DEP stands for Data Execution Prevention. For more information about DEP, please visit +<a href="https://support.microsoft.com/kb/875352" style="text-align:left; color:#0080c0; text-decoration:none"> +https://support.microsoft.com/kb/875352</a> and <a href="http://technet.microsoft.com/en-us/library/cc700810.aspx" style="text-align:left; color:#0080c0; text-decoration:none"> +http://technet.microsoft.com/en-us/library/cc700810.aspx</a>.</span></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Memory Dump Files.html b/doc/html/Memory Dump Files.html new file mode 100644 index 00000000..da4ccdda --- /dev/null +++ b/doc/html/Memory Dump Files.html @@ -0,0 +1,65 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Data%20Leaks.html">Data Leaks</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Memory%20Dump%20Files.html">Memory Dump Files</a> +</p></div> + +<div class="wikidoc"> +<h1>Memory Dump Files</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Note: The issue described below does <strong style="text-align:left"> +not</strong> affect you if the system partition or system drive is encrypted (for more information, see the chapter +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +System Encryption</a>) and if the system is configured to write memory dump files to the system drive (which it typically is, by default).</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Most operating systems, including Windows, can be configured to write debugging information and contents of the system memory to so-called memory dump files (also called crash dump files) when an error occurs (system crash, "blue screen," bug check). Therefore, + memory dump files may contain sensitive data. VeraCrypt <em style="text-align:left"> +cannot</em> prevent cached passwords, encryption keys, and the contents of sensitive files opened in RAM from being saved +<em style="text-align:left">unencrypted</em> to memory dump files. Note that when you open a file stored on a VeraCrypt volume, for example, in a text editor, then the content of the file is stored +<em style="text-align:left">unencrypted</em> in RAM (and it may remain <em style="text-align:left"> +unencrypted </em>in RAM until the computer is turned off). Also note that when a VeraCrypt volume is mounted, its master key is stored +<em style="text-align:left">unencrypted</em> in RAM. Therefore, you must disable memory dump file generation on your computer at least for each session during which you work with any sensitive data and during which you mount a VeraCrypt volume. To do so in + Windows XP or later, right-click the '<em style="text-align:left">Computer</em>' (or '<em style="text-align:left">My Computer</em>') icon on the desktop or in the +<em style="text-align:left">Start Menu</em>, and then select <em style="text-align:left"> +Properties</em> > (on Windows Vista or later: > <em style="text-align:left"> +Advanced System Settings</em> >) <em style="text-align:left">Advanced </em>tab > section +<em style="text-align:left">Startup and Recovery </em>> <em style="text-align:left"> +Settings > </em>section <em style="text-align:left">Write debugging information +</em>> select <em style="text-align:left">(none)</em> > <em style="text-align:left"> +OK</em>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Note for users of Windows XP/2003</em>: As Windows XP and Windows 2003 do not provide any API for encryption of memory dump files, if the system partition/drive is encrypted by VeraCrypt and your Windows XP system is configured to + write memory dump files to the system drive, the VeraCrypt driver automatically prevents Windows from writing any data to memory dump files<em style="text-align:left">.</em></div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Miscellaneous.html b/doc/html/Miscellaneous.html new file mode 100644 index 00000000..d83f6c3c --- /dev/null +++ b/doc/html/Miscellaneous.html @@ -0,0 +1,48 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Miscellaneous.html">Miscellaneous</a> +</p></div> + +<div class="wikidoc"> +<h1>Miscellaneous</h1> +<ul> +<li><a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html">Use Without Admin Rights</a> +</li><li><a href="Sharing%20over%20Network.html">Sharing over Network</a> +</li><li><a href="VeraCrypt%20Background%20Task.html">Background Task</a> +</li><li><a href="Removable%20Medium%20Volume.html">Removable Medium Volumes</a> +</li><li><a href="VeraCrypt%20System%20Files.html">VeraCrypt System Files</a> +</li><li><a href="Removing%20Encryption.html">Removing Encryption</a> +</li><li><a href="Uninstalling%20VeraCrypt.html">Uninstalling VeraCrypt</a> +</li><li><a href="Digital%20Signatures.html">Digital Signatures</a> +</li></ul> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/Modes of Operation.html b/doc/html/Modes of Operation.html new file mode 100644 index 00000000..3ea4e8c3 --- /dev/null +++ b/doc/html/Modes of Operation.html @@ -0,0 +1,130 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Modes%20of%20Operation.html">Modes of Operation</a> +</p></div> + +<div class="wikidoc"> +<h1>Modes of Operation</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +The mode of operation used by VeraCrypt for encrypted partitions, drives, and virtual volumes is XTS. +<br style="text-align:left"> +<br style="text-align:left"> +XTS mode is in fact XEX mode <a href="http://www.cs.ucdavis.edu/%7Erogaway/papers/offsets.pdf"> +[12]</a>, which was designed by Phillip Rogaway in 2003, with a minor modification (XEX mode uses a single key for two different purposes, whereas XTS mode uses two independent keys).<br style="text-align:left"> +<br style="text-align:left"> +In 2010, XTS mode was approved by NIST for protecting the confidentiality of data on storage devices [24]. In 2007, it was also approved by the IEEE for cryptographic protection of data on block-oriented storage devices (IEEE 1619).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> + </div> +<h2 style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Description of XTS mode</strong>:</h2> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">C<sub style="text-align:left; font-size:85%">i</sub></em> = +<em style="text-align:left">E</em><sub style="text-align:left; font-size:85%"><em style="text-align:left">K</em>1</sub>(<em style="text-align:left">P<sub style="text-align:left; font-size:85%">i</sub></em> ^ (<em style="text-align:left">E</em><sub style="text-align:left; font-size:85%"><em style="text-align:left">K</em>2</sub>(<em style="text-align:left">n</em>) +<img src="gf2_mul.gif" alt="" width="10" height="10"> +<em style="text-align:left">a<sup style="text-align:left; font-size:85%">i</sup></em>)) ^ (<em style="text-align:left">E</em><sub style="text-align:left; font-size:85%"><em style="text-align:left">K</em>2</sub>(<em style="text-align:left">n</em>) +<img src="gf2_mul.gif" alt="" width="10" height="10"><em style="text-align:left"> a<sup style="text-align:left; font-size:85%">i</sup></em>)</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Where:</div> +<table style="border-collapse:separate; border-spacing:0px; width:608px; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; border:0px outset #999"> +<tbody style="text-align:left"> +<tr style="text-align:left"> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> + <sup style="text-align:left; font-size:85%"> <img src="gf2_mul.gif" alt="" width="10" height="10"></sup></td> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +denotes multiplication of two polynomials over the binary field GF(2) modulo <em style="text-align:left"> +x</em><sup style="text-align:left; font-size:85%">128</sup>+<em style="text-align:left">x</em><sup style="text-align:left; font-size:85%">7</sup>+<em style="text-align:left">x</em><sup style="text-align:left; font-size:85%">2</sup>+<em style="text-align:left">x</em>+1</td> +</tr> +<tr style="text-align:left"> +<td style="width:30px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +<em style="text-align:left">K</em>1</td> +<td style="width:578px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +is the encryption key (256-bit for each supported cipher; i.e, AES, Serpent, and Twofish)</td> +</tr> +<tr style="text-align:left"> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +<em style="text-align:left">K</em>2</td> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +is the secondary key (256-bit for each supported cipher; i.e, AES, Serpent, and Twofish)</td> +</tr> +<tr style="text-align:left"> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +<em style="text-align:left">i</em></td> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +is the cipher block index within a data unit; for the first cipher block within a data unit, +<em style="text-align:left">i</em> = 0</td> +</tr> +<tr style="text-align:left"> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +<em style="text-align:left">n</em></td> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +is the data unit index within the scope of <em style="text-align:left">K</em>1; for the first data unit, +<em style="text-align:left">n</em> = 0</td> +</tr> +<tr style="text-align:left"> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +<em style="text-align:left">a</em></td> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +is a primitive element of Galois Field (2<sup style="text-align:left; font-size:85%">128</sup>) that corresponds to polynomial +<em style="text-align:left">x</em> (i.e., 2)</td> +</tr> +<tr style="text-align:left"> +<td colspan="2" style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">Note: The remaining symbols are defined in the section +<a href="Notation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Notation</a>. </span></td> +</tr> +</tbody> +</table> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +The size of each data unit is always 512 bytes (regardless of the sector size).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +For further information pertaining to XTS mode, see e.g. <a href="http://www.cs.ucdavis.edu/%7Erogaway/papers/offsets.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +[12]</a> and <a href="http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +[24]</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="Header%20Key%20Derivation.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Mounting VeraCrypt Volumes.html b/doc/html/Mounting VeraCrypt Volumes.html new file mode 100644 index 00000000..78b5c90e --- /dev/null +++ b/doc/html/Mounting VeraCrypt Volumes.html @@ -0,0 +1,72 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Main%20Program%20Window.html">Main Program Window</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Mounting%20VeraCrypt%20Volumes.html">Mounting Volumes</a> +</p></div> + +<div class="wikidoc"> +<h1>Mounting VeraCrypt Volumes</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>If you have not done so yet, please read the sections ‘<em>Mount</em>‘ and ‘<em>Auto-Mount Devices</em>‘ in the chapter +<a href="Main%20Program%20Window.html"><em>Main Program Window</em></a>.</p> +<h3>Cache Password in Driver Memory</h3> +<p>This option can be set in the password entry dialog so that it will apply only to that particular mount attempt. It can also be set as default in the Preferences. For more information, please see the section +<a href="Program%20Menu.html"><em>Settings -> Preferences</em>, subsection +<em>Cache passwords in driver memory</em></a>.</p> +<h3>Mount Options</h3> +<p>Mount options affect the parameters of the volume being mounted. The <em>Mount Options</em> dialog can be opened by clicking on the +<em>Mount Options</em> button in the password entry dialog. When a correct password is cached, volumes are automatically mounted after you click +<em>Mount</em>. If you need to change mount options for a volume being mounted using a cached password, hold down the +<em>Control</em> (<em>Ctrl</em>) key while clicking <em>Mount</em> or a favorite volume in the +<em>Favorites</em> menu<em>,</em> or select <em>Mount with Options</em> from the <em> +Volumes</em> menu.<br> +<br> +Default mount options can be configured in the main program preferences (<em>Settings -> Preferences).</em></p> +<h4>Mount volume as read-only</h4> +<p>When checked, it will not be possible to write any data to the mounted volume.</p> +<h4>Mount volume as removable medium</h4> +<p>See section <a href="Removable%20Medium%20Volume.html"> +<em>Volume Mounted as Removable Medium</em></a>.</p> +<h4>Use backup header embedded in volume if available</h4> +<p>All volumes created by VeraCrypt contain an embedded backup header (located at the end of the volume). If you check this option, VeraCrypt will attempt to mount the volume using the embedded backup header. Note that if the volume header is damaged, you do + not have to use this option. Instead, you can repair the header by selecting <em> +Tools</em> > <em>Restore Volume Header</em>.</p> +<h4>Mount partition using system encryption without pre-boot authentication</h4> +<p>Check this option, if you need to mount a partition that is within the key scope of system encryption without pre-boot authentication. For example, if you need to mount a partition located on the encrypted system drive of another operating system that is + not running. This can be useful e.g. when you need to back up or repair an operating system encrypted by VeraCrypt (from within another operating system). Note that this option can be enabled also when using the ‘<em>Auto-Mount Devices</em>’ or + ‘<em>Auto-Mount All Device-Hosted Volumes</em>’ functions.</p> +<h4>Hidden Volume Protection</h4> +<p>Please see the section <a href="Protection%20of%20Hidden%20Volumes.html"> +<em>Protection of Hidden Volumes Against Damage</em></a>.</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Multi-User Environment.html b/doc/html/Multi-User Environment.html new file mode 100644 index 00000000..4162b3c1 --- /dev/null +++ b/doc/html/Multi-User Environment.html @@ -0,0 +1,55 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Multi-User%20Environment.html">Multi-User Environment</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Multi-User Environment</h1> +<p>Keep in mind, that the content of a mounted VeraCrypt volume is visible (accessible) to all logged on users. NTFS file/folder permissions can be set to prevent this, unless the volume is mounted as removable medium (see section +<a href="Removable%20Medium%20Volume.html"> +<em>Volume Mounted as Removable Medium</em></a>) under a desktop edition of Windows Vista or later (sectors of a volume mounted as removable medium may be accessible at the volume level to users without administrator privileges, regardless of whether it is + accessible to them at the file-system level).<br> +<br> +Moreover, on Windows, the password cache is shared by all logged on users (for more information, please see the section +<em>Settings -> Preferences</em>, subsection <em>Cache passwords in driver memory</em>).<br> +<br> +Also note that switching users in Windows XP or later (<em>Fast User Switching</em> functionality) does +<em>not</em> dismount a successfully mounted VeraCrypt volume (unlike system restart, which dismounts all mounted VeraCrypt volumes).<br> +<br> +On Windows 2000, the container file permissions are ignored when a file-hosted VeraCrypt volume is to be mounted. On all supported versions of Windows, users without administrator privileges can mount any partition/device-hosted VeraCrypt volume (provided that + they supply the correct password and/or keyfiles). A user without administrator privileges can dismount only volumes that he or she mounted. However, this does not apply to system favorite volumes unless you enable the option (disabled by default) +<em>Settings</em> > ‘<em>System Favorite Volumes</em>’ > ‘<em>Allow only administrators to view and dismount system favorite volumes in VeraCrypt</em>’.</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Notation.html b/doc/html/Notation.html new file mode 100644 index 00000000..dc3a1b93 --- /dev/null +++ b/doc/html/Notation.html @@ -0,0 +1,88 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Notation.html">Notation</a> +</p></div> + +<div class="wikidoc"> +<h1>Notation</h1> +<p> </p> +<table cellspacing="0"> +<tbody> +<tr> +<td><em>C</em></td> +<td>Ciphertext block</td> +</tr> +<tr> +<td><em>DK()</em></td> +<td>Decryption algorithm using encryption/decryption key <em>K</em></td> +</tr> +<tr> +<td><em>EK()</em></td> +<td>Encryption algorithm using encryption/decryption key <em>K</em></td> +</tr> +<tr> +<td><em>H()</em></td> +<td>Hash function</td> +</tr> +<tr> +<td><em>i</em></td> +<td>Block index for n-bit blocks; n is context-dependent</td> +</tr> +<tr> +<td><em>K</em></td> +<td>Cryptographic key</td> +</tr> +<tr> +<td><em>^</em></td> +<td>Bitwise exclusive-OR operation (XOR)</td> +</tr> +<tr> +<td><em>⊕</em></td> +<td>Modulo 2n addition, where n is the bit size of the left-most operand and of the resultant value (e.g., if the left operand is a 1-bit value, and the right operand is a 2-bit value, then: 1 ⊕ 0 = 1; 1 ⊕ 1 = 0; 1 ⊕ 2 = 1; 1 ⊕ 3 = 0; + 0 ⊕ 0 = 0; 0 ⊕ 1 = 1; 0 ⊕ 2 = 0; 0 ⊕ 3 = 1)</td> +</tr> +<tr> +<td><em>⊗</em></td> +<td>Modular multiplication of two polynomials over the binary field GF(2) modulo x128+x7+x2+x+1 (GF stands for Galois Field)</td> +</tr> +<tr> +<td><em>||</em></td> +<td>Concatenation</td> +</tr> +</tbody> +</table> +<p> </p> +<p><a href="Encryption%20Scheme.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/Paging File.html b/doc/html/Paging File.html new file mode 100644 index 00000000..b4c550d6 --- /dev/null +++ b/doc/html/Paging File.html @@ -0,0 +1,75 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Data%20Leaks.html">Data Leaks</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Paging%20File.html">Paging File</a> +</p></div> + +<div class="wikidoc"> +<h1>Paging File</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Note: The issue described below does <strong style="text-align:left"> +not</strong> affect you if the system partition or system drive is encrypted (for more information, see the chapter +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +System Encryption</a>) and if all paging files are located on one or more of the partitions within the key scope of +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +system encryption</a>, for example, on the partition where Windows is installed (for more information, see the fourth paragraph in this subsection</em><em style="text-align:left">).</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Paging files, also called swap files, are used by Windows to hold parts of programs and data files that do not fit in memory. This means that sensitive data, which you believe are only stored in RAM, can actually be written +<em style="text-align:left">unencrypted</em> to a hard drive by Windows without you knowing. +<br style="text-align:left"> +<br style="text-align:left"> +Note that VeraCrypt <em style="text-align:left">cannot</em> prevent the contents of sensitive files that are opened in RAM from being saved +<em style="text-align:left">unencrypted</em> to a paging file (note that when you open a file stored on a VeraCrypt volume, for example, in a text editor, then the content of the file is stored +<em style="text-align:left">unencrypted</em> in RAM).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">To prevent the issues described above</strong>, encrypt the system partition/drive (for information on how to do so, see the chapter +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +System Encryption</a>) and make sure that all paging files are located on one or more of the partitions within the key scope of system encryption (for example, on the partition where Windows is installed). Note that the last condition is typically met on Windows + XP by default. However, Windows Vista and later versions of Windows are configured by default to create paging files on any suitable volume. Therefore, before, you start using VeraCrypt, you must follow these steps: Right-click the '<em style="text-align:left">Computer</em>' + (or '<em style="text-align:left">My Computer</em>') icon on the desktop or in the +<em style="text-align:left">Start Menu</em>, and then select <em style="text-align:left"> +Properties</em> > (<span style="text-align:left">on Windows Vista or later</span>: > +<em style="text-align:left">Advanced System Settings</em> >) <em style="text-align:left"> +Advanced </em>tab > section <em style="text-align:left">Performance </em>> <em style="text-align:left"> +Settings > Advanced </em>tab > section <em style="text-align:left">Virtual memory +</em>><em style="text-align:left"> Change</em>. On Windows Vista or later, disable '<em style="text-align:left">Automatically manage paging file size for all drives</em>'. Then make sure that the list of volumes available for paging file creation contains + only volumes within the intended key scope of system encryption (for example, the volume where Windows is installed). To disable paging file creation on a particular volume, select it, then select '<em style="text-align:left">No paging file</em>' and click +<em style="text-align:left">Set</em>. When done, click <em style="text-align:left"> +OK</em> and restart the computer. <br style="text-align:left"> +<br style="text-align:left"> +<em style="text-align:left">Note: You may also want to consider creating a hidden operating system (for more information, see the section +<a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a>)</em>.</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Parallelization.html b/doc/html/Parallelization.html new file mode 100644 index 00000000..9da5d27b --- /dev/null +++ b/doc/html/Parallelization.html @@ -0,0 +1,50 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Parallelization.html">Parallelization</a> +</p></div> + +<div class="wikidoc"> +<h1>Parallelization</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +When your computer has a multi-core processor (or multiple processors), VeraCrypt uses all of the cores (or processors) in parallel for encryption and decryption. For example, when VeraCrypt is to decrypt a chunk of data, it first splits the chunk into several + smaller pieces. The number of the pieces is equal to the number of the cores (or processors). Then, all of the pieces are decrypted in parallel (piece 1 is decrypted by thread 1, piece 2 is decrypted by thread 2, etc). The same method is used for encryption.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +So if your computer has, for example, a quad-core processor, then encryption and decryption are four times faster than on a single-core processor with equivalent specifications (likewise, they are twice faster on dual-core processors, etc).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Increase in encryption/decryption speed is directly proportional to the number of cores and/or processors.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: Processors with the Hyper-Threading technology provide multiple logical cores per one physical core (or multiple logical processors per one physical processor). When Hyper Threading is enabled in the computer firmware (e.g. BIOS) settings, VeraCrypt creates + one thread for each logical core/processor. For example, on a 6-core processor that provides two logical cores per one physical core, VeraCrypt uses 12 threads.</div> +<p><br style="text-align:left"> +When your computer has a multi-core processor/CPU (or multiple processors/CPUs), <a href="Header%20Key%20Derivation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +header key derivation</a> is parallelized too. As a result, mounting of a volume is several times faster on a multi-core processor (or multi-processor computer) than on a single-core processor (or a single-processor computer) with equivalent specifications.</p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Personal Iterations Multiplier (PIM).html b/doc/html/Personal Iterations Multiplier (PIM).html new file mode 100644 index 00000000..b039a74f --- /dev/null +++ b/doc/html/Personal Iterations Multiplier (PIM).html @@ -0,0 +1,118 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Personal%20Iterations%20Multiplier%20(PIM).html">PIM</a> +</p></div> + +<div class="wikidoc"> +<h1>PIM</h1> +<div> +<p>PIM stands for "Personal Iterations Multiplier". It is a parameter that was introduced in VeraCrypt 1.12 and whose value controls the number of iterations used by the header key derivation function. This value can be specified through the password dialog + or in the command line.</p> +<p>If no PIM value is specified, VeraCrypt will use the default number of iterations used in versions prior to 1.12 (see +<a href="Header%20Key%20Derivation.html"> +Header Key Derivation</a>).</p> +<p>When a PIM value is specified, the number of iterations is calculated as follows:</p> +<ul> +<li>For system encryption: Iterations = <strong>PIM x 2048</strong> </li><li>For non-system encryption and file containers: Iterations = <strong>15000 + (PIM x 1000)</strong> +</li></ul> +<p>Prior to version 1.12, the security of a VeraCrypt volume was only based on the password strength because VeraCrypt was using a fixed number of iterations.<br> +With the introduction of PIM, VeraCrypt has a 2-dimensional security space for volumes based on the couple (Password, PIM). This provides more flexibility for adjusting the desired security level while also controlling the performance of the mount/boot operation.</p> +<h3>PIM Usage</h3> +It is not mandatory to specify a PIM.</div> +<div><br> +When creating a volume or when changing the password, the user has the possibility to specify a PIM value by checking the "Use PIM" checkbox which in turn will make a PIM field available in the GUI so a PIM value can be entered.</div> +<div> </div> +<div>The PIM is treated like a secret value that must be entered by the user each time alongside the password. If the incorrect PIM value is specified, the mount/boot operation will fail.</div> +<div> </div> +<div>Using high PIM values leads to better security thanks to the increased number of iterations but it comes with slower mounting/booting times.</div> +<div>With small PIM values, mounting/booting is quicker but this could decrease security if a weak password is used.</div> +<div> </div> +<div>During the creation of a volume or the encryption of the system, VeraCrypt forces the PIM value to be greater than or equal to a certain minimal value when the password is less than 20 characters. This check is done in order to ensure that, for short passwords, + the security level is at least equal to the default level provided by an empty PIM.</div> +<div> </div> +<div>The PIM minimal value for short passwords is <strong>98</strong> for system encryption and +<strong>485</strong> for non-system encryption and files containers. For password with 20 characters and more, the PIM minimal value is +<strong>1</strong>. In all cases, leaving the PIM empty or setting its value to 0 will make VeraCrypt use the default high number of iterations as explained in section +<a href="Header%20Key%20Derivation.html"> +Header Key Derivation</a>.</div> +<div><br> +Motivations behind using a custom PIM value can be:<br> +<ul> +<li>Add an extra secret parameter (PIM) that an attacker will have to guess </li><li>Increase security level by using large PIM values to thwart future development of brute force attacks. +</li><li>Speeding up booting or mounting through the use of a small PIM value (less than 98 for system encryption and less than 485 for the other cases) +</li></ul> +<p>The screenshots below show the step to mount a volume using a PIM equal to 231:</p> +<table style="margin-left:auto; margin-right:auto"> +<tbody> +<tr> +<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png" alt="" width="499" height="205"></td> +</tr> +<tr> +<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png" alt="" width="499" height="205"></td> +</tr> +</tbody> +</table> +<p> </p> +<h3>Changing/clearing the PIM</h3> +<p>The PIM of a volume or for system encryption can be changed or cleared using the change password functionality. The screenshots below shows an example of changing the PIM from the empty default value to a value equal to 3 (this is possible since the password + has more than 20 characters). In order to do so, the user must first tick "Use PIM" checkbox in the "New" section to reveal the PIM field.</p> +<table width="519" style="height:896px; width:519px; margin-left:auto; margin-right:auto"> +<caption><strong>Normal volume case</strong></caption> +<tbody> +<tr> +<td style="text-align:center"><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.png" alt="" width="511" height="436"></td> +</tr> +<tr> +<td> +<p><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.png" alt="" width="511" height="436"></p> +</td> +</tr> +</tbody> +</table> +<h5> </h5> +<table style="margin-left:auto; margin-right:auto"> +<caption><strong>System encryption case</strong></caption> +<tbody> +<tr> +<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.png" alt="" width="501" height="426"></td> +</tr> +<tr> +<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.png" alt="" width="501" height="426"></td> +</tr> +</tbody> +</table> +<p> </p> +<p><a href="VeraCrypt%20Volume%20Format%20Specification.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.png b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.png Binary files differnew file mode 100644 index 00000000..e9a5f6f5 --- /dev/null +++ b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.png diff --git a/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.png b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.png Binary files differnew file mode 100644 index 00000000..b6191005 --- /dev/null +++ b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.png diff --git a/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.png b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.png Binary files differnew file mode 100644 index 00000000..7df9d2ba --- /dev/null +++ b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.png diff --git a/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.png b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.png Binary files differnew file mode 100644 index 00000000..e1bdebae --- /dev/null +++ b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.png diff --git a/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png Binary files differnew file mode 100644 index 00000000..baf11c3f --- /dev/null +++ b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png diff --git a/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.png b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.png Binary files differnew file mode 100644 index 00000000..ba0a5d93 --- /dev/null +++ b/doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.png diff --git a/doc/html/Physical Security.html b/doc/html/Physical Security.html new file mode 100644 index 00000000..fb788f07 --- /dev/null +++ b/doc/html/Physical Security.html @@ -0,0 +1,56 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Physical%20Security.html">Physical Security</a> +</p></div> + +<div class="wikidoc"> +<h1>Physical Security</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If an attacker can physically access the computer hardware <strong style="text-align:left"> +and</strong> you use it after the attacker has physically accessed it, then VeraCrypt may become unable to secure data on the computer.* This is because the attacker may modify the hardware or attach a malicious hardware component to it (such as a hardware + keystroke logger) that will capture the password or encryption key (e.g. when you mount a VeraCrypt volume) or otherwise compromise the security of the computer. Therefore, you must not use VeraCrypt on a computer that an attacker has physically accessed. + Furthermore, you must ensure that VeraCrypt (including its device driver) is not running when the attacker physically accesses the computer. Additional information pertaining to hardware attacks where the attacker has direct physical access is contained in + the section <a href="Unencrypted%20Data%20in%20RAM.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Unencrypted Data in RAM</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Furthermore, even if the attacker cannot physically access the computer hardware <em style="text-align:left"> +directly</em>, he or she may be able to breach the physical security of the computer by remotely intercepting and analyzing emanations from the computer hardware (including the monitor and cables). For example, intercepted emanations from the cable connecting + the keyboard with the computer can reveal passwords you type. It is beyond the scope of this document to list all of the kinds of such attacks (sometimes called TEMPEST attacks) and all known ways to prevent them (such as shielding or radio jamming). It is + your responsibility to prevent such attacks. If you do not, VeraCrypt may become unable to secure data on the computer.</div> +<p><br style="text-align:left"> +</p> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* In this section (<em style="text-align:left">Physical Security</em>), the phrase "data on the computer" means data on internal and external storage devices/media (including removable devices + and network drives) connected to the computer.</span></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Pipelining.html b/doc/html/Pipelining.html new file mode 100644 index 00000000..f50655d2 --- /dev/null +++ b/doc/html/Pipelining.html @@ -0,0 +1,51 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Pipelining.html">Pipelining</a> +</p></div> + +<div class="wikidoc"> +<h1>Pipelining</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +When encrypting or decrypting data, VeraCrypt uses so-called pipelining (asynchronous processing). While an application is loading a portion of a file from a VeraCrypt-encrypted volume/drive, VeraCrypt is automatically decrypting it (in RAM). Thanks to pipelining, + the application does not have wait for any portion of the file to be decrypted and it can start loading other portions of the file right away. The same applies to encryption when writing data to an encrypted volume/drive.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Pipelining allows data to be read from and written to an encrypted drive as fast as if the drive was not encrypted (the same applies to file-hosted and partition-hosted VeraCrypt +<a href="VeraCrypt%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +volumes</a>).*</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: Pipelining is implemented only in the Windows versions of VeraCrypt.</div> +<p> </p> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* Some solid-state drives compress data internally, which appears to increase the actual read/write speed when the data is compressible (for example, text files). However, encrypted data cannot + be compressed (as it appears to consist solely of random "noise" without any compressible patterns). This may have various implications. For example, benchmarking software that reads or writes compressible data (such as sequences of zeroes) will report lower + speeds on encrypted volumes than on unencrypted volumes (to avoid this, use benchmarking software that reads/writes random or other kinds of uncompressible data)</span><span style="text-align:left; font-size:10px; line-height:12px">.</span></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Plausible Deniability.html b/doc/html/Plausible Deniability.html new file mode 100644 index 00000000..2a14c39d --- /dev/null +++ b/doc/html/Plausible Deniability.html @@ -0,0 +1,77 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Plausible%20Deniability.html">Plausible Deniability</a> +</p></div> + +<div class="wikidoc"> +<h1>Plausible Deniability</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +In case an adversary forces you to reveal your password, VeraCrypt provides and supports two kinds of plausible deniability:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Hidden volumes (see the section <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html"> +Hidden Volume</a>) and hidden operating systems (see the section <a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +<strong style="text-align:left">Hidden Operating System</strong></a>). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Until decrypted, a VeraCrypt partition/device appears to consist of nothing more than random data (it does not contain any kind of "signature"). Therefore, it should be impossible to prove that a partition or a device is a VeraCrypt volume or that it has been + encrypted (provided that the security requirements and precautions listed in the chapter +<a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions</a> are followed). A possible plausible explanation for the existence of a partition/device containing solely random data is that you have wiped (securely erased) the content of the partition/device using one of the tools + that erase data by overwriting it with random data (in fact, VeraCrypt can be used to securely erase a partition/device too, by creating an empty encrypted partition/device-hosted volume within it). However, you need to prevent data leaks (see the section +<a href="Data%20Leaks.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Data Leaks</a>) and also note that, for <a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +system encryption</a>, the first drive track contains the (unencrypted) VeraCrypt Boot Loader, which can be easily identified as such (for more information, see the chapter +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +System Encryption</a>). When using <a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +system encryption</a>, plausible deniability can be achieved by creating a hidden operating system (see the section +<a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a>).<br style="text-align:left"> +<br style="text-align:left"> +Although file-hosted VeraCrypt volumes (containers) do not contain any kind of "signature" either (until decrypted, they appear to consist solely of random data), they cannot provide this kind of plausible deniability, because there is practically no plausible + explanation for the existence of a file containing solely random data. However, plausible deniability can still be achieved with a file-hosted VeraCrypt volume (container) by creating a hidden volume within it (see above). +</li></ol> +<h4 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:12px; margin-bottom:1px"> +<br style="text-align:left"> +Notes</h4> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +When formatting a hard disk partition as a VeraCrypt volume (or encrypting a partition in place), the partition table (including the partition type) is +<em style="text-align:left">never</em> modified (no VeraCrypt "signature" or "ID" is written to the partition table). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +There are methods to find files or devices containing random data (such as VeraCrypt volumes). Note, however, that this should +<em style="text-align:left">not </em>affect plausible deniability in any way. The adversary still should not be able to +<em style="text-align:left">prove</em> that the partition/device is a VeraCrypt volume or that the file, partition, or device, contains a hidden VeraCrypt volume (provided that you follow the security requirements and precautions listed in the chapter +<a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions</a> and in the subsection <a href="Security%20Requirements%20for%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions Pertaining to Hidden Volumes</a>). </li></ul> +<p> </p> +<p><a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div><div class="ClearBoth"></div></body></html> diff --git a/doc/html/Portable Mode.html b/doc/html/Portable Mode.html new file mode 100644 index 00000000..3ae2d3c8 --- /dev/null +++ b/doc/html/Portable Mode.html @@ -0,0 +1,87 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Portable%20Mode.html">Portable Mode</a> +</p></div> + +<div class="wikidoc"> +<h1>Portable Mode</h1> +<p>VeraCrypt can run in so-called portable mode, which means that it does not have to be installed on the operating system under which it is run. However, there are two things to keep in mind:</p> +<ol> +<li>You need administrator privileges in order to be able to run VeraCrypt in portable mode (for the reasons, see the chapter +<a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html"> +<em>Using VeraCrypt Without Administrator Privileges</em></a>). +<table border="2"> +<tbody> +<tr> +<td style="text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; color:#ff0000; padding:15px; border:1px solid #000000"> +Note: No matter what kind of software you use, as regards personal privacy in most cases, it is +<em>not</em> safe to work with sensitive data under systems where you do not have administrator privileges, as the administrator can easily capture and copy your sensitive data, including passwords and keys.</td> +</tr> +</tbody> +</table> +</li><li>After examining the registry file, it may be possible to tell that VeraCrypt was run (and that a VeraCrypt volume was mounted) on a Windows system even if it had been run in portable mode. +</li></ol> +<p><strong>Note</strong>: If that is a problem, see <a href="FAQ.html#notraces" target="_blank.html"> +this question</a> in the FAQ for a possible solution.<br> +<br> +There are two ways to run VeraCrypt in portable mode:</p> +<ol> +<li>After you extract files from the VeraCrypt self-extracting package, you can directly run +<em>VeraCrypt.exe</em>.<br> +<br> +Note: To extract files from the VeraCrypt self-extracting package, run it, and then select +<em>Extract</em> (instead of <em>Install</em>) on the second page of the VeraCrypt Setup wizard. +</li><li>You can use the <em>Traveler Disk Setup</em> facility to prepare a special traveler disk and launch VeraCrypt from there. +</li></ol> +<p>The second option has several advantages, which are described in the following sections in this chapter.</p> +<p>Note: When running in ‘portable’ mode, the VeraCrypt driver is unloaded when it is no longer needed (e.g., when all instances of the main application and/or of the Volume Creation Wizard are closed and no VeraCrypt volumes are mounted). However, + if you force dismount on a VeraCrypt volume when VeraCrypt runs in portable mode, or mount a writable NTFS-formatted volume on Windows Vista or later, the VeraCrypt driver may +<em>not</em> be unloaded when you exit VeraCrypt (it will be unloaded only when you shut down or restart the system). This prevents various problems caused by a bug in Windows (for instance, it would be impossible to start VeraCrypt again as long as there are + applications using the dismounted volume).</p> +<h3>Tools -> Traveler Disk Setup</h3> +<p>You can use this facility to prepare a special traveler disk and launch VeraCrypt from there. Note that VeraCrypt ‘traveler disk’ is +<em>not</em> a VeraCrypt volume but an <em>unencrypted</em> volume. A ‘traveler disk’ contains VeraCrypt executable files and optionally the ‘autorun.inf’ script (see the section +<em>AutoRun Configuration</em> below). After you select <em>Tools -> Traveler Disk Setup</em>, the +<em>Traveler Disk Setup</em> dialog box should appear. Some of the parameters that can be set within the dialog deserve further explanation:</p> +<h4>Include VeraCrypt Volume Creation Wizard</h4> +<p>Check this option, if you need to create new VeraCrypt volumes using VeraCrypt run from the traveler disk you will create. Unchecking this option saves space on the traveler disk.</p> +<h4>AutoRun Configuration (autorun.inf)</h4> +<p>In this section, you can configure the ‘traveler disk’ to automatically start VeraCrypt or mount a specified VeraCrypt volume when the ‘traveler disk’ is inserted. This is accomplished by creating a special script file called ‘<em>autorun.inf</em>’ + on the traveler disk. This file is automatically executed by the operating system each time the ‘traveler disk’ is inserted.<br> +<br> +Note, however, that this feature only works for removable storage devices such as CD/DVD (Windows XP SP2, Windows Vista, or a later version of Windows is required for this feature to work on USB memory sticks) and only when it is enabled in the operating system. + Depending on the operating system configuration, these auto-run and auto-mount features may work only when the traveler disk files are created on a non-writable CD/DVD-like medium (which is not a bug in VeraCrypt but a limitation of Windows).<br> +<br> +Also note that the ‘<em>autorun.inf</em>’ file must be in the root directory (i.e., for example +<em>G:\</em>, <em>X:\</em>, or <em>Y:\</em> etc.) of an <strong>unencrypted </strong> +disk in order for this feature to work.</p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Preface.html b/doc/html/Preface.html new file mode 100644 index 00000000..95bfc59b --- /dev/null +++ b/doc/html/Preface.html @@ -0,0 +1,43 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Preface.html">Preface</a> +</p> +</div> + +<div class="wikidoc"> +<h1>Preface</h1> +<p> +Please note that although most chapters of this documentation apply generally to all versions of VeraCrypt, some sections are primarily aimed at users of the Windows versions of VeraCrypt. Hence, such sections may contain information that is inappropriate in regards to the Mac OS X and Linux versions of VeraCrypt. +</p> +</div> + +</body></html>
\ No newline at end of file diff --git a/doc/html/Program Menu.html b/doc/html/Program Menu.html new file mode 100644 index 00000000..a142755e --- /dev/null +++ b/doc/html/Program Menu.html @@ -0,0 +1,205 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Main%20Program%20Window.html">Main Program Window</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Program%20Menu.html">Program Menu</a> +</p></div> + +<div class="wikidoc"> +<h2>Program Menu</h2> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>Note: To save space, only the menu items that are not self-explanatory are described in this documentation.</p> +<h3>Volumes -> Auto-Mount All Device-Hosted Volumes</h3> +<p>See the section <a href="Main%20Program%20Window.html"> +<em>Auto-Mount Devices.</em></a></p> +<h3>Volumes -> Dismount All Mounted Volumes</h3> +<p>See the section <a href="Main%20Program%20Window.html"> +<em>Dismount All.</em></a></p> +<h3>Volumes -> Change Volume Password</h3> +<p>Allows changing the password of the currently selected VeraCrypt volume (no matter whether the volume is hidden or standard). Only the header key and the secondary header key (XTS mode) are changed – the master key remains unchanged. This function + re-encrypts the volume header using<br> +<br> +a header encryption key derived from a new password. Note that the volume header contains the master encryption key with which the volume is encrypted. Therefore, the data stored on the volume will +<em>not</em> be lost after you use this function (password change will only take a few seconds).<br> +<br> +To change a VeraCrypt volume password, click on <em>Select File</em> or <em>Select Device</em>, then select the volume, and from the +<em>Volumes</em> menu select <em>Change Volume Password</em>.<br> +<br> +Note: For information on how to change a password used for pre-boot authentication, please see the section +<em>System -> Change Password</em>.<br> +<br> +See also the chapter <a href="Security%20Requirements%20and%20Precautions.html"> +<em>Security Requirements and Precautions</em></a>.</p> +<div style="margin-left:50px"> +<h4>PKCS-5 PRF</h4> +<p>In this field you can select the algorithm that will be used in deriving new volume header keys (for more information, see the section +<a href="Header%20Key%20Derivation.html"> +<em>Header Key Derivation, Salt, and Iteration Count</em></a>) and in generating the new salt (for more information, see the section +<a href="Random%20Number%20Generator.html"> +<em>Random Number Generator</em></a>).<br> +<br> +Note: When VeraCrypt re-encrypts a volume header, the original volume header is first overwritten many times (3, 7, 35 or 256 depending on the user choice) with random data to prevent adversaries from using techniques such as magnetic force microscopy or magnetic + force scanning tunneling microscopy [17] to recover the overwritten header (however, see also the chapter +<a href="Security%20Requirements%20and%20Precautions.html"> +<em>Security Requirements and Precautions</em></a>).</p> +</div> +<h3>Volumes -> Set Header Key Derivation Algorithm</h3> +<p>This function allows you to re-encrypt a volume header with a header key derived using a different PRF function (for example, instead of HMAC-RIPEMD-160 you could use HMAC-Whirlpool). Note that the volume header contains the master encryption key with which + the volume is encrypted. Therefore, the data stored on the volume will <em>not</em> be lost after you use this function. For more information, see the section +<a href="Header%20Key%20Derivation.html"> +<em>Header Key Derivation, Salt, and Iteration Count</em></a>.<br> +<br> +Note: When VeraCrypt re-encrypts a volume header, the original volume header is first overwritten many times (3, 7, 35 or 256 depending on the user choice) with random data to prevent adversaries from using techniques such as magnetic force microscopy or magnetic + force scanning tunneling microscopy [17] to recover the overwritten header (however, see also the chapter +<a href="Security%20Requirements%20and%20Precautions.html"> +<em>Security Requirements and Precautions</em></a>).</p> +<h3>Volumes -> Add/Remove Keyfiles to/from Volume</h3> +<h3>Volumes -> Remove All Keyfiles from Volume</h3> +<p>See the chapter <a href="Keyfiles.html"> +<em>Keyfiles.</em></a></p> +<h3>Favorites -> Add Mounted Volume to Favorites Favorites -> Organize Favorite Volumes Favorites -> Mount Favorites Volumes</h3> +<p>See the chapter <a href="Favorite%20Volumes.html"> +<em>Favorite Volumes</em></a>.</p> +<h3>Favorites -> Add Mounted Volume to System Favorites</h3> +<h3>Favorites -> Organize System Favorite Volumes</h3> +<p>See the chapter <a href="System%20Favorite%20Volumes.html"> +<em>System Favorite Volumes</em></a>.</p> +<h3>System -> Change Password</h3> +<p>Changes the password used for pre-boot authentication (see the chapter <em>System Encryption</em>). WARNING: Your VeraCrypt Rescue Disk allows you to restore key data if it is damaged. By doing so, you also restore the password that was valid when the VeraCrypt + Rescue Disk was created. Therefore, whenever you change the password, you should destroy your VeraCrypt Rescue Disk and create a new one (select +<em>System</em> -> <em>Create Rescue Disk</em>). Otherwise, an attacker could decrypt your system partition/drive using the old password (if he finds the old VeraCrypt Rescue Disk and uses it to restore the key data). See also the chapter +<a href="Security%20Requirements%20and%20Precautions.html"> +<em>Security Requirements and Precautions</em></a>.<br> +<br> +For more information on changing a password, please see the section <em>Volumes -> Change Volume Password</em> above.</p> +<h3>System -> Mount Without Pre-Boot Authentication</h3> +<p>Check this option, if you need to mount a partition that is within the key scope of system encryption without pre-boot authentication. For example, if you need to mount a partition located on the encrypted system drive of another operating system that is + not running. This can be useful e.g. when you need to back up or repair an operating system encrypted by VeraCrypt (from within another operating system).</p> +<p>Note 1: If you need to mount multiple partitions at once, click <em>‘Auto-Mount Devices</em>’, then click ‘<em>Mount Options</em>’ and enable the option ‘<em>Mount partition using system encryption without pre-boot authentication</em>’.<br> +<br> +Please note you cannot use this function to mount extended (logical) partitions that are located on an entirely encrypted system drive.</p> +<h3>Tools -> Clear Volume History</h3> +<p>Clears the list containing the file names (if file-hosted) and paths of the last twenty successfully mounted volumes.</p> +<h3>Tools -> Traveler Disk Setup</h3> +<p>See the chapter <a href="Portable%20Mode.html"> +<em>Portable Mode.</em></a></p> +<h3>Tools -> Keyfile Generator</h3> +<p>See section <em>Tools -> Keyfile Generator</em> in the chapter <a href="Keyfiles.html"> +<em>Keyfiles.</em></a></p> +<h3 id="tools-backup-volume-header">Tools -> Backup Volume Header</h3> +<h3 id="tools-restore-volume-header">Tools -> Restore Volume Header</h3> +<p>If the header of a VeraCrypt volume is damaged, the volume is, in most cases, impossible to mount. Therefore, each volume created by VeraCrypt (except system partitions) contains an embedded backup header, located at the end of the volume. For extra safety, + you can also create external volume header backup files. To do so, click <em>Select Device</em> or +<em>Select File</em>, select the volume, select <em>Tools</em> -> <em>Backup Volume Header</em>, and then follow the instructions.</p> +<p>Note: For system encryption, there is no backup header at the end of the volume. For non-system volumes, a shrink operation is done first to ensure that all data are put at the beginning of the volume, leaving all free space at the end so that we have a + place to put the backup header. For system partitions, we can't perform this needed shrink operation while Windows is running and so the backup header can't be created at the end of the partition. The alternative way in the case of system encryption is the + use of the <a href="VeraCrypt%20Rescue%20Disk.html"> +Rescue Disk</a>.</p> +<p>Note: A backup header (embedded or external) is <em>not</em> a copy of the original volume header because it is encrypted with a different header key derived using a different salt (see the section +<a href="Header%20Key%20Derivation.html"> +<em>Header Key Derivation, Salt, and Iteration Count</em></a>). When the volume password and/or keyfiles are changed, or when the header is restored from the embedded (or an external) header backup, both the volume header and the backup header (embedded in + the volume) are re-encrypted with header keys derived using newly generated salts (the salt for the volume header is different from the salt for the backup header). Each salt is generated by the VeraCrypt random number generator (see the section +<a href="Random%20Number%20Generator.html"> +<em>Random Number Generator</em></a>).</p> +<p>Both types of header backups (embedded and external) can be used to repair a damaged volume header. To do so, click +<em>Select Device</em> or <em>Select File</em>, select the volume, select <em>Tools</em> -> +<em>Restore Volume Header</em>, and then follow the instructions.<br> +<br> +WARNING: Restoring a volume header also restores the volume password that was valid when the backup was created. Moreover, if keyfile(s) are/is necessary to mount a volume when the backup is created, the same keyfile(s) will be necessary to mount the volume + again after the volume header is restored. For more information, see the section +<a href="Encryption%20Scheme.html"><em>Encryption Scheme</em></a> in the chapter +<a href="Technical%20Details.html"><em>Technical Details</em></a>.<br> +<br> +After you create a volume header backup, you might need to create a new one only when you change the volume password and/or keyfiles. Otherwise, the volume header remains unmodified so the volume header backup remains up-to-date.</p> +<p>Note: Apart from salt (which is a sequence of random numbers), external header backup files do not contain any unencrypted information and they cannot be decrypted without knowing the correct password and/or supplying the correct keyfile(s). For more information, + see the chapter <a href="Technical%20Details.html"> +<em>Technical Details</em></a>.</p> +<p>When you create an external header backup, both the standard volume header and the area where a hidden volume header can be stored is backed up, even if there is no hidden volume within the volume (to preserve plausible deniability of hidden volumes). If + there is no hidden volume within the volume, the area reserved for the hidden volume header in the backup file will be filled with random data (to preserve plausible deniability).<br> +<br> +When <em>restoring</em> a volume header, you need to choose the type of volume whose header you wish to restore (a standard or hidden volume). Only one volume header can be restored at a time. To restore both headers, you need to use the function twice (<em>Tools</em> + -> <em>Restore Volume Header</em>). You will need to enter the correct password (and/or to supply the correct keyfiles) that was/were valid when the volume header backup was created. The password (and/or keyfiles) will also automatically determine the type + of the volume header to restore, i.e. standard or hidden (note that VeraCrypt determines the type through the process of trial and error).<br> +<br> +Note: If the user fails to supply the correct password (and/or keyfiles) twice in a row when trying to mount a volume, VeraCrypt will automatically try to mount the volume using the embedded backup header (in addition to trying to mount it using the primary + header) each subsequent time that the user attempts to mount the volume (until he or she clicks +<em>Cancel</em>). If VeraCrypt fails to decrypt the primary header but it successfully decrypts the embedded backup header at the same time, the volume is mounted and the user is warned that the volume header is damaged (and informed as to how to repair it).</p> +<h3 id="Settings-Performance">Settings -> Performance and Driver Options</h3> +<p>Invokes the Performance dialog window, where you can change enable or disable AES Hardware acceleration and thread based parallelization. You can also change the following driver option:</p> +<h4>Enable extended disk control codes support</h4> +<p>If enabled, VeraCrypt driver will support returning extended technical information about mounted volumes through IOCTL_STORAGE_QUERY_PROPERTY control code. This control code is always supported by physical drives and it can be required by some applications + to get technical information about a drive (e.g. the Windows fsutil program uses this control code to get the physical sector size of a drive.).<br> +Enabling this option brings VeraCrypt volumes behavior much closer to that of physical disks and if it is disabled, applications can easily distinguish between physical disks and VeraCrypt volumes since sending this control code to a VeraCrypt volume will result + in an error.<br> +Disable this option if you experience stability issues (like volume access issues or system BSOD) which can be caused by poorly written software and drivers.</p> +<h3>Settings -> Preferences</h3> +<p>Invokes the Preferences dialog window, where you can change, among others, the following options:</p> +<h4>Wipe cached passwords on exit</h4> +<p>If enabled, passwords (which may also contain processed keyfile contents) cached in driver memory will be cleared when VeraCrypt exits.</p> +<h4>Cache passwords in driver memory</h4> +<p>When checked, passwords and/or processed keyfile contents for up to last four successfully mounted VeraCrypt volumes are cached. This allows mounting volumes without having to type their passwords (and selecting keyfiles) repeatedly. VeraCrypt never saves + any password to a disk (however, see the chapter <a href="Security%20Requirements%20and%20Precautions.html"> +<em>Security Requirements and Precautions</em></a>). Password caching can be enabled/disabled in the Preferences (<em>Settings</em> -> +<em>Preferences</em>) and in the password prompt window. If the system partition/drive is encrypted, caching of the pre-boot authentication password can be enabled or disabled in the system encryption settings (<em>Settings</em> > ‘<em>System Encryption</em>’).</p> +<h4>Temporary Cache password during "Mount Favorite Volumes" operations</h4> +<p>When this option is unchecked (this is the default), VeraCrypt will display the password prompt window for every favorite volume during the execution of the "Mount Favorite Volumes" operation and each password is erased once the volume is mounted (unless + password caching is enabled).<br> +<br> +If this option is checked and if there are two or more favorite volumes, then during the operation "Mount Favorite Volumes", VeraCrypt will first try the password of the previous favorite and if it doesn't work, it will display password prompt window. This + logic applies starting from the second favorite volume onwards. Once all favorite volumes are processed, the password is erased from memory.</p> +<p>This option is useful when favorite volumes share the same password since the password prompt window will only be displayed once for the first favorite and VeraCrypt will automatically mount all subsequent favorites.</p> +<p>Please note that since we can't assume that all favorites use the same PRF (hash) nor the same TrueCrypt mode, VeraCrypt uses Autodetection for the PRF of subsequent favorite volumes and it tries both TrueCryptMode values (false, true) which means that the + total mounting time will be slower compared to the individual mounting of each volume with the manual selection of the correct PRF and the correct TrueCryptMode.</p> +<h4>Open Explorer window for successfully mounted volume</h4> +<p>If this option is checked, then after a VeraCrypt volume has been successfully mounted, an Explorer window showing the root directory of the volume (e.g., T:\) will be automatically opened.</p> +<h4>Use a different taskbar icon when there are mounted volumes</h4> +<p>If enabled, the appearance of the VeraCrypt taskbar icon (shown within the system tray notification area) is different while a VeraCrypt volume is mounted, except the following:</p> +<ul> +<li>Partitions/drives within the key scope of active system encryption (e.g., a system partition encrypted by VeraCrypt, or a non-system partition located on a system drive encrypted by VeraCrypt, mounted when the encrypted operating system is running). +</li><li>VeraCrypt volumes that are not fully accessible to the user account (e.g. a volume mounted from within another user account). +</li><li>VeraCrypt volumes that are not displayed in the VeraCrypt application window. For example, system favorite volumes attempted to be dismounted by an instance of VeraCrypt without administrator privileges when the option '<em>Allow only administrators to + view and dismount system favorite volumes in VeraCrypt</em>' is enabled. </li></ul> +<h4>VeraCrypt Background Task – Enabled</h4> +<p>See the chapter <a href="VeraCrypt%20Background%20Task.html"> +<em>VeraCrypt Background Task</em></a>.</p> +<h4>VeraCrypt Background Task – Exit when there are no mounted volumes</h4> +<p>If this option is checked, the VeraCrypt background task automatically and silently exits as soon as there are no mounted VeraCrypt volumes. For more information, see the chapter +<a href="VeraCrypt%20Background%20Task.html"> +<em>VeraCrypt Background Task</em></a>. Note that this option cannot be disabled when VeraCrypt runs in portable mode.</p> +<h4>Auto-dismount volume after no data has been read/written to it for</h4> +<p>After no data has been written/read to/from a VeraCrypt volume for <em>n</em> minutes, the volume is automatically dismounted.</p> +<h4>Force auto-dismount even if volume contains open files or directories</h4> +<p>This option applies only to auto-dismount (not to regular dismount). It forces dismount (without prompting) on the volume being auto-dismounted in case it contains open files or directories (i.e., file/directories that are in use by the system or applications).</p> +<p> </p> +<p><a href="Mounting%20VeraCrypt%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Protection of Hidden Volumes.html b/doc/html/Protection of Hidden Volumes.html new file mode 100644 index 00000000..7d489d56 --- /dev/null +++ b/doc/html/Protection of Hidden Volumes.html @@ -0,0 +1,127 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Plausible%20Deniability.html">Plausible Deniability</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hidden%20Volume.html">Hidden Volume</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Protection%20of%20Hidden%20Volumes.html">Protection of Hidden Volumes</a> +</p></div> + +<div class="wikidoc"> +<h1>Protection of Hidden Volumes Against Damage</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If you mount a VeraCrypt volume within which there is a <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden volume</a>, you may <em style="text-align:left">read</em> data stored on the (outer) volume without any risk. However, if you (or the operating system) need to +<em style="text-align:left">save</em> data to the outer volume, there is a risk that the hidden volume will get damaged (overwritten). To prevent this, you should protect the hidden volume in a way described in this section.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +When mounting an outer volume, type in its password and before clicking <em style="text-align:left"> +OK, </em>click <em style="text-align:left">Mount Options</em>:</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<img src="Protection of Hidden Volumes_Image_027.jpg" alt="VeraCrypt GUI" width="499" height="205"></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> + </div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +In the <em style="text-align:left">Mount Options </em>dialog window, enable the option '<em style="text-align:left">Protect hidden volume against damage caused by writing to outer volume</em> '. In the '<em style="text-align:left">Password to hidden volume</em>' + input field, type the password for the hidden volume. Click <em style="text-align:left"> +OK </em>and, in the main password entry dialog, click <em style="text-align:left"> +OK</em>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<img src="Protection of Hidden Volumes_Image_028.jpg" alt="Mounting with hidden protection" width="432" height="402"></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<br style="text-align:left"> +Both passwords must be correct; otherwise, the outer volume will not be mounted. When hidden volume protection is enabled, VeraCrypt does +<em style="text-align:left">not</em> actually mount the hidden volume. It only decrypts its header (in RAM) and retrieves information about the size of the hidden volume (from the decrypted header). Then, the outer volume is mounted and any attempt to save + data to the area of the hidden volume will be rejected (until the outer volume is dismounted). +<strong style="text-align:left">Note that VeraCrypt never modifies the filesystem (e.g., information about allocated clusters, amount of free space, etc.) within the outer volume in any way. As soon as the volume is dismounted, the protection is lost. When + the volume is mounted again, it is not possible to determine whether the volume has used hidden volume protection or not. The hidden volume protection can be activated only by users who supply the correct password (and/or keyfiles) for the hidden volume (each + time they mount the outer volume). <br style="text-align:left"> +</strong><br style="text-align:left"> +As soon as a write operation to the hidden volume area is denied/prevented (to protect the hidden volume), the entire host volume (both the outer and the hidden volume) becomes write-protected until dismounted (the VeraCrypt driver reports the 'invalid parameter' + error to the system upon each attempt to write data to the volume). This preserves plausible deniability (otherwise certain kinds of inconsistency within the file system could indicate that this volume has used hidden volume protection). When damage to hidden + volume is prevented, a warning is displayed (provided that the VeraCrypt Background Task is enabled – see the chapter +<a href="VeraCrypt%20Background%20Task.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Background Task</a>). Furthermore, the type of the mounted outer volume displayed in the main window changes to '<em style="text-align:left">Outer(!)</em> ':</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<img src="Protection of Hidden Volumes_Image_029.jpg" alt="VeraCrypt GUI" width="579" height="498"></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<br style="text-align:left"> +Moreover, the field <em style="text-align:left">Hidden Volume Protected </em>in the +<em style="text-align:left">Volume Properties </em>dialog window says:<br style="text-align:left"> +'<em style="text-align:left">Yes (damage prevented!)</em>'<em style="text-align:left">.</em><br style="text-align:left"> +<br style="text-align:left"> +Note that when damage to hidden volume is prevented, <em style="text-align:left"> +no</em> information about the event is written to the volume. When the outer volume is dismounted and mounted again, the volume properties will +<em style="text-align:left">not </em>display the string "<em style="text-align:left">damage prevented</em>".<em style="text-align:left"><br style="text-align:left"> +</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +There are several ways to check that a hidden volume is being protected against damage:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A confirmation message box saying that hidden volume is being protected is displayed after the outer volume is mounted (if it is not displayed, the hidden volume is not protected!). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +In the <em style="text-align:left">Volume Properties </em>dialog, the field <em style="text-align:left"> +Hidden Volume Protected </em>says '<em style="text-align:left">Yes</em>': </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The type of the mounted outer volume is <em style="text-align:left">Outer</em>: </li></ol> +<p><img src="Protection of Hidden Volumes_Image_030.jpg" alt="VeraCrypt GUI" width="579" height="232"></p> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left"><br style="text-align:left"> +<strong style="text-align:left">Important: You are the only person who can mount your outer volume with the hidden volume protection enabled (since nobody else knows your hidden volume password). When an adversary asks you to mount an outer volume, you of course + must </strong></em><strong style="text-align:left">not</strong><em style="text-align:left"><strong style="text-align:left"> mount it with the hidden volume protection enabled. You must mount it as a normal volume (and then VeraCrypt will not show the volume + type "Outer" but "Normal"). The reason is that, during the time when an outer volume is mounted with the hidden volume protection enabled, the adversary +</strong></em><strong style="text-align:left">can</strong><em style="text-align:left"><strong style="text-align:left"> find out that a hidden volume exists within the outer volume (he/she will be able to find it out until the volume is dismounted and possibly + even some time after the computer has been powered off - see <a href="Unencrypted%20Data%20in%20RAM.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Unencrypted Data in RAM</a>).</strong></em> <br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<em style="text-align:left">Warning</em>: Note that the option '<em style="text-align:left">Protect hidden volume against damage caused by writing to outer volume</em>' in the +<em style="text-align:left">Mount Options </em>dialog window is automatically disabled after a mount attempt is completed, no matter whether it is successful or not (all hidden volumes that are already being protected will, of course, continue to be protected). + Therefore, you need to check that option <em style="text-align:left">each </em>time you attempt to mount the outer volume (if you wish the hidden volume to be protected):<br style="text-align:left"> +<br style="text-align:left"> +<img src="Protection of Hidden Volumes_Image_031.jpg" alt="VeraCrypt GUI" width="432" height="402"></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +If you want to mount an outer volume and protect a hidden volume within using cached passwords, then follow these steps: Hold down the +<em style="text-align:left">Control </em>(<em style="text-align:left">Ctrl</em>) key when clicking +<em style="text-align:left">Mount </em>(or select <em style="text-align:left">Mount with Options +</em>from the <em style="text-align:left">Volumes </em>menu). This will open the <em style="text-align:left"> +Mount Options </em>dialog. Enable the option '<em style="text-align:left">Protect hidden volume against damage caused by writing to outer volume</em>' and leave the password box empty. Then click +<em style="text-align:left">OK</em>.</div> +<p>If you need to mount an outer volume and you know that you will not need to save any data to it, then the most comfortable way of protecting the hidden volume against damage is mounting the outer volume as read-only (see the section +<a href="Mounting%20VeraCrypt%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Mount Options</a>).</p> +<p> </p> +<p><a href="Security%20Requirements%20for%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Protection of Hidden Volumes_Image_027.jpg b/doc/html/Protection of Hidden Volumes_Image_027.jpg Binary files differnew file mode 100644 index 00000000..69ed2453 --- /dev/null +++ b/doc/html/Protection of Hidden Volumes_Image_027.jpg diff --git a/doc/html/Protection of Hidden Volumes_Image_028.jpg b/doc/html/Protection of Hidden Volumes_Image_028.jpg Binary files differnew file mode 100644 index 00000000..5a44bb07 --- /dev/null +++ b/doc/html/Protection of Hidden Volumes_Image_028.jpg diff --git a/doc/html/Protection of Hidden Volumes_Image_029.jpg b/doc/html/Protection of Hidden Volumes_Image_029.jpg Binary files differnew file mode 100644 index 00000000..1185714c --- /dev/null +++ b/doc/html/Protection of Hidden Volumes_Image_029.jpg diff --git a/doc/html/Protection of Hidden Volumes_Image_030.jpg b/doc/html/Protection of Hidden Volumes_Image_030.jpg Binary files differnew file mode 100644 index 00000000..fc35b2e6 --- /dev/null +++ b/doc/html/Protection of Hidden Volumes_Image_030.jpg diff --git a/doc/html/Protection of Hidden Volumes_Image_031.jpg b/doc/html/Protection of Hidden Volumes_Image_031.jpg Binary files differnew file mode 100644 index 00000000..976a66dc --- /dev/null +++ b/doc/html/Protection of Hidden Volumes_Image_031.jpg diff --git a/doc/html/RIPEMD-160.html b/doc/html/RIPEMD-160.html new file mode 100644 index 00000000..663b073d --- /dev/null +++ b/doc/html/RIPEMD-160.html @@ -0,0 +1,45 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hash%20Algorithms.html">Hash Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="RIPEMD-160.html">RIPEMD-160</a> +</p></div> + +<div class="wikidoc"> +<h1>RIPEMD-160</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +RIPEMD-160, published in 1996, is a hash algorithm designed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel in an open academic community. The size of the output of RIPEMD-160 is 160 bits. RIPEMD-160 is a strengthened version of the RIPEMD hash algorithm + that was developed in the framework of the European Union's project RIPE (<em style="text-align:left">RACE Integrity Primitives Evaluation</em>), 1988-1992. RIPEMD-160 was adopted by the International Organization for Standardization (ISO) and the IEC in the + ISO/IEC 10118-3:2004 international standard [21].</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="SHA-256.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Random Number Generator.html b/doc/html/Random Number Generator.html new file mode 100644 index 00000000..cadc1716 --- /dev/null +++ b/doc/html/Random Number Generator.html @@ -0,0 +1,93 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Random%20Number%20Generator.html">Random Number Generator</a> +</p></div> + +<div class="wikidoc"> +<h1>Random Number Generator</h1> +<p>The VeraCrypt random number generator (RNG) is used to generate the master encryption key, the secondary key (XTS mode), salt, and keyfiles. It creates a pool of random values in RAM (memory). The pool, which is 320 bytes long, is filled with data from the + following sources:</p> +<ul> +<li>Mouse movements </li><li>Keystrokes </li><li><em>Mac OS X and Linux</em>: Values generated by the built-in RNG (both <em>/dev/random</em> and<em>/dev/urandom</em>) +</li><li><em>MS Windows only</em>: MS Windows CryptoAPI (collected regularly at 500-ms interval) +</li><li><em>MS Windows only</em>: Network interface statistics (NETAPI32) </li><li><em>MS Windows only</em>: Various Win32 handles, time variables, and counters (collected regularly at 500-ms interval) +</li></ul> +<p>Before a value obtained from any of the above-mentioned sources is written to the pool, it is divided into individual bytes (e.g., a 32-bit number is divided into four bytes). These bytes are then individually written to the pool with the modulo 2<sup>8</sup> + addition operation (not by replacing the old values in the pool) at the position of the pool cursor. After a byte is written, the pool cursor position is advanced by one byte. When the cursor reaches the end of the pool, its position is set to the beginning + of the pool. After every 16<sup>th</sup> byte written to the pool, the pool mixing function is automatically applied to the entire pool (see below).</p> +<h2>Pool Mixing Function</h2> +<p>The purpose of this function is to perform diffusion [2]. Diffusion spreads the influence of individual “raw” input bits over as much of the pool state as possible, which also hides statistical relationships. After every 16<sup>th</sup> byte + written to the pool, this function is applied to the entire pool.</p> +<p>Description of the pool mixing function:</p> +<ol> +<li>Let <em>R</em> be the randomness pool. </li><li>Let <em>H</em> be the hash function selected by the user (SHA-512, RIPEMD-160, or Whirlpool). +</li><li><em>l</em> = byte size of the output of the hash function <em>H</em> (i.e., if +<em>H</em> is RIPEMD-160, then <em>l</em> = 20; if <em>H</em> is SHA-512, <em>l</em> = 64) +</li><li><em>z</em> = byte size of the randomness pool <em>R </em>(320 bytes) </li><li><em>q</em> = <em>z</em> / <em>l</em> – 1 (e.g., if <em>H</em> is Whirlpool, then +<em>q</em> = 4) </li><li>Ris divided intol-byte blocksB0...Bq. +<p>For 0 ≤ i ≤ q (i.e., for each block B) the following steps are performed:</p> +<ol type="a"> +<li><em>M = H</em> (<em>B</em>0 || <em>B</em>1 || ... || <em>B</em>q) [i.e., the randomness pool is hashed using the hash function H, which produces a hash M] +</li><li>Bi = Bi ^ M </li></ol> +</li><li><em>R = B</em>0 || <em>B</em>1 || ... || <em>B</em>q </li></ol> +<p>For example, if <em>q</em> = 1, the randomness pool would be mixed as follows:</p> +<ol> +<li>(<em>B</em>0 || <em>B</em>1) = <em>R</em> </li><li><em>B</em>0 = <em>B</em>0 ^ <em>H</em>(<em>B</em>0 || <em>B</em>1) </li><li><em>B</em>1 = <em>B</em>1 ^ <em>H</em>(<em>B</em>0 || <em>B</em>1) </li><li><em>R</em> = <em>B</em>0 || <em>B</em>1 </li></ol> +<h2>Generated Values</h2> +<p>The content of the RNG pool is never directly exported (even when VeraCrypt instructs the RNG to generate and export a value). Thus, even if the attacker obtains a value generated by the RNG, it is infeasible for him to determine or predict (using the obtained + value) any other values generated by the RNG during the session (it is infeasible to determine the content of the pool from a value generated by the RNG).</p> +<p>The RNG ensures this by performing the following steps whenever VeraCrypt instructs it to generate and export a value:</p> +<ol> +<li>Data obtained from the sources listed above is added to the pool as described above. +</li><li>The requested number of bytes is copied from the pool to the output buffer (the copying starts from the position of the pool cursor; when the end of the pool is reached, the copying continues from the beginning of the pool; if the requested number of bytes + is greater than the size of the pool, no value is generated and an error is returned). +</li><li>The state of each bit in the pool is inverted (i.e., 0 is changed to 1, and 1 is changed to 0). +</li><li>Data obtained from some of the sources listed above is added to the pool as described above. +</li><li>The content of the pool is transformed using the pool mixing function. Note: The function uses a cryptographically secure one-way hash function selected by the user (for more information, see the section +<em>Pool Mixing Function</em> above). </li><li>The transformed content of the pool is XORed into the output buffer as follows: +<ol type="a"> +<li>The output buffer write cursor is set to 0 (the first byte of the buffer). </li><li>The byte at the position of the pool cursor is read from the pool and XORed into the byte in the output buffer at the position of the output buffer write cursor. +</li><li>The pool cursor position is advanced by one byte. If the end of the pool is reached, the cursor position is set to 0 (the first byte of the pool). +</li><li>The position of the output buffer write cursor is advanced by one byte. </li><li>Steps b–d are repeated for each remaining byte of the output buffer (whose length is equal to the requested number of bytes). +</li><li>The content of the output buffer, which is the final value generated by the RNG, is exported. +</li></ol> +</li></ol> +<h2>Design Origins</h2> +<p>The design and implementation of the random number generator are based on the following works:</p> +<ul> +<li>Software Generation of Practically Strong Random Numbers by Peter Gutmann [10] +</li><li>Cryptographic Random Numbers by Carl Ellison [11] </li></ul> +<p> </p> +<p><a href="Keyfiles.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Reallocated Sectors.html b/doc/html/Reallocated Sectors.html new file mode 100644 index 00000000..cbaef180 --- /dev/null +++ b/doc/html/Reallocated Sectors.html @@ -0,0 +1,48 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Reallocated%20Sectors.html">Reallocated Sectors</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Reallocated Sectors</h1> +<p>Some storage devices, such as hard drives, internally reallocate/remap bad sectors. Whenever the device detects a sector to which data cannot be written, it marks the sector as bad and remaps it to a sector in a hidden reserved area on the drive. Any subsequent + read/write operations from/to the bad sector are redirected to the sector in the reserved area. This means that any existing data in the bad sector remains on the drive and it cannot be erased (overwritten with other data). This may have various security implications. + For instance, data that is to be encrypted in place may remain unencrypted in the bad sector. Likewise, data to be erased (for example, during the process of creation of a hidden operating system) may remain in the bad sector. Plausible deniability (see section +<a href="Plausible%20Deniability.html"><em>Plausible Deniability</em></a>) may be adversely affected whenever a sector is reallocated. Additional examples of possible security implications are listed in the section +<a href="Security%20Requirements%20and%20Precautions.html"> +<em>Security Requirements and Precautions</em></a>. Please note that this list is not exhaustive (these are just examples). Also note that VeraCrypt +<em>cannot</em> prevent any security issues related to or caused by reallocated sectors. To find out the number of reallocated sectors on a hard drive, you can use e.g. a third-party software tool for reading so-called S.M.A.R.T. data.</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/References.html b/doc/html/References.html new file mode 100644 index 00000000..a31f4327 --- /dev/null +++ b/doc/html/References.html @@ -0,0 +1,238 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="References.html">References</a> +</p></div> + +<div class="wikidoc"> +<h1>References</h1> +<p> </p> +<table style="border-collapse:separate; border-spacing:0px; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif"> +<tbody style="text-align:left"> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[1]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +U.S. Committee on National Security Systems (CNSS), <em style="text-align:left">National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information</em>, CNSS Policy No. 15, Fact Sheet + No. 1, June 2003, available at <a href="http://csrc.nist.gov/groups/STM/cmvp/documents/CNSS15FS.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://csrc.nist.gov/groups/STM/cmvp/documents/CNSS15FS.pdf</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[2]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +C. E. Shannon, <em style="text-align:left">Communication Theory of Secrecy Systems</em>, Bell System Technical Journal, v. 28, n. 4, 1949</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[3]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +NIST, <em style="text-align:left">Advanced Encryption Standard (AES)</em>, Federal Information Processing Standards Publication 197, November 26, 2001, available at +<a href="http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[4]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, E. Roback, NIST, +<em style="text-align:left">Report on the Development of the Advanced Encryption Standard (AES)</em>, October 2, 2000, Journal of Research of the National Institute of Standards and Technology, Vol. 106, No. 3, May-June 2001, available at +<a href="http://csrc.nist.gov/archive/aes/round2/r2report.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://csrc.nist.gov/archive/aes/round2/r2report.pdf</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[5]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, T. Kohno, M. Stay, +<em style="text-align:left">The Twofish Team's Final Comments on AES Selection, </em> +May 15, 2000, available at <a href="http://csrc.nist.gov/archive/aes/round2/comments/20000515-bschneier.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://csrc.nist.gov/archive/aes/round2/comments/20000515-bschneier.pdf</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[6]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +Bruce Schneier, <em style="text-align:left">Beyond Fear: Thinking Sensibly About Security in an Uncertain World</em>, Springer, 2003 +</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[7]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +RSA Laboratories, <em style="text-align:left">PKCS #5 v2.0: Password-Based Cryptography Standard</em>, RSA Data Security, Inc. Public-Key Cryptography Standards (PKCS), March 25, 1999, available at +<a href="https://www.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-5-password-based-cryptography-standard.htm" target="_blank"> +https://www.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-5-password-based-cryptography-standard.htm</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[8]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +H. Krawczyk, M. Bellare, R. Canetti, <em style="text-align:left">HMAC: Keyed-Hashing for Message Authentication</em>, RFC 2104, February 1997, available at +<a href="http://www.ietf.org/rfc/rfc2104.txt" style="text-align:left; color:#0080c0; text-decoration:none"> +http://www.ietf.org/rfc/rfc2104.txt</a>. </td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[9]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +M. Nystrom, RSA Security, <em style="text-align:left">Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512</em>, RFC 4231, December 2005, available at +<a href="http://www.ietf.org/rfc/rfc4231.txt" style="text-align:left; color:#0080c0; text-decoration:none"> +http://www.ietf.org/rfc/rfc4231.txt</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[10]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +Peter Gutmann, <em style="text-align:left">Software Generation of Practically Strong Random Numbers</em>, presented at the 1998 Usenix Security Symposium, available at +<a href="http://www.cs.auckland.ac.nz/%7Epgut001/pubs/usenix98.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://www.cs.auckland.ac.nz/~pgut001/pubs/usenix98.pdf</a>. </td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[11]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +Carl Ellison, <em style="text-align:left">Cryptographic Random Numbers</em>, originally an appendix to the P1363 standard, available at +<a href="http://world.std.com/%7Ecme/P1363/ranno.html" style="text-align:left; color:#0080c0; text-decoration:none"> +http://world.std.com/~cme/P1363/ranno.html</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[12]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +P. Rogaway, <em style="text-align:left">Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC</em>, Asiacrypt 2004. LNCS vol. 3329. Springer, 2004. Also available at: +<a href="http://www.cs.ucdavis.edu/%7Erogaway/papers/offsets.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://www.cs.ucdavis.edu/~rogaway/papers/offsets.pdf</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[13]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +J. Kelsey, <em style="text-align:left">Twofish Technical Report #7: Key Separation in Twofish</em>, AES Round 2 public comment, April 7, 2000</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[14]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +NIST, <em style="text-align:left">Secure Hash Standard</em>, FIPS 180-2, August 1, 2002, available at +<a href="http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[15]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +U. Maurer, J. Massey, <em style="text-align:left">Cascade Ciphers: The Importance of Being First</em>, Journal of Cryptology, v. 6, n. 1, 1993 +</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[16]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +Bruce Schneier, <em style="text-align:left">Applied Cryptography</em>, Second Edition, John Wiley & Sons, 1996 +</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[17]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +Peter Gutmann, <em style="text-align:left">Secure Deletion of Data from Magnetic and Solid-State Memory</em>, first published in the Sixth USENIX Security Symposium Proceedings, San Jose, California, July 22-25, 1996, available at +<a href="http://www.cs.auckland.ac.nz/%7Epgut001/pubs/secure_del.html" style="text-align:left; color:#0080c0; text-decoration:none"> +http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[18]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +Serpent home page: <a href="http://www.cl.cam.ac.uk/%7Erja14/serpent.html" style="text-align:left; color:#0080c0; text-decoration:none"> +http://www.cl.cam.ac.uk/~rja14/serpent.html</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[19]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +M. E. Smid, <em style="text-align:left">AES Issues</em>, AES Round 2 Comments, May 22, 2000, available at +<a href="http://csrc.nist.gov/archive/aes/round2/comments/20000523-msmid-2.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://csrc.nist.gov/archive/aes/round2/comments/20000523-msmid-2.pdf</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[20]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +A. Menezes, P. van Oorschot, S. Vanstone, <em style="text-align:left">Handbook of Applied Cryptography</em>, CRC Press, October 1996</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[21]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +International Organization for Standardization (ISO), <em style="text-align:left"> +Information technology – Security techniques – Hash-functions – Part 3: Dedicated hash-functions</em>, ISO/IEC 10118-3:2004, February 24, 2004</td> +</tr> +<tr style="text-align:left"> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[22]</td> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +NIST, <em style="text-align:left">The Keyed-Hash Message Authentication Code (HMAC)</em>, Federal Information Processing Standards Publication 198, March 6, 2002, available at +<a href="http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf</a>.</td> +</tr> +<tr style="text-align:left"> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[23]</td> +<td style="vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +RSA Laboratories, <em style="text-align:left">PKCS #11 v2.20: Cryptographic Token Interface Standard</em>, RSA Security, Inc. Public-Key Cryptography Standards (PKCS), June 28, 2004, available at +<a href="https://www.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-11-cryptographic-token-interface-standard.htm" target="_blank"> +https://www.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-11-cryptographic-token-interface-standard.htm. +</a>PDF available at <a href="https://www.cryptsoft.com/pkcs11doc/STANDARD/pkcs-11v2-20.pdf"> +https://www.cryptsoft.com/pkcs11doc/STANDARD/pkcs-11v2-20.pdf</a></td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[24]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<p>Morris Dworkin, <em style="text-align:left">Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices</em>, NIST Special Publication 800-3E, January 2010, available at +<a href="http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf" style="text-align:left; color:#0080c0; text-decoration:none"> +http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf</a>.</p> +</td> +</tr> +<tr style="text-align:left"> +<td style="width:41px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +[25]</td> +<td style="width:600px; vertical-align:top; color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:0px"> +<p>NIST, Approved Security Functions for FIPS PUB 140-2, Security Requirements for Cryptographic Modules, October 8, 2010, available at +<a href="http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf" target="_blank"> +http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf</a></p> +</td> +</tr> +</tbody> +</table> +<p> </p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html new file mode 100644 index 00000000..5cb4e6ca --- /dev/null +++ b/doc/html/Release Notes.html @@ -0,0 +1,301 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Release%20Notes.html">Version History</a> +</p></div> + +<div class="wikidoc"> +<h1>Release Notes</h1> +<p><strong style="text-align:left">1.19 </strong>(October 17<sup>th</sup>, 2016):</p> +<ul> +<li><strong>All OSs:</strong> +<ul> +<li>Fix issues raised by Quarkslab audit. +<ul> +<li>Remove GOST89 encryption algorithm. </li><li>Make PBKDF2 and HMAC code clearer and easier to analyze. </li><li>Add test vectors for Kuznyechik. </li><li>Update documentation to warn about risks of using command line switch ”tokenpin”. +</li></ul> +</li><li>Use SSE2 optimized Serpent algorithm implementation from Botan project (2.5 times faster on 64-bit platforms). +</li></ul> +</li><li><strong>Windows:</strong> +<ul> +<li>Fix keyboard issues in EFI Boot Loader. </li><li>Fix crash on 32-bit machines when creating a volume that uses Streebog as PRF. +</li><li>Fix false positive detection of Evil-Maid attacks in some cases (e.g. hidden OS creation) +</li><li>Fix failure to access EFS data on VeraCrypt volumes under Windows 10. </li><li>Fix wrong password error in the process of copying hidden OS. </li><li>Fix issues raised by Quarkslab audit: +<ul> +<li>Fix leak of password length in MBR bootloader inherited from TrueCrypt. </li><li>EFI bootloader: Fix various leaks and erase keyboard buffer after password is typed. +</li><li>Use libzip library for handling zip Rescue Disk file instead of vulnerable XUnzip library. +</li></ul> +</li><li>Support EFI system encryption for 32-bit Windows. </li><li>Perform shutdown instead of reboot during Pre-Test of EFI system encryption to detect incompatible motherboards. +</li><li>Minor GUI and translations fixes. </li></ul> +</li><li><strong>MacOSX:</strong> +<ul> +<li>Remove dependency to MacFUSE compatibility layer in OSXFuse. </li></ul> +</li></ul> +<p> </p> +<p><strong style="text-align:left">1.18a </strong>(August 17<sup>th</sup>, 2016):</p> +<ul> +<li><strong>All OSs:</strong> +<ul> +<li>Support Japanese encryption standard Camellia, including for Windows system encryption (MBR & EFI). +</li><li>Support Russian encryption and hash standards Kuznyechik, Magma and Streebog, including for Windows EFI system encryption. +</li></ul> +</li><li><strong>Windows:</strong> +<ul> +<li>Support EFI Windows system encryption (limitations: no hidden os, no boot custom message) +</li><li>Fix TrueCrypt vulnerability allowing detection of hidden volumes presence(reported by Ivanov Aleksey Mikhailovich, alekc96 [at] mail dot ru) +</li><li>Enhanced protection against dll hijacking attacks. </li><li>Fix boot issues on some machines by increasing required memory by 1 KiB </li><li>Add benchmarking of hash algorithms and PRF with PIM (including for pre-boot). +</li><li>Move build system to Visual C++ 2010 for better stability. </li><li>Workaround for AES-NI support under Hyper-V on Windows Server 2008 R2. </li><li>Correctly remove driver file veracrypt.sys during uninstall on Windows 64-bit. +</li><li>Implement passing smart card PIN as command line argument (/tokenpin) when explicitly mounting a volume. +</li><li>When no drive letter specified, choose A: or B: only when no other free drive letter is available. +</li><li>Reduce CPU usage caused by the option to disable use of disconnected network drives. +</li><li>Add new volume ID mechanism to be used to identify disks/partitions instead of their device name. +</li><li>Add option to avoid PIM prompt in pre-boot authentication by storing PIM value unencrypted in MBR. +</li><li>Add option and command line switch to hide waiting dialog when performing operations. +</li><li>Add checkbox in "VeraCrypt Format" wizard GUI to skip Rescue Disk verification during system encryption procedure. +</li><li>Allow files drag-n-drop when VeraCrypt is running as elevated process. </li><li>Minor GUI and translations fixes. </li></ul> +</li><li><strong>Linux:</strong> +<ul> +<li>Fix mount issue on Fedora 23. </li><li>Fix mount failure when compiling source code using gcc 5.x. </li><li>Adhere to XDG Desktop Specification by using XDG_CONFIG_HOME to determine location of configuration files. +</li></ul> +</li><li><strong>MacOSX:</strong> +<ul> +<li>Solve compatibility issue with newer versions of OSXFuse. </li></ul> +</li></ul> +<p> </p> +<p><strong style="text-align:left">1.17 </strong>(February 13<sup>th</sup>, 2016):</p> +<ul> +<li><strong>All OSs:</strong> +<ul> +<li>Support UNICODE passwords: all characters are now accepted in passwords (except Windows system encryption) +</li><li>Cut mount/boot time by half thanks to a clever optimization of key derivation (found by +<a href="https://madiba.encs.concordia.ca/~x_decarn/" target="_blank">Xavier de Carné de Carnavalet</a>) +</li><li>Optimize Whirlpool PRF speed by using assembly (25% speed gain compared to previous code). +</li><li>Add support for creating exFAT volumes. </li><li>Add GUI indicator for the amount of randomness gathered using mouse movement. +</li><li>Include new icons and graphics contributed by <em>Andreas Becker</em> (<a href="http://www.andreasbecker.de" target="_blank">http://www.andreasbecker.de</a>) +</li></ul> +</li><li><strong>Windows:</strong> +<ul> +<li>Fix dll hijacking issue affecting installer that allows code execution with elevation of privilege (CVE-2016-1281). Reported by Stefan Kanthak (<a href="http://home.arcor.de/skanthak/" target="_blank">http://home.arcor.de/skanthak/</a>) +</li><li>Sign binaries using both SHA-1 and SHA-256 to follow new Microsoft recommendations. +</li><li>Solve issues under Comodo/Kaspersky when running an application from a VeraCrypt volume (Reported and fixed by Robert Geisler). +</li><li>Bootloader: Protect password/PIM length by filling the fields to maximum length with '*' after ENTER +</li><li>Solve issue with system favorites not being able to be mounted to drive A: </li><li>Solve lost focus issues for after displaying the waiting dialog </li><li>Solve rare issue where some partitions where asscoiated with wrong disk the "Select Device" dialog. +</li><li>Implement PIM caching, for both system encryption and normal volumes. Add option to activate it. +</li><li>Don't try mounting using cached passwords if password and/or keyfile are specified in the command line. +</li><li>Internal rewrite to make VeraCrypt native UNICODE application. </li><li>Workaround to avoid false positive detection by some anti-virus software. </li><li>Hide disconnected network drives in the list of available drives. Add option to make them available for mounting. +</li><li>Solve issue that caused in some cases configuration and history XML files to be updated even when not needed. +</li><li>Fix leak of path of selected keyfiles in RAM. </li><li>Fix TB unit can't be deselected in VeraCryptExpander. </li><li>Add Alt+i keyboard shortcut for "Use PIM" checkbox in GUI. </li><li>Minor GUI and translations fixes. </li></ul> +</li><li><strong>Linux/MacOSX:</strong> +<ul> +<li>Fix issue of --stdin option not handling correctly passwords that contain a space character (reported and fixed by Codeplex user horsley1953). +</li><li>Fix issue creating volumes using command line with a filesystem other than FAT. +</li><li>Support K/M/G/T suffixes for --size switch to indicate unit to use for size value. +</li></ul> +</li></ul> +<p id="116"><strong style="text-align:left">1.16 (October 7<sup>th</sup>, 2015):</strong></p> +<ul> +<li><strong><strong>Windows:</strong></strong> +<ul> +<li>Modify patch for CVE-2015-7358 vulnerability to solve side effects on Windows while still making it very hard to abuse drive letter handling. +</li><li>Fix failure to restore volume header from an external file in some configurations. +</li><li>Add option to disable “Evil Maid” attack detection for those encountering false positive cases (e.g. FLEXnet/Adobe issue). +</li><li>By default, don’t try to mount using empty password when default keyfile configured or keyfile specified in command line. Add option to restore the old behavior. +<ul> +<li>If mounting using empty password is needed, explicitly specify so in the command line using: /p "" +</li></ul> +</li></ul> +</li></ul> +<p><strong style="text-align:left">1.15 </strong>(September 26<sup>th</sup>, 2015):</p> +<ul> +<li><strong>Windows:</strong> +<ul> +<li>Fix two TrueCrypt vulnerabilities reported by James Forshaw (Google Project<br> +Zero) +<ul> +<li><a href="https://code.google.com/p/google-security-research/issues/detail?id=538" target="_blank">CVE-2015-7358</a> (critical): Local Elevation of Privilege on Windows by<br> +abusing drive letter handling. </li><li><a href="https://code.google.com/p/google-security-research/issues/detail?id=537" target="_blank">CVE-2015-7359</a>: Local Elevation of Privilege on Windows caused by<br> +incorrect Impersonation Token Handling. </li></ul> +</li><li>Fix regression in mounting of favorite volumes at user logon. </li><li>Fix display of some Unicode languages (e.g. Chinese) in formatting wizard. </li><li>Set keyboard focus to PIM field when "Use PIM" is checked. </li><li>Allow Application key to open context menu on drive letters list </li><li>Support specifying volumes size in TB in the GUI (command line already supports this) +</li></ul> +</li></ul> +<p><strong style="text-align:left">1.14 </strong>(September 16<sup>th</sup>, 2015):</p> +<ul> +<li><strong>All OSs:</strong> +<ul> +<li>Mask and unmask PIM value in GUI and bootloader like the password. </li></ul> +</li></ul> +<ul> +<li><strong>Windows:</strong> +<ul> +<li>Solve Rescue Disk damaged error when using cascade ciphers and SHA256 for system encryption. +</li><li>Solve option "Cache password in drive memory" always disabled even if checked in preferences. +</li><li>Solve UI language change not taken into account for new install unless a preference is changed. +</li><li>Implement creating file containers using command line. </li><li>Driver: disable support of IOCTL_STORAGE_QUERY_PROPERTY by default and add option to enable it. +</li><li>Driver: Support returning StorageDeviceProperty when queried through IOCTL_STORAGE_QUERY_PROPERTY. +</li><li>Support setting volume label in Explorer through mount option or favorite label value. +</li><li>Fix for Hot Keys assignment dialog issue where OEM-233 is always displayed and can't be changed. +</li><li>Always copy both 32-bit and 64-bit executable binaries during install and in Traveler Disk Setup. +<ul> +<li>Traveler Disk will again use 32-bit exe by default while also offering 64-bit exe. +</li><li>On Windows 64-bit, 32-bit exe files are now available(e.g. if needed to use 32-bit PKCS#11 dll) +</li></ul> +</li><li>Include Volume Expander in Traveler Disk Setup. </li><li>Don't offer creating a restore point if it is disabled in Windows. </li><li>Add possibility to verify a Rescue Disk ISO image file. </li><li>Minors fixes in the installer, GUI and driver. </li></ul> +</li></ul> +<ul> +<li><strong>Linux:</strong> +<ul> +<li>Support supplying password using stdin in non interactive mode (contributed by +<a href="https://github.com/LouisTakePILLz" target="_blank">LouisTakePILLz</a>) +<ul> +<li>Example: <code>veracrypt -t ${IMAGE_PATH} ${MOUNT_PATH} --mount --non-interactive --stdin <<< "$PWD"</code> +</li></ul> +</li></ul> +</li></ul> +<p><strong style="text-align:left">1.13 </strong>(August 9<sup>th</sup>, 2015):</p> +<ul> +<li><strong>Windows:</strong> +<ul> +<li>Solve TOR crashing when run from a VeraCrypt volume. </li></ul> +</li></ul> +<p><strong style="text-align:left">1.12 </strong>(August 5<sup>th</sup>, 2015):</p> +<ul> +<li><strong>All OSs:</strong> +<ul> +<li>Implement "Dynamic Mode" by supporting a Personal Iterations Multiplier (PIM). See documentation for more information. +</li></ul> +</li></ul> +<ul> +<li><strong>Windows:</strong> +<ul> +<li>Detect Boot Loader tampering ("Evil Maid" attacks) for system encryption and propose recovery options. +</li><li>Fix buffer overrun issue and other memory related bugs when parsing language XML files. +</li><li>Fix wrongly reported bad sectors by chkdsk caused by a bug in IOCTL_DISK_VERIFY handling. +</li><li>Fix privacy issue caused by configuration and history files being updated whenever VeraCrypt is used (reported by Liran Elharar) +</li><li>Fix system favorites not always mounting after cold start. </li><li>Solve installer error when updating VeraCrypt on Windows 10. </li><li>Implement decryption of non-system partition/drive. </li><li>Include 64-bit exe files in the installer and deploy them on 64-bit machines for better performances. +</li><li>Allow using drive letters A: and B: for mounting volumes </li><li>Make command line argument parsing more strict and robust (e.g. /lz rejected, must be /l z) +</li><li>Add possibility to show system encryption password in Windows GUI and bootloader +</li><li>Solve "Class Already exists" error that was happening for some users. </li><li>Solve some menu items and GUI fields not translatable </li><li>Make volumes correctly report Physical Sector size to Windows. </li><li>Correctly detect switch user/RDP disconnect operations for autodismount on session locked. +</li><li>Add manual selection of partition when resuming in-place encryption. </li><li>Add command line option (/cache f) to temporarily cache password during favorites mounting. +</li><li>Add waiting dialog for Auto-Mount Devices operations to avoid freezing GUI. </li><li>Add extra information to displayed error message in order to help analyze reported issues. +</li><li>Disable menu entry for changing system encryption PRF since it's not yet implemented. +</li><li>Fix failure to change password when UAC required (inherited from TrueCrypt) </li><li>Minor fixes and changes (see Git history for more details) </li></ul> +</li></ul> +<ul> +<li><strong>Linux:</strong> +<ul> +<li>Solve installer issue under KDE when xterm not available </li><li>Fix warnings on about/LegalNotice dialogs when wxWidgets linked dynamically (N/A for official binary) +</li><li>Support hash names with '-' in command line (sha-256, sha-512 and ripemd-160) +</li><li>Remove "--current-hash" switch and add "--new-hash" to be more coherent with existing switches. +</li><li>When only keyfile specified in command line, don't try to mount using empty password. +<ul> +<li>If mounting using empty password is needed, explicitly specify so using: -p "" +</li></ul> +</li></ul> +</li></ul> +<p id="1.0f-2"><strong style="text-align:left">1.0f-2</strong>(April 5<sup>th</sup>, 2015):</p> +<ul> +<li><strong>All OSs:</strong> +<ul> +<li>Mounting speed improvement, up to 20% quicker on 64-bit (contributed by Nils Maier) +</li><li>Add option to set default hash/TrueCryptMode used for mounting volumes. </li><li>Use TrueCryptMode/Hash specified in command line in password dialog. </li></ul> +</li><li><strong>Windows:</strong> +<ul> +<li>Solve CryptAcquireContext vulnerability reported by Open Crypto Audit Phase II. +</li><li>Proper handling of random generator failures. Inform user in such cases. </li><li>TrueCrypt Mode related changes: +<ul> +<li>Support mounting TrueCrypt system partition (no conversion yet) </li><li>Support TrueCrypt volumes as System Favorites. </li><li>Correct displaying wrong TrueCrypt mode in volume properties when SHA-256 is used. +</li></ul> +</li><li>Solve PIN BLOCKED issue with smart cards in a special case. </li><li>Correctly handle file access errors when mounting containers. </li><li>Solve several issues reported by the Static Code Analysis too Coverity. </li><li>Bootloader: Add "Verifying Password..." message. </li><li>When UAC prompt fails (for example timeout), offer the user to retry the operation. +</li><li>Uninstall link now open the standard "Add/Remove Programs" window. </li><li>On uninstall, remove all VeraCrypt references from registry and disk. </li><li>Included VeraCryptExpander in the Setup. </li><li>Add option to temporary cache password when mounting multiple favorites. </li><li>Minor fixes and enhancements (see git history for more information) </li></ul> +</li><li><strong>MacOSX:</strong> +<ul> +<li>Solve issue volumes not auto-dismounting when quitting VeraCrypt<strong>.</strong> +</li><li>Solve issue VeraCrypt window not reopening by clicking dock icon. </li></ul> +</li><li><strong>Linux/MacOSX:</strong> +<ul> +<li>Solve preferences dialog not closing when clicking on the 'X' icon. </li><li>Solve read-only issue when mounting non-FAT volumes in some cases. </li><li>Support opening/exploring mounted volumes on desktops other than Gnome/KDE. </li><li>Solve various installer issues when running on less common configurations </li><li>Minor fixes (see git history for more information) </li></ul> +</li></ul> +<p><strong style="text-align:left">1.0f-1 </strong>(January 4<sup>th</sup>, 2015)</p> +<ul> +<li><strong>All OSs</strong>: +<ul> +<li>Add support for old TrueCrypt 6.0. </li><li>Change naming of cascades algorithms in GUI for a better description. </li></ul> +</li><li><strong>Linux/MacOSX:</strong> +<ul> +<li>Make cancel button of the preference dialog working. </li><li>Solve impossibility to enter a one digit size for the volume. </li><li>Add wait dialog to the benchmark calculation. </li></ul> +</li><li><strong>Windows:</strong> +<ul> +<li>Add TrueCrypt mode to the mounted volume information. </li><li>For Windows XP, correct the installer graphical artefacts. </li></ul> +</li></ul> +<p><strong style="text-align:left">1.0f </strong>(December 30, 2014)</p> +<ul> +<li><strong>All OSs</strong>: +<ul> +<li>Add support for mounting TrueCrypt volumes. </li><li>Add support for converting TrueCrypt containers and non-system partitions. </li><li>Add support for SHA-256 for volume encryption. </li><li>Make SHA-512 the default key derivation algorithm and change the order of preference of derivation algorithms : SHA-512 -> Whirlpool -> SHA-256 -> RIPEMD160 +</li><li>Deprecate RIPEMD160 for non-system encryption. </li><li>Speedup mount operation by enabling choice of correct hash algorithm. </li><li>Display a wait dialog during lengthy operations to avoid freezing the GUI. </li><li>Implement creation of multiple keyfiles at once, with predefined or random size. +</li><li>Always display random gathering dialog before performing sensitive operations. +</li><li>Links in the application now points to the online resources on Codeplex </li><li>First version of proper VeraCrypt User Guide </li></ul> +</li><li><strong>MacOSX:</strong> +<ul> +<li>Implement support for hard drives with a large sector size (> 512). </li><li>Link against new wxWidgets version 3.0.2. </li><li>Solve truncated text in some Wizard windows. </li></ul> +</li><li><strong>Linux:</strong> +<ul> +<li>Add support of NTFS formatting of volumes. </li><li>Correct issue on opening of the user guide PDF. </li><li>Better support for hard drives with a large sector size (> 512). </li><li>Link against new wxWidgets version 3.0.2. </li></ul> +</li><li><strong>Windows:</strong><br> +<ul> +<li>Security: fix vulnerability in bootloader detected by Open Crypto Audit and make it more robust. +</li><li>Add support for SHA-256 in system boot encryption. </li><li>Various optimizations in bootloader. </li><li>Complete fix of ShellExecute security issue. </li><li>Kernel driver: check that the password length received from bootloader is less or equal to 64. +</li><li>Correct a random crash when clicking the link for more information on keyfiles +</li><li>Implement option to auto-dismount when user session is locked </li><li>Add self-test vectors for SHA-256 </li><li>Modern look-and-feel by enabling visual styles </li><li>few minor fixed. </li></ul> +</li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">1.0e </strong>(September 4, 2014)</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<ul> +<li><strong style="text-align:left">Improvements and bug fixes:</strong> +<ul> +<li>Correct most of the security vulnerabilities reported by the Open Crypto Audit Project. +</li><li>Correct security issues detected by Static Code Analysis, mainly under Windows. +</li><li>Correct issue of unresponsiveness when changing password/key file of a volume. Reduce overall time taken for creating encrypted volume/partition. +</li><li>Minor improvements and bug fixes (look at git history for more details). </li></ul> +</li></ul> +</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<strong style="text-align:left">1.0d </strong>(June 3, 2014)</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<ul> +<li><strong style="text-align:left">Improvements and bug fixes:</strong> +<ul> +<li>Correct issue while creating hidden operating system. </li><li>Minor improvements and bug fixes. </li></ul> +</li></ul> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Removable Medium Volume.html b/doc/html/Removable Medium Volume.html new file mode 100644 index 00000000..811a5c8a --- /dev/null +++ b/doc/html/Removable Medium Volume.html @@ -0,0 +1,56 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Miscellaneous.html">Miscellaneous</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Removable%20Medium%20Volume.html">Removable Medium Volume</a> +</p></div> + +<div class="wikidoc"> +<h2>Volume Mounted as Removable Medium</h2> +<p>This section applies to VeraCrypt volumes mounted when one of the following options is enabled (as applicable):</p> +<ul> +<li><em>Tools</em> > <em>Preferences</em> > <em>Mount volumes as removable media</em> +</li><li><em>Mount Options</em> > <em>Mount volume as removable medium</em> </li><li><em>Favorites</em> > <em>Organize Favorite Volumes</em> > <em>Mount selected volume as removable medium</em> +</li><li><em>Favorites</em> > <em>Organize System Favorite Volumes</em> > <em>Mount selected volume as removable medium</em> +</li></ul> +<p>VeraCrypt Volumes that are mounted as removable media have the following advantages and disadvantages:</p> +<ul> +<li>Windows is prevented from automatically creating the ‘<em>Recycled</em>’ and/or the ‘<em>System Volume Information</em>’ folders on VeraCrypt volumes (in Windows, these folders are used by the Recycle Bin and System Restore features). +</li><li>Windows 8 and later is prevented from writing an Event 98 to the Events Log that contains the device name (\\device\VeraCryptVolumeXX) of VeraCrypt volumes formatted using NTFS. This event log "feature" was introduced in Windows 8 as part of newly introduced + NTFS health checks as <a href="https://blogs.msdn.microsoft.com/b8/2012/05/09/redesigning-chkdsk-and-the-new-ntfs-health-model/" target="_blank"> +explained here</a>. Big thanks to Liran Elharar for discovering this. </li><li>Windows may use caching methods and write delays that are normally used for removable media (for example, USB flash drives). This might slightly decrease the performance but at the same increase the likelihood that it will be possible to dismount the volume + quickly without having to force the dismount. </li><li>The operating system may tend to keep the number of handles it opens to such a volume to a minimum. Hence, volumes mounted as removable media might require fewer forced dismounts than other volumes. +</li><li>Under Windows Vista and earlier, the ‘<em>Computer</em>’ (or ‘<em>My Computer</em>’) list does not show the amount of free space on volumes mounted as removable (note that this is a Windows limitation, not a bug in VeraCrypt). +</li><li>Under desktop editions of Windows Vista or later, sectors of a volume mounted as removable medium may be accessible to all users (including users without administrator privileges; see section +<a href="Multi-User%20Environment.html"> +<em>Multi-User Environment</em></a>). </li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Removing Encryption.html b/doc/html/Removing Encryption.html new file mode 100644 index 00000000..6b5335b7 --- /dev/null +++ b/doc/html/Removing Encryption.html @@ -0,0 +1,80 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Miscellaneous.html">Miscellaneous</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Removing%20Encryption.html">Removing Encryption</a> +</p></div> + +<div class="wikidoc"> +<h1>How to Remove Encryption</h1> +<p>Please note that VeraCrypt can in-place decrypt only <strong>partitions and drives +</strong>(select <em>System</em> > <em>Permanently Decrypt System Partition/Drive +</em>for system partition/drive and select <em>Volumes -> Permanently Decrypt </em> +for non-system partition/drive). If you need to remove encryption (e.g., if you no longer need encryption) from a +<strong>file-hosted volume</strong>, please follow these steps:</p> +<ol> +<li>Mount the VeraCrypt volume. </li><li>Move all files from the VeraCrypt volume to any location outside the VeraCrypt volume (note that the files will be decrypted on the fly). +</li><li>Dismount the VeraCrypt volume. </li><li>delete it (the container) just like you delete any other file. </li></ol> +<p>If in-place decryption of non-system partitions/drives is not desired, it is also possible in this case to follow the steps 1-3 described above.<br> +<br> +In all cases, if the steps 1-3 are followed, the following extra operations can be performed:</p> +<ul> +<li><strong>If the volume is partition-hosted (applies also to USB flash drives)</strong> +</li></ul> +<ol type="a"> +<ol> +<li>Right-click the ‘<em>Computer</em>’ (or ‘<em>My Computer</em>’) icon on your desktop, or in the Start Menu, and select +<em>Manage</em>. The ‘<em>Computer Management</em>’ window should appear. +</li><li>In the <em>Computer Management</em> window, from the list on the left, select ‘<em>Disk Management</em>’ (within the +<em>Storage</em> sub-tree). </li><li>Right-click the partition you want to decrypt and select ‘<em>Change Drive Letter and Paths</em>’. +</li><li>The ‘<em>Change Drive Letter and Paths</em>’ window should appear. If no drive letter is displayed in the window, click +<em>Add</em>. Otherwise, click <em>Cancel</em>.<br> +<br> +If you clicked <em>Add</em>, then in the ‘<em>Add Drive Letter or Path</em>’ (which should have appeared), select a drive letter you want to assign to the partition and click +<em>OK</em>. </li><li>In the <em>Computer Management</em> window, right-click the partition you want to decrypt again and select +<em>Format</em>. The <em>Format</em> window should appear. </li><li>In the <em>Format</em> window, click <em>OK</em>. After the partition is formatted, it will no longer be required to mount it with VeraCrypt to be able to save or load files to/from the partition. +</li></ol> +</ol> +<ul> +<li><strong>If the volume is device-hosted</strong> </li></ul> +<blockquote> +<ol> +<li>Right-click the ‘<em>Computer</em>’ (or ‘<em>My Computer</em>’) icon on your desktop, or in the Start Menu, and select +<em>Manage</em>. The ‘<em>Computer Management</em>’ window should appear. +</li><li>In the <em>Computer Management</em> window, from the list on the left, select ‘<em>Disk Management</em>’ (within the +<em>Storage</em> sub-tree). </li><li>The ‘<em>Initialize Disk</em>’ window should appear. Use it to initialize the disk. +</li><li>In the ‘<em>Computer Management</em>’ window, right-click the area representing the storage space of the encrypted device and select ‘<em>New Partition</em>’ or ‘<em>New Simple Volume</em>’. +</li><li>WARNING: Before you continue, make sure you have selected the correct device, as all files stored on it will be lost. The ‘<em>New Partition Wizard</em>’ or ‘<em>New Simple Volume Wizard</em>’ window should appear now; follow its + instructions to create a new partition on the device. After the partition is created, it will no longer be required to mount the device with VeraCrypt to be able to save or load files to/from the device. +</li></ol> +</blockquote> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/SHA-256.html b/doc/html/SHA-256.html new file mode 100644 index 00000000..4e5bcc5d --- /dev/null +++ b/doc/html/SHA-256.html @@ -0,0 +1,43 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hash%20Algorithms.html">Hash Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="SHA-256.html">SHA-256</a> +</p></div> + +<div class="wikidoc"> +<h1>SHA-256</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +SHA-256 is a hash algorithm designed by the NSA and published by NIST in FIPS PUB 180-2 [14] in 2002 (the first draft was published in 2001). The size of the output of this algorithm is 256 bits.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="SHA-512.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/SHA-512.html b/doc/html/SHA-512.html new file mode 100644 index 00000000..0b2c9d87 --- /dev/null +++ b/doc/html/SHA-512.html @@ -0,0 +1,43 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hash%20Algorithms.html">Hash Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="SHA-512.html">SHA-512</a> +</p></div> + +<div class="wikidoc"> +<h1>SHA-512</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +SHA-512 is a hash algorithm designed by the NSA and published by NIST in FIPS PUB 180-2 [14] in 2002 (the first draft was published in 2001). The size of the output of this algorithm is 512 bits.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="Whirlpool.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Security Model.html b/doc/html/Security Model.html new file mode 100644 index 00000000..9a65dcfe --- /dev/null +++ b/doc/html/Security Model.html @@ -0,0 +1,109 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Model.html">Security Model</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Security Model</h1> +<div> +<h4>Note to security researchers: If you intend to report a security issue or publish an attack on VeraCrypt, please make sure it does not disregard the security model of VeraCrypt described below. If it does, the attack (or security issue report) will be considered + invalid/bogus.</h4> +</div> +<p>VeraCrypt is a computer software program whose primary purposes are to:</p> +<ul> +<li>Secure data by encrypting it before it is written to a disk. </li><li>Decrypt encrypted data after it is read from the disk. </li></ul> +<p>VeraCrypt does <strong>not</strong>:</p> +<ul> +<li>Encrypt or secure any portion of RAM (the main memory of a computer). </li><li>Secure any data on a computer* if an attacker has administrator privileges† under an operating system installed on the computer. +</li><li>Secure any data on a computer if the computer contains any malware (e.g. a virus, Trojan horse, spyware) or any other piece of software (including VeraCrypt or an operating system component) that has been altered, created, or can be controlled, by an attacker. +</li><li>Secure any data on a computer if an attacker has physical access to the computer before or while VeraCrypt is running on it. +</li><li>Secure any data on a computer if an attacker has physical access to the computer between the time when VeraCrypt is shut down and the time when the entire contents of all volatile memory modules connected to the computer (including memory modules in peripheral + devices) have been permanently and irreversibly erased/lost. </li><li>Secure any data on a computer if an attacker can remotely intercept emanations from the computer hardware (e.g. the monitor or cables) while VeraCrypt is running on it (or otherwise remotely monitor the hardware and its use, directly or indirectly, while + VeraCrypt is running on it). </li><li>Secure any data stored in a VeraCrypt volume‡ if an attacker without administrator privileges can access the contents of the mounted volume (e.g. if file/folder/volume permissions do not prevent such an attacker from accessing it). +</li><li>Preserve/verify the integrity or authenticity of encrypted or decrypted data. +</li><li>Prevent traffic analysis when encrypted data is transmitted over a network. </li><li>Prevent an attacker from determining in which sectors of the volume the content changed (and when and how many times) if he or she can observe the volume (dismounted or mounted) before and after data is written to it, or if the storage medium/device allows + the attacker to determine such information (for example, the volume resides on a device that saves metadata that can be used to determine when data was written to a particular sector). +</li><li>Encrypt any existing unencrypted data in place (or re-encrypt or erase data) on devices/filesystems that use wear-leveling or otherwise relocate data internally. +</li><li>Ensure that users choose cryptographically strong passwords or keyfiles. </li><li>Secure any computer hardware component or a whole computer. </li><li>Secure any data on a computer where the security requirements or precautions listed in the chapter +<a href="Security%20Requirements%20and%20Precautions.html"> +<em>Security Requirements and Precautions</em></a> are not followed. </li><li>Do anything listed in the section <a href="Issues%20and%20Limitations.html#limitations"> +Limitations </a>(chapter <a href="Issues%20and%20Limitations.html"> +Known Issues & Limitations</a>). </li></ul> +<p>Under <strong>Windows</strong>, a user without administrator privileges can (assuming the default VeraCrypt and operating system configurations):</p> +<ul> +<li>Mount any file-hosted VeraCrypt volume provided that the file permissions of the container allow it. +</li><li>Mount any partition/device-hosted VeraCrypt volume. </li><li>Complete the pre-boot authentication process and, thus, gain access to data on an encrypted system partition/drive (and start the encrypted operating system). +</li><li>Skip the pre-boot authentication process (this can be prevented by disabling the option +<em>Settings</em> > ‘<em>System Encryption</em>’ > ‘<em>Allow pre-boot authentication to be bypassed by pressing the Esc key</em>’; note that this option can be enabled or disabled only by an administrator). +</li><li>Dismount, using VeraCrypt, (and, in the VeraCrypt application window, see the path to and properties of) any VeraCrypt volume mounted by him or her. However, this does not apply to ‘system favorite volumes’, which he or she can dismount (etc.) + regardless of who mounted them (this can be prevented by enabling the option <em> +Settings</em> > ‘<em>System Favorite Volumes</em>’ > ‘<em>Allow</em> only administrators to view and dismount system favorite volumes in VeraCrypt’; note that this option can be enabled or disabled only by an administrator). +</li><li>Create a file-hosted VeraCrypt volume containing a FAT or no file system (provided that the relevant folder permissions allow it). +</li><li>Change the password, keyfiles, and header key derivation algorithm for, and restore or back up the header of, a file-hosted VeraCrypt volume (provided that the file permissions allow it). +</li><li>Access the filesystem residing within a VeraCrypt volume mounted by another user on the system (however, file/folder/volume permissions can be set to prevent this). +</li><li>Use passwords (and processed keyfiles) stored in the password cache (note that caching can be disabled; for more information see the section +<em>Settings -> Preferences</em>, subsection <em>Cache passwords in</em> driver memory). +</li><li>View the basic properties (e.g. the size of the encrypted area, encryption and hash algorithms used, etc.) of the encrypted system partition/drive when the encrypted system is running. +</li><li>Run and use the VeraCrypt application (including the VeraCrypt Volume Creation Wizard) provided that the VeraCrypt device driver is running and that the file permissions allow it. +</li></ul> +<p>Under <strong>Linux</strong>, a user without administrator privileges can (assuming the default VeraCrypt and operating system configurations):</p> +<ul> +<li>Create a file-hosted or partition/device-hosted VeraCrypt volume containing a FAT or no file system provided that the relevant folder/device permissions allow it. +</li><li>Change the password, keyfiles, and header key derivation algorithm for, and restore or back up the header of, a file-hosted or partition/device-hosted VeraCrypt volume provided that the file/device permissions allow it. +</li><li>Access the filesystem residing within a VeraCrypt volume mounted by another user on the system (however, file/folder/volume permissions can be set to prevent this). +</li><li>Run and use the VeraCrypt application (including the VeraCrypt Volume Creation Wizard) provided that file permissions allow it. +</li><li>In the VeraCrypt application window, see the path to and properties of any VeraCrypt volume mounted by him or her. +</li></ul> +<p>Under <strong>Mac OS X</strong>, a user without administrator privileges can (assuming the default VeraCrypt and operating system configurations):</p> +<ul> +<li>Mount any file-hosted or partition/device-hosted VeraCrypt volume provided that the file/device permissions allow it. +</li><li>Dismount, using VeraCrypt, (and, in the VeraCrypt application window, see the path to and properties of) any VeraCrypt volume mounted by him or her. +</li><li>Create a file-hosted or partition/device-hosted VeraCrypt volume provided that the relevant folder/device permissions allow it. +</li><li>Change the password, keyfiles, and header key derivation algorithm for, and restore or back up the header of, a file-hosted or partition/device-hosted VeraCrypt volume (provided that the file/device permissions allow it). +</li><li>Access the filesystem residing within a VeraCrypt volume mounted by another user on the system (however, file/folder/volume permissions can be set to prevent this). +</li><li>Run and use the VeraCrypt application (including the VeraCrypt Volume Creation Wizard) provided that the file permissions allow it. +</li></ul> +<p>VeraCrypt does not support the set-euid root mode of execution.<br> +<br> +Additional information and details regarding the security model are contained in the chapter +<a href="Security%20Requirements%20and%20Precautions.html"> +<em>Security Requirements and Precautions</em></a>.</p> +<p>* In this section (<em>Security Model</em>), the phrase “data on a computer” means data on internal and external storage devices/media (including removable devices and network drives) connected to the computer.</p> +<p>† In this section (<em>Security Model</em>), the phrase “administrator privileges” does not necessarily refer to a valid administrator account. It may also refer to an attacker who does not have a valid administrator account but who is + able (for example, due to improper configuration of the system or by exploiting a vulnerability in the operating system or a third-party application) to perform any action that only a user with a valid administrator account is normally allowed to perform (for + example, to read or modify an arbitrary part of a drive or the RAM, etc.)</p> +<p>‡ “VeraCrypt volume” also means a VeraCrypt-encrypted system partition/drive (see the chapter +<a href="System%20Encryption.html"><em>System Encryption</em></a>).</p> +</div> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/Security Requirements and Precautions.html b/doc/html/Security Requirements and Precautions.html new file mode 100644 index 00000000..4df99b38 --- /dev/null +++ b/doc/html/Security Requirements and Precautions.html @@ -0,0 +1,88 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +</p></div> + +<div class="wikidoc"> +<h1>Security Requirements and Precautions</h1> +<table style="border-collapse:separate; border-spacing:0px; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif"> +<tbody style="text-align:left"> +<tr style="text-align:left"> +<td style="text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; color:#ff0000; padding:15px; border:1px solid #000000"> +<strong style="text-align:left">IMPORTANT</strong>: If you want to use VeraCrypt, you must follow the security requirements and security precautions listed in this chapter.</td> +</tr> +</tbody> +</table> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The sections in this chapter specify security requirements for using VeraCrypt and give information about things that adversely affect or limit the ability of VeraCrypt to secure data and to provide plausible deniability. Disclaimer: This chapter is not guaranteed + to contain a list of <em style="text-align:left">all</em> security issues and attacks that might adversely affect or limit the ability of VeraCrypt to secure data and to provide plausible deniability.</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Data%20Leaks.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Data Leaks</a> +<ul> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Paging%20File.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Paging File</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Hibernation%20File.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Hibernation File</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Memory%20Dump%20Files.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Memory Dump Files</a> +</li></ul> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Unencrypted%20Data%20in%20RAM.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Unencrypted Data in RAM</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Physical%20Security.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Physical Security</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Malware.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Malware</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Multi-User%20Environment.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Multi-User Environment</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Authenticity%20and%20Integrity.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Authenticity and Integrity</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Choosing%20Passwords%20and%20Keyfiles.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Choosing Passwords and Keyfiles</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Changing%20Passwords%20and%20Keyfiles.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Changing Passwords and Keyfiles</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Trim%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Trim Operation</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Wear-Leveling.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Wear-Leveling</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Reallocated%20Sectors.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Reallocated Sectors</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Defragmenting.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Defragmenting</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Journaling%20File%20Systems.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Journaling File Systems</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Volume%20Clones.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Volume Clones</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Additional%20Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Additional Security Requirements and Precautions</a> +</li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Security Requirements for Hidden Volumes.html b/doc/html/Security Requirements for Hidden Volumes.html new file mode 100644 index 00000000..09998295 --- /dev/null +++ b/doc/html/Security Requirements for Hidden Volumes.html @@ -0,0 +1,173 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Plausible%20Deniability.html">Plausible Deniability</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hidden%20Volume.html">Hidden Volume</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20for%20Hidden%20Volumes.html">Security Requirements for Hidden Volumes</a> +</p></div> + +<div class="wikidoc"> +<h1>Security Requirements and Precautions Pertaining to Hidden Volumes</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If you use a <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden VeraCrypt volume</a>, you must follow the security requirements and precautions listed below in this section. Disclaimer: This section is not guaranteed to contain a list of +<em style="text-align:left">all</em> security issues and attacks that might adversely affect or limit the ability of VeraCrypt to secure data stored in a hidden VeraCrypt volume and the ability to provide plausible deniability.</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If an adversary has access to a (dismounted) VeraCrypt volume at several points over time, he may be able to determine which sectors of the volume are changing. If you change the contents of a +<a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden volume</a> (e.g., create/copy new files to the hidden volume or modify/delete/rename/move files stored on the hidden volume, etc.), the contents of sectors (ciphertext) in the hidden volume area will change. After being given the password to the outer + volume, the adversary might demand an explanation why these sectors changed. Your failure to provide a plausible explanation might indicate the existence of a hidden volume within the outer volume.<br style="text-align:left"> +<br style="text-align:left"> +Note that issues similar to the one described above may also arise, for example, in the following cases:<br style="text-align:left"> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The file system in which you store a file-hosted VeraCrypt container has been defragmented and a copy of the VeraCrypt container (or of its fragment) remains in the free space on the host volume (in the defragmented file system). To prevent this, do one of + the following: +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Use a partition/device-hosted VeraCrypt volume instead of file-hosted. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Securely erase free space on the host volume (in the defragmented file system) after defragmenting. On Windows, this can be done using the Microsoft +<a href="https://technet.microsoft.com/en-us/sysinternals/bb897443.aspx">free utility SDelete</a>. On Linux, the +<em>shred</em> utility from GNU coreutils package can be used for this purpose. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Do not defragment file systems in which you store VeraCrypt volumes. </li></ul> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A file-hosted VeraCrypt container is stored in a journaling file system (such as NTFS). A copy of the VeraCrypt container (or of its fragment) may remain on the host volume. To prevent this, do one the following: +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Use a partition/device-hosted VeraCrypt volume instead of file-hosted. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Store the container in a non-journaling file system (for example, FAT32). </li></ul> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A VeraCrypt volume resides on a device/filesystem that utilizes a wear-leveling mechanism (e.g. a flash-memory SSD or USB flash drive). A copy of (a fragment of) the VeraCrypt volume may remain on the device. Therefore, do not store hidden volumes on such devices/filesystems. + For more information on wear-leveling, see the section <a href="Wear-Leveling.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Wear-Leveling</a> in the chapter <a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions</a>. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A VeraCrypt volume resides on a device/filesystem that saves data (or on a device/filesystem that is controlled or monitored by a system/device that saves data) (e.g. the value of a timer or counter) that can be used to determine that a block had been written + earlier than another block and/or to determine how many times a block has been written/read. Therefore, do not store hidden volumes on such devices/filesystems. To find out whether a device/system saves such data, please refer to documentation supplied with + the device/system or contact the vendor/manufacturer. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A VeraCrypt volume resides on a device that is prone to wear (it is possible to determine that a block has been written/read more times than another block). Therefore, do not store hidden volumes on such devices/filesystems. To find out whether a device is + prone to such wear, please refer to documentation supplied with the device or contact the vendor/manufacturer. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +You back up content of a hidden volume by cloning its host volume or create a new hidden volume by cloning its host volume. Therefore, you must not do so. Follow the instructions in the chapter +<a href="How%20to%20Back%20Up%20Securely.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +How to Back Up Securely</a> and in the section <a href="Volume%20Clones.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Volume Clones</a>. </li></ul> +</li></ul> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Make sure that <em style="text-align:left">Quick Format</em> is disabled when encrypting a partition/device within which you intend to create a hidden volume. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +On Windows, make sure you have not deleted any files within a volume within which you intend to create a hidden volume (the cluster bitmap scanner does not detect deleted files). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +On Linux or Mac OS X, if you intend to create a hidden volume within a file-hosted VeraCrypt volume, make sure that the volume is not sparse-file-hosted (the Windows version of VeraCrypt verifies this and disallows creation of hidden volumes within sparse files). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +When a hidden volume is mounted, the operating system and third-party applications may write to non-hidden volumes (typically, to the unencrypted system volume) unencrypted information about the data stored in the hidden volume (e.g. filenames and locations + of recently accessed files, databases created by file indexing tools, etc.), the data itself in an unencrypted form (temporary files, etc.), unencrypted information about the filesystem residing in the hidden volume (which might be used e.g. to identify the + filesystem and to determine whether it is the filesystem residing in the outer volume), the password/key for the hidden volume, or other types of sensitive data. Therefore, the following security requirements and precautions must be followed: +<br style="text-align:left"> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Windows</em>: Create a hidden operating system (for information on how to do so, see the section +<a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a>) and mount hidden volumes only when the hidden operating system is running. +<span style="text-align:left; font-size:10px; line-height:12px">Note: When a hidden operating system is running, VeraCrypt ensures that all local unencrypted filesystems and non-hidden VeraCrypt volumes are read-only (i.e. no files can be written to such filesystems + or VeraCrypt volumes).<a href="#hidden_os_exception">*</a> Data is allowed to be written to filesystems within +<a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden VeraCrypt volumes</a>.</span> Alternatively, if a hidden operating system cannot be used, use a "live-CD" Windows PE system (entirely stored on and booted from a CD/DVD) that ensures that any data written to the system volume is written to a RAM disk. + Mount hidden volumes only when such a "live-CD" system is running (if a hidden operating system cannot be used). In addition, during such a "live-CD" session, only filesystems that reside in hidden VeraCrypt volumes may be mounted in read-write mode (outer + or unencrypted volumes/filesystems must be mounted as read-only or must not be mounted/accessible at all); otherwise, you must ensure that applications and the operating system do not write any sensitive data (see above) to non-hidden volumes/filesystems during + the "live-CD" session. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Linux</em>: Download or create a "live-CD" version of your operating system (i.e. a "live" Linux system entirely stored on and booted from a CD/DVD) that ensures that any data written to the system volume is written to a RAM disk. + Mount hidden volumes only when such a "live-CD" system is running. During the session, only filesystems that reside in hidden VeraCrypt volumes may be mounted in read-write mode (outer or unencrypted volumes/filesystems must be mounted as read-only or must + not be mounted/accessible at all). If you cannot comply with this requirement and you are not able to ensure that applications and the operating system do not write any sensitive data (see above) to non-hidden volumes/filesystems, you must not mount or create + hidden VeraCrypt volumes under Linux. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Mac OS X</em>: If you are not able to ensure that applications and the operating system do not write any sensitive data (see above) to non-hidden volumes/filesystems, you must not mount or create hidden VeraCrypt volumes under Mac + OS X. </li></ul> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +When an outer volume is mounted with <a href="Protection%20of%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden volume protection</a> enabled (see section <a href="Protection%20of%20Hidden%20Volumes.html"> +Protection of Hidden Volumes Against Damage</a>), you must follow the same security requirements and precautions that you are required to follow when a hidden volume is mounted (see above). The reason is that the operating system might leak the password/key + for the hidden volume to a non-hidden or unencrypted volume. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If you use an <strong style="text-align:left">operating system residing within a hidden volume</strong> (see the section +<a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a>), then, in addition to the above, you must follow these security requirements and precautions: +<br style="text-align:left"> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +You should use the decoy operating system as frequently as you use your computer. Ideally, you should use it for all activities that do not involve sensitive data. Otherwise, plausible deniability of the hidden operating system might be adversely affected (if + you revealed the password for the decoy operating system to an adversary, he could find out that the system is not used very often, which might indicate the existence of a hidden operating system on your computer). Note that you can save data to the decoy + system partition anytime without any risk that the hidden volume will get damaged (because the decoy system is +<em style="text-align:left">not</em> installed in the outer volume). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If the operating system requires activation, it must be activated before it is cloned (cloning is part of the process of creation of a hidden operating system — see the section +<a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Operating System</a>) and the hidden operating system (i.e. the clone) must never be reactivated. The reason is that the hidden operating system is created by copying the content of the system partition to a hidden volume (so if the operating system + is not activated, the hidden operating system will not be activated either). If you activated or reactivated a hidden operating system, the date and time of the activation (and other data) might be logged on a Microsoft server (and on the hidden operating + system) but not on the <a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +decoy operating system</a>. Therefore, if an adversary had access to the data stored on the server or intercepted your request to the server (and if you revealed the password for the decoy operating system to him), he might find out that the decoy operating + system was activated (or reactivated) at a different time, which might indicate the existence of a hidden operating system on your computer.<br style="text-align:left"> +<br style="text-align:left"> +For similar reasons, any software that requires activation must be installed and activated before you start creating the hidden operating system. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +When you need to shut down the hidden system and start the decoy system, do <em style="text-align:left"> +not</em> restart the computer. Instead, shut it down or hibernate it and then leave it powered off for at least several minutes (the longer, the better) before turning the computer on and booting the decoy system. This is required to clear the memory, which + may contain sensitive data. For more information, see the section <a href="Unencrypted%20Data%20in%20RAM.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Unencrypted Data in RAM</a> in the chapter <a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions</a>. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The computer may be connected to a network (including the internet) only when the decoy operating system is running. When the hidden operating system is running, the computer should not be connected to any network, including the internet (one of the most reliable + ways to ensure it is to unplug the network cable, if there is one). Note that if data is downloaded from or uploaded to a remote server, the date and time of the connection, and other data, are typically logged on the server. Various kinds of data are also + logged on the operating system (e.g. Windows auto-update data, application logs, error logs, etc.) Therefore, if an adversary had access to the data stored on the server or intercepted your request to the server (and if you revealed the password for the decoy + operating system to him), he might find out that the connection was not made from within the decoy operating system, which might indicate the existence of a hidden operating system on your computer. +<br style="text-align:left"> +<br style="text-align:left"> +Also note that similar issues would affect you if there were any filesystem shared over a network under the hidden operating system (regardless of whether the filesystem is remote or local). Therefore, when the hidden operating system is running, there must + be no filesystem shared over a network (in any direction). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Any actions that can be detected by an adversary (or any actions that modify any data outside mounted hidden volumes) must be performed only when the decoy operating system is running (unless you have a plausible alternative explanation, such as using a "live-CD" + system to perform such actions). For example, the option '<em style="text-align:left">Auto-adjust for daylight saving time</em>' option may be enabled only on the decoy system. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If the BIOS, EFI, or any other component logs power-down events or any other events that could indicate a hidden volume/system is used (e.g. by comparing such events with the events in the Windows event log), you must either disable such logging or ensure that + the log is securely erased after each session (or otherwise avoid such an issue in an appropriate way). +</li></ul> +</li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +In addition to the above, you must follow the security requirements and precautions listed in the following chapters:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Security Requirements and Precautions</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left"><a href="How%20to%20Back%20Up%20Securely.html" style="text-align:left; color:#0080c0; text-decoration:none.html">How to Back Up Securely</a></strong> +</li></ul> +<p><a href="VeraCrypt%20Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p id="hidden_os_exception"><span style="text-align:left; font-size:10px; line-height:12px">* This does not apply to filesystems on CD/DVD-like media and on custom, untypical, or non-standard devices/media.</span></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Security Tokens & Smart Cards.html b/doc/html/Security Tokens & Smart Cards.html new file mode 100644 index 00000000..b0613251 --- /dev/null +++ b/doc/html/Security Tokens & Smart Cards.html @@ -0,0 +1,41 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Tokens%20%26%20Smart%20Cards.html">Security Tokens & Smart Cards</a> +</p></div> + +<div class="wikidoc"> +<h1>Security Tokens & Smart Cards</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt supports security (or cryptographic) tokens and smart cards that can be accessed using the PKCS #11 (2.0 or later) protocol [23]. For more information, please see the section +<em style="text-align:left">Security Tokens and Smart Cards</em> in the chapter <a href="Keyfiles%20in%20VeraCrypt.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +<em style="text-align:left">Keyfiles</em></a>.</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Serpent.html b/doc/html/Serpent.html new file mode 100644 index 00000000..81e7a1e1 --- /dev/null +++ b/doc/html/Serpent.html @@ -0,0 +1,54 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Encryption%20Algorithms.html">Encryption Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Serpent.html">Serpent</a> +</p></div> + +<div class="wikidoc"> +<h1>Serpent</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>Designed by Ross Anderson, Eli Biham, and Lars Knudsen; published in 1998. It uses a 256-bit key, 128-bit block, and operates in XTS mode (see the section +<a href="Modes%20of%20Operation.html"><em>Modes of Operation</em></a>). Serpent was one of the AES finalists. It was not selected as the proposed AES algorithm even though it appeared to have a higher security margin + than the winning Rijndael [4]. More concretely, Serpent appeared to have a <em>high</em> security margin, while Rijndael appeared to have only an +<em>adequate</em> security margin [4]. Rijndael has also received some criticism suggesting that its mathematical structure might lead to attacks in the future [4].<br> +<br> +In [5], the Twofish team presents a table of safety factors for the AES finalists. Safety factor is defined as: number of rounds of the full cipher divided by the largest number of rounds that has been broken. Hence, a broken cipher has the lowest safety factor + 1. Serpent had the highest safety factor of the AES finalists: 3.56 (for all supported key sizes). Rijndael-256 had a safety factor of 1.56.<br> +<br> +In spite of these facts, Rijndael was considered an appropriate selection for the AES for its combination of security, performance, efficiency, implementability, and flexibility [4]. At the last AES Candidate Conference, Rijndael got 86 votes, Serpent got 59 + votes, Twofish got 31 votes, RC6 got 23 votes, and MARS got 13 votes [18, 19].*</p> +<p>* These are positive votes. If negative votes are subtracted from the positive votes, the following results are obtained: Rijndael: 76 votes, Serpent: 52 votes, Twofish: 10 votes, RC6: -14 votes, MARS: -70 votes [19].</p> +<p> </p> +<p><a href="Twofish.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Sharing over Network.html b/doc/html/Sharing over Network.html new file mode 100644 index 00000000..db204a76 --- /dev/null +++ b/doc/html/Sharing over Network.html @@ -0,0 +1,56 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Miscellaneous.html">Miscellaneous</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Sharing%20over%20Network.html">Sharing over Network</a> +</p></div> + +<div class="wikidoc"> +<h1>Sharing over Network</h1> +<p>If there is a need to access a single VeraCrypt volume simultaneously from multiple operating systems, there are two options:</p> +<ol> +<li>A VeraCrypt volume is mounted only on a single computer (for example, on a server) and only the content of the mounted VeraCrypt volume (i.e., the file system within the VeraCrypt volume) is shared over a network. Users on other computers or systems will + not mount the volume (it is already mounted on the server). +<p><strong>Advantages</strong><span>: All users can write data to the VeraCrypt volume. The shared volume may be both file-hosted and partition/device-hosted.</span></p> +<p><strong>Disadvantage</strong><span>: Data sent over the network will not be encrypted. However, it is still possible to encrypt them using e.g. SSL, TLS, VPN, or other technologies.</span></p> +<p><strong>Remarks</strong>: Note that, when you restart the system, the network share will be automatically restored only if the volume is a system favorite volume or an encrypted system partition/drive (for information on how to configure a volume as a system + favorite volume, see the chapter <a href="System%20Favorite%20Volumes.html"> +<em>System Favorite Volumes</em></a>).</p> +</li><li>A dismounted VeraCrypt file container is stored on a single computer (for example, on a server). This encrypted file is shared over a network. Users on other computers or systems will locally mount the shared file. Thus, the volume will be mounted simultaneously + under multiple operating systems. +<p><strong>Advantage</strong><span>: Data sent over the network will be encrypted (however, it is still recommended to encrypt them using e.g. SSL, TLS, VPN, or other appropriate technologies to make traffic analysis more difficult and to preserve the integrity + of the data).</span></p> +<p><strong>Disadvantages</strong>: The shared volume may be only file-hosted (not partition/device-hosted). The volume must be mounted in read-only mode under each of the systems (see the section +<em>Mount Options</em> for information on how to mount a volume in read-only mode). Note that this requirement applies to unencrypted volumes too. One of the reasons is, for example, the fact that data read from a conventional file system under one OS while + the file system is being modified by another OS might be inconsistent (which could result in data corruption).</p> +</li></ol> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Source Code.html b/doc/html/Source Code.html new file mode 100644 index 00000000..82f2e900 --- /dev/null +++ b/doc/html/Source Code.html @@ -0,0 +1,48 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Source%20Code.html">Source Code</a> +</p></div> + +<div class="wikidoc"> +<h1>Source Code</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>VeraCrypt is open-source and free software. The complete source code of VeraCrypt (written in C, C++, and assembly) is freely available for peer review at:</p> +<p> +<a href="https://sourceforge.net/p/veracrypt/code/ci/master/tree/" target="_blank">https://sourceforge.net/p/veracrypt/code/ci/master/tree/<br> +</a><a href="https://github.com/veracrypt/VeraCrypt" target="_blank">https://github.com/veracrypt/VeraCrypt<br> +</a><a href="https://bitbucket.org/veracrypt/veracrypt/src" target="_blank">https://bitbucket.org/veracrypt/veracrypt/src</a></p> +<p>The source code of each release can be downloaded from the same location as the release binaries.</p> +<p> </p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Standard Compliance.html b/doc/html/Standard Compliance.html new file mode 100644 index 00000000..14d40d13 --- /dev/null +++ b/doc/html/Standard Compliance.html @@ -0,0 +1,48 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Standard%20Compliance.html">Compliance with Standards and Specifications</a> +</p></div> + +<div class="wikidoc"> +<h1>Compliance with Standards and Specifications</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>To our best knowledge, VeraCrypt complies with the following standards, specifications, and recommendations:</p> +<ul> +<li>ISO/IEC 10118-3:2004 [21] </li><li>FIPS 197 [3] </li><li>FIPS 198 [22] </li><li>FIPS 180-2 [14] </li><li>FIPS 140-2 (XTS-AES, SHA-256, SHA-512, HMAC) [25] </li><li>NIST SP 800-38E [24] </li><li>PKCS #5 v2.0 [7] </li><li>PKCS #11 v2.20 [23] </li></ul> +<p>The correctness of the implementations of the encryption algorithms can be verified using test vectors (select +<em>Tools</em> > <em>Test Vectors</em>) or by examining the source code of VeraCrypt.</p> +<p> </p> +<p><a href="Source%20Code.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Streebog.html b/doc/html/Streebog.html new file mode 100644 index 00000000..8c9dca8f --- /dev/null +++ b/doc/html/Streebog.html @@ -0,0 +1,44 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hash%20Algorithms.html">Hash Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Streebog.html">Streebog</a> +</p></div> + +<div class="wikidoc"> +<h1>Streebog</h1> +<p>Streebog is a family of two hash algorithms, Streebog-256 and Streebog-512, defined in the Russian national standard <a href="https://www.tc26.ru/research/polozhenie/GOST_R_34_11-2012_eng.pdf">GOST R 34.11-2012</a> Information Technology - Cryptographic + Information Security - Hash Function. It is also described in <a href="https://tools.ietf.org/html/rfc6986"> +RFC 6986</a>. It is the competitor of NIST SHA-3 standard.</p> +<p>VeraCrypt uses only Streebog-512 which has an output size of 512 bits.</p> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/Supported Operating Systems.html b/doc/html/Supported Operating Systems.html new file mode 100644 index 00000000..389f8311 --- /dev/null +++ b/doc/html/Supported Operating Systems.html @@ -0,0 +1,63 @@ +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Supported%20Operating%20Systems.html">Supported Operating Systems</a> +</p></div> + +<div class="wikidoc"> +<h1>Supported Operating Systems</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt currently supports the following operating systems:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows 10 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows 8 and 8.1 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows 7 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows Vista </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows XP </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows Server 2012 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows Server 2008 R2 (64-bit) </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows Server 2008 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows Server 2003 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mac OS X 10.12 Sierra </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mac OS X 10.11 El Capitan </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mac OS X 10.10 Yosemite </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mac OS X 10.9 Mavericks </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mac OS X 10.8 Mountain Lion </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mac OS X 10.7 Lion </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mac OS X 10.6 Snow Leopard </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Linux x86 (32-bit and 64-bit versions, kernel 2.6 or compatible) </li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">Note: The following operating systems (among others) are not supported: Windows RT, Windows 2003 IA-64, Windows 2008 IA-64, Windows XP IA-64, and the Embedded/Tablet versions of Windows.</span></div> +<p><br style="text-align:left"> +<br style="text-align:left"> +Also see the section <strong style="text-align:left"><a href="Supported%20Systems%20for%20System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Operating Systems Supported for System + Encryption</a></strong></p> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/Supported Systems for System Encryption.html b/doc/html/Supported Systems for System Encryption.html new file mode 100644 index 00000000..45542a74 --- /dev/null +++ b/doc/html/Supported Systems for System Encryption.html @@ -0,0 +1,62 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="System%20Encryption.html">System Encryption</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Supported%20Systems%20for%20System%20Encryption.html">Supported Systems for System Encryption</a> +</p></div> + +<div class="wikidoc"> +<h1>Operating Systems Supported for System Encryption</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<br style="text-align:left"> +VeraCrypt can currently encrypt the following operating systems:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows 10 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows 8 and 8.1 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows 7 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows Vista (SP1 or later) </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows XP </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows Server 2012 </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows Server 2008 and Windows Server 2008 R2 (64-bit) </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Windows Server 2003 </li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<span style="text-align:left; font-size:10px; line-height:12px">Note: The following operating systems (among others) are not supported: Windows RT, Windows 2003 IA-64, Windows 2008 IA-64, Windows XP IA-64, and the Embedded/Tablet versions of Windows. +</span></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Also see the section <a href="Supported%20Operating%20Systems.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Supported Operating Systems</a></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> + </div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="VeraCrypt%20Rescue%20Disk.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div><div class="ClearBoth"></div></body></html> diff --git a/doc/html/System Encryption.html b/doc/html/System Encryption.html new file mode 100644 index 00000000..676c2e19 --- /dev/null +++ b/doc/html/System Encryption.html @@ -0,0 +1,72 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="System%20Encryption.html">System Encryption</a> +</p></div> + +<div class="wikidoc"> +<h1>System Encryption</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +VeraCrypt can on-the-fly encrypt a system partition or entire system drive, i.e. a partition or drive where Windows is installed and from which it boots.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +System encryption provides the highest level of security and privacy, because all files, including any temporary files that Windows and applications create on the system partition (typically, without your knowledge or consent), hibernation files, swap files, + etc., are always permanently encrypted (even when power supply is suddenly interrupted). Windows also records large amounts of potentially sensitive data, such as the names and locations of files you open, applications you run, etc. All such log files and + registry entries are always permanently encrypted as well.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +System encryption involves pre-boot authentication, which means that anyone who wants to gain access and use the encrypted system, read and write files stored on the system drive, etc., will need to enter the correct password each time before Windows boots + (starts). Pre-boot authentication is handled by the VeraCrypt Boot Loader, which resides in the first track of the boot drive and on the +<a href="VeraCrypt%20Rescue%20Disk.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Rescue Disk (see below)</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note that VeraCrypt can encrypt an existing unencrypted system partition/drive in-place while the operating system is running (while the system is being encrypted, you can use your computer as usual without any restrictions). Likewise, a VeraCrypt-encrypted + system partition/drive can be decrypted in-place while the operating system is running. You can interrupt the process of encryption or decryption anytime, leave the partition/drive partially unencrypted, restart or shut down the computer, and then resume the + process, which will continue from the point it was stopped.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The mode of operation used for system encryption is <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +XTS</a> (see the section <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Modes of Operation</a>). For further technical details of system encryption, see the section +<a href="Encryption%20Scheme.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Encryption Scheme</a> in the chapter <a href="Technical%20Details.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Technical Details</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To encrypt a system partition or entire system drive, select <em style="text-align:left"> +System</em> > <em style="text-align:left">Encrypt System Partition/Drive</em> and then follow the instructions in the wizard. To decrypt a system partition/drive, select +<em style="text-align:left">System</em> > <em style="text-align:left">Permanently Decrypt System Partition/Drive</em>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Because of BIOS requirement, the pre-boot password is typed using <strong>US keyboard layout. +</strong>During the system encryption process, VeraCrypt automatically and transparently switches the keyboard to US layout in order to ensure that the password value typed will match the one typed in pre-boot mode. Thus, in order to avoid wrong password errors, + one must type the password using the same keys as when creating the system encryption.</div> +<p>Note: By default, Windows 7 and later boot from a special small partition. The partition contains files that are required to boot the system. Windows allows only applications that have administrator privileges to write to the partition (when the system is + running). VeraCrypt encrypts the partition only if you choose to encrypt the whole system drive (as opposed to choosing to encrypt only the partition where Windows is installed).</p> +<p> </p> +<p><a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</body></html> diff --git a/doc/html/System Favorite Volumes.html b/doc/html/System Favorite Volumes.html new file mode 100644 index 00000000..4344d4ad --- /dev/null +++ b/doc/html/System Favorite Volumes.html @@ -0,0 +1,87 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="System%20Favorite%20Volumes.html">System Favorite Volumes</a> +</p></div> + +<div class="wikidoc"> +<h1>System Favorite Volumes</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>System favorites are useful, for example, in the following cases:</p> +<ul> +<li>You have volumes that need to be <strong>mounted before system and application services start and before users start logging on</strong>. +</li><li>There are network-shared folders located on VeraCrypt volumes. If you configure these volumes as system favorites, you will ensure that the +<strong>network shares will be automatically restored </strong>by the operating system each time it is restarted. +</li><li>You need each such volume to be mounted as <strong>the same drive letter </strong> +each time the operating system starts. </li></ul> +<p>Note that, unlike the regular (non-system) favorites, <strong>system favorite volumes use the pre-boot authentication password +</strong>and, therefore, require your system partition/drive to be encrypted (also note it is not required to enable caching of the pre-boot authentication password). Moreover, since the pre-boot password is typed using +<strong>US keyboard layout</strong> (BIOS requirement), the password of the system favorite volume must be entered during its creation process using the +<strong>US keyboard layout</strong> by typing the same keyboard keys you type when you enter the pre-boot authentication password. If the password of the system favorite volume is not identical to the pre-boot authentication password under the US keyboard layout, + then<strong> it will fail to mount</strong>.</p> +<p>When creating a volume that you want to make a system favorite later, you must explicitly set the keyboard layout associated with VeraCrypt to US layout and you have to type the same keyboard keys you type when you enter the pre-boot authentication password.<br> +<br> +System favorite volumes <strong>can be configured to be available within VeraCrypt only to users with administrator privileges +</strong>(select <em>Settings </em>> ‘<em>System Favorite Volumes</em>’ > ‘<em>Allow only administrators to view and dismount system favorite volumes in VeraCrypt</em>’). This option should be enabled on servers to ensure that + system favorite volumes cannot be dismounted by users without administrator privileges. On non-server systems, this option can be used to prevent normal VeraCrypt volume actions (such as ‘<em>Dismount All</em>’, auto-dismount, etc.) from affecting + system favorite volumes. In addition, when VeraCrypt is run without administrator privileges (the default on Windows Vista and later), system favorite volumes will not be displayed in the drive letter list in the main VeraCrypt application window.</p> +<h3>To configure a VeraCrypt volume as a system favorite volume, follow these steps:</h3> +<ol> +<li>Mount the volume (to the drive letter to which you want it to be mounted every time). +</li><li>Right-click the mounted volume in the drive list in the main VeraCrypt window and select ‘<em>Add to System Favorites</em>’. +</li><li>The System Favorites Organizer window should appear now. In this window, enable the option ‘<em>Mount system favorite volumes when Windows starts</em>’ and click +<em>OK</em>. </li></ol> +<p>The order in which system favorite volumes are displayed in the System Favorites Organizer window (<em>Favorites +</em>> ‘<em>Organize System Favorite Volumes</em>’) is <strong>the order in which the volumes are mounted</strong>. You can use the +<em>Move Up </em>and <em>Move Down </em>buttons to change the order of the volumes.</p> +<p id="Label">A special label can be assigned to each system favorite volume. This label is not the same as the filesystem label and it is shown within the VeraCrypt user interface instead of the volume path. To assign such a label, follow these steps:</p> +<ol> +<li>Select <em>Favorites </em>> ‘<em>Organize System Favorite Volumes</em>’. +</li><li>The System Favorites Organizer window should appear now. In this window, select the volume whose label you want to edit. +</li><li>Enter the label in the ‘<em>Label of selected favorite volume</em>’ input field and click OK. +</li></ol> +<p>Note that the System Favorites Organizer window (<em>Favorites </em>> ‘<em>Organize System Favorite Volumes</em>’) allows you to +<strong>set various options for each system favorite volume</strong>. For example, any of them can be mounted as read-only or as removable medium.<br> +<br> +Warning: When the drive letter assigned to a system favorite volume (saved in the configuration file) is not free, the volume is not mounted and no error message is displayed.<br> +<br> +Note that Windows needs to use some files (e.g. paging files, Active Directory files, etc.) before system favorite volumes are mounted. Therefore, such files cannot be stored on system favorite volumes. Note, however, that they +<em>can </em>be stored on any partition that is within the key scope of system encryption (e.g. on the system partition or on any partition of a system drive that is entirely encrypted by VeraCrypt).<br> +<br> +<strong>To remove a volume from the list of system favorite volumes</strong>, select +<em>Favorites </em>> <em>Organize System Favorite Volumes</em>, select the volume, click +<em>Remove</em>, and click OK.</p> +</div> +</div> + +</body></html> diff --git a/doc/html/Technical Details.html b/doc/html/Technical Details.html new file mode 100644 index 00000000..a5696e1d --- /dev/null +++ b/doc/html/Technical Details.html @@ -0,0 +1,59 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +</p></div> + +<div class="wikidoc"> +<h1>Technical Details</h1> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Notation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Notation</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Encryption%20Scheme.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Encryption Scheme</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Modes of Operation</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Header%20Key%20Derivation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Header Key Derivation, Salt, and Iteration Count</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Random%20Number%20Generator.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Random Number Generator</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Keyfiles.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Keyfiles</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">PIM</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="VeraCrypt%20Volume%20Format%20Specification.html" style="text-align:left; color:#0080c0; text-decoration:none.html">VeraCrypt Volume Format Specification</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Standard%20Compliance.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Compliance with Standards and Specifications</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Source%20Code.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Source Code</a> +</li></ul> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Trim Operation.html b/doc/html/Trim Operation.html new file mode 100644 index 00000000..fd9137ce --- /dev/null +++ b/doc/html/Trim Operation.html @@ -0,0 +1,50 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Trim%20Operation.html">Trim Operation</a> +</p></div> + +<div class="wikidoc"> +<h1>Trim Operation</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Some storage devices (e.g., some solid-state drives, including USB flash drives) use so-called 'trim' operation to mark drive sectors as free e.g. when a file is deleted. Consequently, such sectors may contain unencrypted zeroes or other undefined data (unencrypted) + even if they are located within a part of the drive that is encrypted by VeraCrypt. VeraCrypt does not block the trim operation on partitions that are within the key scope of +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +system encryption</a> (unless a <a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden operating system</a> is running) and under Linux on all volumes that use the Linux native kernel cryptographic services. In those cases, the adversary will be able to tell which sectors contain free space (and may be able to use this information for + further analysis and attacks) and <a href="Plausible%20Deniability.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +plausible deniability</a> may be negatively affected. If you want to avoid those issues, do not use +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +system encryption</a> on drives that use the trim operation and, under Linux, either configure VeraCrypt not to use the Linux native kernel cryptographic services or make sure VeraCrypt volumes are not located on drives that use the trim operation.</div> +<p>To find out whether a device uses the trim operation, please refer to documentation supplied with the device or contact the vendor/manufacturer.</p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Troubleshooting.html b/doc/html/Troubleshooting.html new file mode 100644 index 00000000..e56390af --- /dev/null +++ b/doc/html/Troubleshooting.html @@ -0,0 +1,434 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Troubleshooting.html">Troubleshooting</a> +</p></div> + +<div class="wikidoc"> +<h1>Troubleshooting</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +This section presents possible solutions to common problems that you may run into when using VeraCrypt.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: If your problem is not listed here, it might be listed in one of the following sections:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Incompatibilities.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Incompatibilities</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="Issues%20and%20Limitations.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Known Issues & Limitations</a> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<a href="FAQ.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Frequently Asked Questions</a> +</li></ul> +<table style="border-collapse:separate; border-spacing:0px; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif"> +<tbody style="text-align:left"> +<tr style="text-align:left"> +<td style="color:#000000; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; padding:15px; border:1px solid #000000"> +Make sure you use the latest stable version of VeraCrypt. If the problem is caused by a bug in an old version of VeraCrypt, it may have already been fixed. Note: Select +<em style="text-align:left"><strong style="text-align:left">Help</strong></em> > +<em style="text-align:left"><strong style="text-align:left">About</strong></em> to find out which version you use.</td> +</tr> +</tbody> +</table> +<p> </p> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Writing/reading to/from volume is very slow even though, according to the benchmark, the speed of the cipher that I'm using is higher than the speed of the hard drive.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +This is probably caused by an interfering application.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +First, make sure that your VeraCrypt container does not have a file extension that is reserved for executable files (for example, .exe, .sys, or .dll). If it does, Windows and antivirus software may interfere with the container and adversely affect the performance + of the volume.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Second, disable or uninstall any application that might be interfering, which usually is antivirus software or automatic disk defragmentation tool, etc. In case of antivirus software, it often helps to turn off real-time (on-access) scanning in the preferences + of the antivirus software. If it does not help, try temporarily disabling the virus protection software. If this does not help either, try uninstalling it completely and restarting your computer subsequently.</div> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">VeraCrypt volume cannot be mounted; VeraCrypt reports "</em>Incorrect password or not a VeraCrypt volume<em style="text-align:left">".</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The volume header may have been damaged by a third-party application or malfunctioning hardware component.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solutions: </strong></div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +You can try to restore the volume header from the backup embedded in the volume by following these steps: +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Run VeraCrypt. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Click <em style="text-align:left">Select Device</em> or <em style="text-align:left"> +Select File</em> to select your volume. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Select <em style="text-align:left"><a href="Program%20Menu.html#tools-restore-volume-header" style="text-align:left; color:#0080c0; text-decoration:none.html">Tools > Restore Volume Header</a></em>. +</li></ol> +</li></ul> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem:</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">After successfully mounting a volume, Windows reports "</em>This device does not contain a valid file system<em style="text-align:left">" or a similar error.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The file system on the VeraCrypt volume may be corrupted (or the volume is unformatted).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +You can use filesystem repair tools supplied with your operating system to attempt to repair the filesystem on the VeraCrypt volume. In Windows, it is the '<em style="text-align:left">chkdsk</em>' tool. VeraCrypt provides an easy way to use this tool on a VeraCrypt + volume: First, make a backup copy of the VeraCrypt volume (because the '<em style="text-align:left">chkdsk</em>' tool might damage the filesystem even more) and then mount it. Right-click the mounted volume in the main VeraCrypt window (in the drive list) + and from the context menu select '<em style="text-align:left">Repair Filesystem</em>'.</div> +<hr style="text-align:left"> +<div id="hidden_volume_small_max_size" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem:</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">When trying to create a hidden volume, its maximum possible size is unexpectedly small (there is much more free space than this on the outer volume).</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Causes: </strong></div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The outer volume has been formatted as NTFS </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Fragmentation </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Too small cluster size + too many files/folders in the root directory of the outer volume. +</li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solutions: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Solution Related to Cause 1:</div> +<blockquote style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Unlike the FAT filesystem, the NTFS filesystem always stores internal data exactly in the middle of the volume. Therefore, the hidden volume can reside only in the second half of the outer volume. If this constraint is unacceptable, do one of the following:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Reformat the outer volume as FAT and then create a hidden volume within it. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If the outer volume is too large to be formatted as FAT, split the volume to several 2-terabyte volumes (or 16-terabyte volumes if the device uses 4-kilobyte sectors) and format each of them as FAT. +</li></ul> +</blockquote> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Solution Related to Cause 2:</div> +<blockquote style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Create a new outer volume (defragmentation is not a solution, because it would adversely affect plausible deniability – see section +<a href="Defragmenting.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Defragmenting</a>).</div> +</blockquote> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Solution Related to Cause 3:</div> +<blockquote style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: The following solution applies only to hidden volumes created within FAT volumes.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Defragment the outer volume (mount it, right-click its drive letter in the '<em style="text-align:left">Computer</em>' or '<em style="text-align:left">My Computer</em>' window, click +<em style="text-align:left">Properties</em>, select the <em style="text-align:left"> +Tools</em> tab, and click '<em style="text-align:left">Defragment Now</em>'). After the volume is defragmented, exit +<em style="text-align:left">Disk Defragmenter</em> and try to create the hidden volume again. +<br style="text-align:left"> +<br style="text-align:left"> +If this does not help, delete <em style="text-align:left">all</em> files and folders on the outer volume by pressing Shift+Delete, not by formatting, (do not forget to disable the Recycle Bin and System Restore for this drive beforehand) and try creating the + hidden volume on this <em style="text-align:left">completely empty </em>outer volume again (for testing purposes only). If the maximum possible size of the hidden volume does not change even now, the cause of the problem is very likely an extended root directory. + If you did not use the '<em style="text-align:left">Default</em>' cluster size (the last step in the Wizard), reformat the outer volume and this time leave the cluster size at '<em style="text-align:left">Default</em>'.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If it does not help, reformat the outer volume again and copy less files/folders to its root folder than you did last time. If it does not help, keep reformatting and decreasing the number of files/folders in the root folder. If this is unacceptable or if it + does not help, reformat the outer volume and select a larger cluster size. If it does not help, keep reformatting and increasing the cluster size, until the problem is solved. Alternatively, try creating a hidden volume within an NTFS volume.</div> +</blockquote> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +One of the following problems occurs:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A VeraCrypt volume cannot be mounted. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +NTFS VeraCrypt volumes cannot be created. </li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +In addition, the following error may be reported: "<em style="text-align:left">The process cannot access the file because it is being used by another process.</em>"</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +This is probably caused by an interfering application. Note that this is not a bug in VeraCrypt. The operating system reports to VeraCrypt that the device is locked for an exclusive access by an application (so VeraCrypt is not allowed to access it).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +It usually helps to disable or uninstall the interfering application, which is usually an anti-virus utility, a disk management application, etc.</div> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">In the VeraCrypt Boot Loader screen, I'm trying to type my password and/or pressing other keys but the VeraCrypt boot loader is not responding.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +You have a USB keyboard (not a PS/2 keyboard) and pre-boot support for USB keyboards is disabled in your BIOS settings.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +You need to enable pre-boot support for USB keyboards in your BIOS settings. To do so, follow the below steps:</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Restart your computer, press F2 or Delete (as soon as you see a BIOS start-up screen), and wait until a BIOS configuration screen appears. If no BIOS configuration screen appears, restart (reset) the computer again and start pressing F2 or Delete repeatedly + as soon as you restart (reset) the computer. When a BIOS configuration screen appears, enable pre-boot support for USB keyboards. This can typically be done by selecting: +<em style="text-align:left">Advanced</em> > '<em style="text-align:left">USB Configuration</em>' > '<em style="text-align:left">Legacy USB Support</em>' (or '<em style="text-align:left">USB Legacy</em>') > +<em style="text-align:left">Enabled</em>. (Note that the word 'legacy' is in fact misleading, because pre-boot components of modern versions of MS Windows require this option to be enabled to allow user interaction/control.) Then save the BIOS settings (typically + by pressing F10) and restart your computer. For more information, please refer to the documentation for your BIOS/motherboard or contact your computer vendor's technical support team for assistance.</div> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">After the system partition/drive is encrypted, the computer cannot boot after it is restarted (it is also impossible to enter the BIOS configuration screen).</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Cause:</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +A bug in the BIOS of your computer.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solutions: </strong></div> +<p>Follow these steps:</p> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Disconnect the encrypted drive. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Connect an unencrypted drive with an installed operating system (or install it on the drive). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Upgrade the BIOS. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If it does not help, please report this bug to the manufacturer or vendor of the computer. +</li></ol> +<p>OR</p> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If the BIOS/motherboard/computer manufacturer/vendor does not provide any updates that resolve the issue and you use Windows 7 or later and there is an extra boot partition (whose size is less than 1 GB) on the drive, you can try reinstalling Windows without + this extra boot partition (to work around a bug in the BIOS). </li></ul> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +One of the following problems occurs:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">After the pre-boot authentication password is entered during the system encryption pretest, the computer hangs (after the message '</em>Booting...<em style="text-align:left">' is displayed).</em> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">When the system partition/drive is encrypted (partially or fully) and the system is restarted for the first time since the process of encryption of the system partition/drive started, the computer hangs after you enter the pre-boot + authentication password (after the message '</em>Booting...<em style="text-align:left">' is displayed).</em> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">After the hidden operating system is cloned and the password for it entered, the computer hangs (after the message '</em>Booting...'<em style="text-align:left"> is displayed).</em> +</li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +A bug in the BIOS of your computer or an issue with Windows bootloader.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution:</strong></div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Upgrade your BIOS (for information on how to do so, please refer to the documentation for your BIOS/motherboard or contact your computer vendor's technical support team for assistance). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Use a different motherboard model/brand. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If the BIOS/motherboard/computer manufacturer/vendor does not provide any updates that resolve the issue and you use Windows 7 or later and there is an extra boot partition (whose size is less than 1 GB) on the drive, you can try reinstalling Windows without + this extra boot partition (to work around a bug in the BIOS). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +There two other known workarounds for this issue that require having a Windows Installation disk: +<ul> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Boot your machine using a Windows Installation disk and select to repair your computer. Choose "Command Prompt" option and when it opens, type the commands below and then restart your system: +<ul> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +BootRec /fixmbr </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +BootRec /FixBoot </li></ul> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Delete the 100 MB System Reserved partition located at the beginning of your drive, set the system partition next to it as the active partition (both can be done using diskpart utility available in Windows Installation disk repair option). After that, run Startup + Repair after rebooting on Windows Installation disk. The following link contains detailed instructions: +<a href="https://www.sevenforums.com/tutorials/71363-system-reserved-partition-delete.html" target="_blank"> +https://www.sevenforums.com/tutorials/71363-system-reserved-partition-delete.html</a> +</li></ul> +</li></ul> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">When trying to encrypt the system partition/drive, during the pretest, the VeraCrypt Boot Loader always reports that the pre-boot authentication password I entered is incorrect (even though I'm sure it is correct).</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Causes:</strong></div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Different state of the <em style="text-align:left">Num Lock</em> and/or <em style="text-align:left"> +Caps Lock</em> key </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Data corruption </li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution: </strong></div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +When you <em style="text-align:left">set</em> a pre-boot authentication password, remember whether the +<em style="text-align:left">Num Lock</em> and <em style="text-align:left">Caps Lock</em> keys are on or off (depending on the manufacturer, the keys may have different labels, such as +<em style="text-align:left">Num LK</em>). Note: You can change the state of each of the keys as desired before you set the password, but you need to remember the states. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +When you enter the password in the VeraCrypt Boot Loader screen, make sure the state of each of the keys is the same as when you set the password. +</li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: For other possible solutions to this problem, see the other sections of this chapter.</div> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem:</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">When the system partition/drive is encrypted, the operating system 'freezes' for approx. 10-60 seconds every 5-60 minutes (100% CPU usage may co-occur).</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +A CPU and/or motherboard issue.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solutions: </strong></div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Try disabling all power-saving-related features (including any special CPU enhanced halt functions) in the BIOS settings and in the 'Power Options' Windows control panel. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Replace the processor with a different one (different type and/or brand). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Replace the motherboard with a different one (different type and/or brand). </li></ul> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem:</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">When mounting or dismounting a VeraCrypt volume, the system crashes (a 'blue screen' error screen appears or the +<span style="text-align:left">computer abruptly restarts)</span>.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +OR</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Since I installed VeraCrypt, the operating system has been crashing frequently.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Causes: </strong></div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A bug in a third-party application (e.g. antivirus, system "tweaker", driver, etc.) +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A bug in VeraCrypt </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A bug in Windows or a malfunctioning hardware component </li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solutions: </strong></div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Try disabling any antivirus tools, system "tweakers", and any other similar applications. If it does not help, try uninstalling them and restarting Windows. +<br style="text-align:left"> +<br style="text-align:left"> +If the problem persists, run VeraCrypt and select <em style="text-align:left">Help</em> > '<em style="text-align:left">Analyze a System Crash</em>' shortly after the system crashes or restarts. VeraCrypt will then analyze crash dump files that Windows automatically + created when it crashed (if any). If VeraCrypt determines that a bug in a third party driver is likely to have caused the crash, it will show the name and provider of the driver (note that updating or uninstalling the driver might resolve the issue). Whatever + the results, you will be able to choose to send us essential information about the system crash to help us determine whether it was caused by a bug in VeraCrypt. +</li></ul> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem:</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">On Windows 7/Vista (and possibly later versions), the Microsoft Windows Backup tool cannot be used to backup data to a non-system VeraCrypt Volume.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +A bug in the Windows Backup tool.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution: </strong></div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Mount the VeraCrypt volume to which you want to back up data. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Right-click a folder located on the volume (or right-click its drive letter in the '<em style="text-align:left">Computer</em>' list) and select an item from the '<em style="text-align:left">Share with</em>' submenu (on Windows Vista, select '<em style="text-align:left">Share</em>'). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Follow the instructions to share the folder with your user account. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +In the Windows Backup tool, select the shared folder (the network location/path) as the destination. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Start the backup process. </li></ol> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: The above solution does not apply to the <em style="text-align:left">Starter</em> and +<em style="text-align:left">Home</em> editions of Windows 7 (and possibly later versions).</div> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem:</strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">The label of a filesystem in a VeraCrypt volume cannot be changed from within the 'Computer' window under Windows Vista or a later version of Windows.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +A Windows issue causes the label to be written only to the Windows registry file, instead of being written to the filesystem.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solutions: </strong></div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Right-click the mounted volume in the '<em style="text-align:left">Computer</em>' window, select +<em style="text-align:left">Properties</em>, and enter a new label for the volume. +</li></ul> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">I cannot encrypt a partition/device because VeraCrypt Volume Creation Wizard says it is in use.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Close, disable, or uninstall all programs that might be using the partition/device in any way (for example an anti-virus utility). If it does not help, right-click the '<em style="text-align:left">Computer</em>' (or '<em style="text-align:left">My Computer</em>') + icon on your desktop and select <em style="text-align:left">Manage </em>-><em style="text-align:left"> Storage +</em>-><em style="text-align:left"> Disk Management.</em> Then right-click the partition that you want to encrypt, and click +<em style="text-align:left">Change Drive Letter and Paths. </em>Then click <em style="text-align:left"> +Remove</em> and <em style="text-align:left">OK. </em>Restart the operating system.</div> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">When creating a hidden volume, the Wizard reports that the outer volume cannot be locked.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The outer volume contains files being used by one or more applications.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Close all applications that are using files on the outer volume. If it does not help, try disabling or uninstalling any anti-virus utility you use and restarting the system subsequently.</div> +<hr style="text-align:left"> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Problem: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +When accessing a file-hosted container shared over a network, you receive one or both of the following error messages: +<br style="text-align:left"> +"<em style="text-align:left">Not enough server storage is available to process this command.</em>" and/or,<br style="text-align:left"> +"<em style="text-align:left">Not enough memory to complete transaction.</em>"</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Probable Cause: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">IRPStackSize</em> in the Windows registry may have been set to a too small value.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<strong style="text-align:left">Possible Solution: </strong></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Locate the <em style="text-align:left">IRPStackSize </em>key in the Windows registry and set it to a higher value. Then restart the system. If the key does not exist in the Windows registry, create it at +<em style="text-align:left">HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters</em> and set its value to 16 or higher. Then restart the system. For more information, see: +<a href="https://support.microsoft.com/kb/285089/" style="text-align:left; color:#0080c0; text-decoration:none"> +https://support.microsoft.com/kb/285089/ </a>and <a href="https://support.microsoft.com/kb/177078/" style="text-align:left; color:#0080c0; text-decoration:none"> +https://support.microsoft.com/kb/177078/</a></div> +<hr style="text-align:left"> +<p><br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> + See also: <a href="Issues%20and%20Limitations.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html"> +Known Issues & Limitations</a>, <a href="Incompatibilities.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Incompatibilities</a></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/TrueCrypt Support.html b/doc/html/TrueCrypt Support.html new file mode 100644 index 00000000..a259773b --- /dev/null +++ b/doc/html/TrueCrypt Support.html @@ -0,0 +1,41 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="TrueCrypt%20Support.html">TrueCrypt Support</a> +</p></div> + +<div class="wikidoc"> +<h1>TrueCrypt Support</h1> +<p>Starting from version 1.0f, VeraCrypt supports loading TrueCrypt volumes and partitions, both normal and hidden. In order to activate this, you have to check “TrueCrypt Mode” in the password prompt dialog as shown below.</p> +<p><img src="TrueCrypt Support_truecrypt_mode_gui.jpg" alt="TrueCrypt mode" width="499" height="205"></p> +<p><strong>Note:</strong> Only volumes and partitions created using TrueCrypt versions +<strong>6.x</strong> and <strong>7.x</strong> are supported.</p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/TrueCrypt Support_truecrypt_mode_gui.jpg b/doc/html/TrueCrypt Support_truecrypt_mode_gui.jpg Binary files differnew file mode 100644 index 00000000..3418e081 --- /dev/null +++ b/doc/html/TrueCrypt Support_truecrypt_mode_gui.jpg diff --git a/doc/html/Twofish.html b/doc/html/Twofish.html new file mode 100644 index 00000000..7d8ce2e8 --- /dev/null +++ b/doc/html/Twofish.html @@ -0,0 +1,46 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Encryption%20Algorithms.html">Encryption Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Twofish.html">Twofish</a> +</p></div> + +<div class="wikidoc"> +<h1>Twofish</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<p>Designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson; published in 1998. It uses a 256-bit key and 128-bit block and operates in XTS mode (see the section +<a href="Modes%20of%20Operation.html"><em>Modes of Operation</em></a>). Twofish was one of the AES finalists. This cipher uses key- dependent S-boxes. Twofish may be viewed as a collection of 2128 different cryptosystems, + where 128 bits derived from a 256-bit key control the selection of the cryptosystem [4]. In [13], the Twofish team asserts that key-dependent S-boxes constitute a form of security margin against unknown attacks [4].</p> +<p> </p> +<p><a href="Cascades.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Unencrypted Data in RAM.html b/doc/html/Unencrypted Data in RAM.html new file mode 100644 index 00000000..8917867a --- /dev/null +++ b/doc/html/Unencrypted Data in RAM.html @@ -0,0 +1,73 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Unencrypted%20Data%20in%20RAM.html">Unencrypted Data in RAM</a> +</p></div> + +<div class="wikidoc"> +<h1>Unencrypted Data in RAM</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +It is important to note that VeraCrypt is <em style="text-align:left">disk</em> encryption software, which encrypts only disks, not RAM (memory).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Keep in mind that most programs do not clear the memory area (buffers) in which they store unencrypted (portions of) files they load from a VeraCrypt volume. This means that after you exit such a program, unencrypted data it worked with may remain in memory + (RAM) until the computer is turned off (and, according to some researchers, even for some time after the power is turned off*). Also note that if you open a file stored on a VeraCrypt volume, for example, in a text editor and then force dismount on the VeraCrypt + volume, then the file will remain unencrypted in the area of memory (RAM) used by (allocated to) the text editor. This also applies to forced auto-dismount.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Inherently, unencrypted master keys have to be stored in RAM too. When a non-system VeraCrypt volume is dismounted, VeraCrypt erases its master keys (stored in RAM). When the computer is cleanly restarted (or cleanly shut down), all non-system VeraCrypt volumes + are automatically dismounted and, thus, all master keys stored in RAM are erased by the VeraCrypt driver (except master keys for system partitions/drives — see below). However, when power supply is abruptly interrupted, when the computer is reset (not + cleanly restarted), or when the system crashes, <strong style="text-align:left"> +VeraCrypt naturally stops running and therefore cannot </strong>erase any keys or any other sensitive data. Furthermore, as Microsoft does not provide any appropriate API for handling hibernation and shutdown, master keys used for system encryption cannot be + reliably (and are not) erased from RAM when the computer hibernates, is shut down or restarted.**</div> +<table style="border-collapse:separate; border-spacing:0px; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif"> +<tbody style="text-align:left"> +<tr style="text-align:left"> +<td style="text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; color:#ff0000; padding:15px; border:1px solid #000000"> +To summarize, VeraCrypt <strong style="text-align:left">cannot</strong> and does <strong style="text-align:left"> +not</strong> ensure that RAM contains no sensitive data (e.g. passwords, master keys, or decrypted data). Therefore, after each session in which you work with a VeraCrypt volume or in which an encrypted operating system is running, you must shut down (or, if + the <a href="Hibernation%20File.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hibernation file</a> is <a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +encrypted</a>, hibernate) the computer and then leave it powered off for at least several minutes (the longer, the better) before turning it on again. This is required to clear the RAM (also see the section +<a href="Hibernation%20File.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hibernation File</a>).</td> +</tr> +</tbody> +</table> +<p> </p> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* Allegedly, for 1.5-35 seconds under normal operating temperatures (26-44 °C) and up to several hours when the memory modules are cooled (when the computer is running) to very low temperatures + (e.g. -50 °C). New types of memory modules allegedly exhibit a much shorter decay time (e.g. 1.5-2.5 seconds) than older types (as of 2008).</span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">** Before a key can be erased from RAM, the corresponding VeraCrypt volume must be dismounted. For non-system volumes, this does not cause any problems. However, as Microsoft currently does not + provide any appropriate API for handling the final phase of the system shutdown process, paging files located on encrypted system volumes that are dismounted during the system shutdown process may still contain valid swapped-out memory pages (including portions + of Windows system files). This could cause 'blue screen' errors. Therefore, to prevent 'blue screen' errors, VeraCrypt does not dismount encrypted system volumes and consequently cannot clear the master keys of the system volumes when the system is shut down + or restarted.</span></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Uninstalling VeraCrypt.html b/doc/html/Uninstalling VeraCrypt.html new file mode 100644 index 00000000..e2ee600e --- /dev/null +++ b/doc/html/Uninstalling VeraCrypt.html @@ -0,0 +1,50 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Miscellaneous.html">Miscellaneous</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Uninstalling%20VeraCrypt.html">Uninstalling VeraCrypt</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>Uninstalling VeraCrypt</h1> +<p>To uninstall VeraCrypt on Windows XP, select <em>Start</em> menu > <em>Settings</em> > +<em>Control Panel</em> > <em>Add or Remove Programs</em>> <em>VeraCrypt</em> > +<em>Change/Remove</em>.</p> +<p>To uninstall VeraCrypt on Windows Vista or later, select <em>Start</em> menu > +<em>Computer</em> > <em>Uninstall or change a program</em> > <em>VeraCrypt</em> > +<em>Uninstall</em>.</p> +<p>To uninstall VeraCrypt on Linux, you have to run the following command as root: veracrypt-uninstall.sh. For example, on Ubuntu, you can type the following in Terminal: sudo veracrypt-uninstall.sh<br> +<br> +No VeraCrypt volume will be removed when you uninstall VeraCrypt. You will be able to mount your VeraCrypt volume(s) again after you install VeraCrypt or when you run it in portable mode.</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Using VeraCrypt Without Administrator Privileges.html b/doc/html/Using VeraCrypt Without Administrator Privileges.html new file mode 100644 index 00000000..c02320e6 --- /dev/null +++ b/doc/html/Using VeraCrypt Without Administrator Privileges.html @@ -0,0 +1,59 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Miscellaneous.html">Miscellaneous</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html">Using Without Admin Rights</a> +</p></div> + +<div class="wikidoc"> +<div> +<h2>Using VeraCrypt Without Administrator Privileges</h2> +<p>In Windows, a user who does not have administrator privileges <em>can</em> use VeraCrypt, but only after a system administrator installs VeraCrypt on the system. The reason for that is that VeraCrypt needs a device driver to provide transparent on-the-fly + encryption/decryption, and users without administrator privileges cannot install/start device drivers in Windows.<br> +<br> +After a system administrator installs VeraCrypt on the system, users without administrator privileges will be able to run VeraCrypt, mount/dismount any type of VeraCrypt volume, load/save data from/to it, and create file-hosted VeraCrypt volumes on the system. + However, users without administrator privileges cannot encrypt/format partitions, cannot create NTFS volumes, cannot install/uninstall VeraCrypt, cannot change passwords/keyfiles for VeraCrypt partitions/devices, cannot backup/restore headers of VeraCrypt + partitions/devices, and they cannot run VeraCrypt in ‘portable’ mode.</p> +<div> +<table style="border-collapse:separate; border-spacing:0px; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif"> +<tbody style="text-align:left"> +<tr style="text-align:left"> +<td style="text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; color:#ff0000; padding:15px; border:1px solid #000000"> +Warning: No matter what kind of software you use, as regards personal privacy in most cases, it is +<em>not</em> safe to work with sensitive data under systems where you do not have administrator privileges, as the administrator can easily capture and copy your sensitive data, including passwords and keys.</td> +</tr> +</tbody> +</table> +<p> </p> +</div> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/VeraCrypt Background Task.html b/doc/html/VeraCrypt Background Task.html new file mode 100644 index 00000000..7cacb13f --- /dev/null +++ b/doc/html/VeraCrypt Background Task.html @@ -0,0 +1,54 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Miscellaneous.html">Miscellaneous</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20Background%20Task.html">Background Task</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>VeraCrypt Background Task</h1> +<p>When the main VeraCrypt window is closed, the VeraCrypt Background Task takes care of the following tasks/functions:</p> +<ol> +<li>Hot keys </li><li>Auto-dismount (e.g., upon logoff, inadvertent host device removal, time-out, etc.) +</li><li>Auto-mount of favorite volumes </li><li>Notifications (e.g., when damage to hidden volume is prevented) </li><li>Tray icon </li></ol> +<p>WARNING: If neither the VeraCrypt Background Task nor VeraCrypt is running, the above- mentioned tasks/functions are disabled.<br> +<br> +The VeraCrypt Background Task is actually the Vera<em>Crypt.exe</em> application, which continues running in the background after you close the main VeraCrypt window. Whether it is running or not can be determined by looking at the system tray area. If you + can see the VeraCrypt icon there, then the VeraCrypt Background Task is running. You can click the icon to open the main VeraCrypt window. Right-click on the icon opens a popup menu with various VeraCrypt-related functions.<br> +<br> +You can shut down the Background Task at any time by right-clicking the VeraCrypt tray icon and selecting +<em>Exit</em>. If you need to disable the VeraCrypt Background Task completely and permanently, select +<em>Settings</em> -> <em>Preferences</em> and uncheck the option <em>Enabled</em> in the Vera<em>Crypt Background Task</em> area of the +<em>Preferences</em> dialog window.</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/VeraCrypt Hidden Operating System.html b/doc/html/VeraCrypt Hidden Operating System.html new file mode 100644 index 00000000..03ba1679 --- /dev/null +++ b/doc/html/VeraCrypt Hidden Operating System.html @@ -0,0 +1,259 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Plausible%20Deniability.html">Plausible Deniability</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20Hidden%20Operating%20System.html">Hidden Operating System</a> +</p></div> + +<div class="wikidoc"> +<h1>Hidden Operating System</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If your system partition or system drive is encrypted using VeraCrypt, you need to enter your +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +pre-boot authentication</a> password in the VeraCrypt Boot Loader screen after you turn on or restart your computer. It may happen that you are forced by somebody to decrypt the operating system or to reveal the pre-boot authentication password. There are many + situations where you cannot refuse to do so (for example, due to extortion). VeraCrypt allows you to create a hidden operating system whose existence should be impossible to prove (provided that certain guidelines are followed — see below). Thus, you + will not have to decrypt or reveal the password for the hidden operating system.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Before you continue reading this section, make sure you have read the section <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +<strong style="text-align:left">Hidden Volume</strong></a> and that you understand what a +<a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden VeraCrypt volume</a> is.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +A <strong style="text-align:left">hidden operating system</strong> is a system (for example, Windows 7 or Windows XP) that is installed in a +<a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden VeraCrypt volume</a>. It should be impossible to prove that a <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden VeraCrypt volume</a> exists (provided that certain guidelines are followed; for more information, see the section +<a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Volume</a>) and, therefore, it should be impossible to prove that a hidden operating system exists.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +However, in order to boot a system encrypted by VeraCrypt, an unencrypted copy of the +<a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Boot Loader</a> has to be stored on the system drive or on a <a href="VeraCrypt%20Rescue%20Disk.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt Rescue Disk</a>. Hence, the mere presence of the VeraCrypt Boot Loader can indicate that there is a system encrypted by VeraCrypt on the computer. Therefore, to provide a plausible explanation for the presence of the VeraCrypt Boot Loader, the VeraCrypt + wizard helps you create a second encrypted operating system, so-called <strong style="text-align:left"> +decoy operating system</strong>, during the process of creation of a hidden operating system. A decoy operating system must not contain any sensitive files. Its existence is not secret (it is +<em style="text-align:left">not</em> installed in a <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden volume</a>). The password for the decoy operating system can be safely revealed to anyone forcing you to disclose your pre-boot authentication password.*</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +You should use the decoy operating system as frequently as you use your computer. Ideally, you should use it for all activities that do not involve sensitive data. Otherwise, plausible deniability of the hidden operating system might be adversely affected (if + you revealed the password for the decoy operating system to an adversary, he could find out that the system is not used very often, which might indicate the existence of a hidden operating system on your computer). Note that you can save data to the decoy + system partition anytime without any risk that the hidden volume will get damaged (because the decoy system is +<em style="text-align:left">not</em> installed in the outer volume — see below).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +There will be two pre-boot authentication passwords — one for the hidden system and the other for the decoy system. If you want to start the hidden system, you simply enter the password for the hidden system in the VeraCrypt Boot Loader screen (which + appears after you turn on or restart your computer). Likewise, if you want to start the decoy system (for example, when asked to do so by an adversary), you just enter the password for the decoy system in the VeraCrypt Boot Loader screen.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: When you enter a pre-boot authentication password, the VeraCrypt Boot Loader first attempts to decrypt (using the entered password) the last 512 bytes of the first logical track of the system drive (where encrypted master key data for non-hidden encrypted + system partitions/drives are normally stored). If it fails and if there is a partition behind the active partition, the VeraCrypt Boot Loader (even if there is actually no hidden volume on the drive) automatically tries to decrypt (using the same entered password + again) the area of the first partition behind the active partition where the encrypted header of a possible hidden volume might be stored (however, if the size of the active partition is less than 256 MB, then the data is read from the +<em style="text-align:left">second</em> partition behind the active one, because Windows 7 and later, by default, do not boot from the partition on which they are installed). Note that VeraCrypt never knows if there is a hidden volume in advance (the hidden + volume header cannot be identified, as it appears to consist entirely of random data). If the header is successfully decrypted (for information on how VeraCrypt determines that it was successfully decrypted, see the section +<a href="Encryption%20Scheme.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Encryption Scheme</a>), the information about the size of the hidden volume is retrieved from the decrypted header (which is still stored in RAM), and the hidden volume is mounted (its size also determines its offset). For further technical details, see the + section <a href="Encryption%20Scheme.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Encryption Scheme</a> in the chapter <a href="Technical%20Details.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Technical Details</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +When running, the hidden operating system appears to be installed on the same partition as the original operating system (the decoy system). However, in reality, it is installed within the partition behind it (in a hidden volume). All read/write operations + are transparently redirected from the system partition to the hidden volume. Neither the operating system nor applications will know that data written to and read from the system partition is actually written to and read from the partition behind it (from/to + a hidden volume). Any such data is encrypted and decrypted on the fly as usual (with an encryption key different from the one that is used for the decoy operating system).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note that there will also be a third password — the one for the <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +<strong style="text-align:left">outer volume</strong></a>. It is not a pre-boot authentication password, but a regular VeraCrypt volume password. It can be safely disclosed to anyone forcing you to reveal the password for the encrypted partition where the hidden + volume (containing the hidden operating system) resides. Thus, the existence of the hidden volume (and of the hidden operating system) will remain secret. If you are not sure you understand how this is possible, or what an outer volume is, please read the + section <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Volume</a>. The outer volume should contain some sensitive-looking files that you actually do +<em style="text-align:left">not</em> want to hide.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To summarize, there will be three passwords in total. Two of them can be revealed to an attacker (for the decoy system and for the outer volume). The third password, for the hidden system, must remain secret.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<img src="Beginner's Tutorial_Image_034.png" alt="Example Layout of System Drive Containing Hidden Operating System" width="604" height="225"></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Example Layout of System Drive Containing Hidden Operating System</em></div> +<p> </p> +<h4 id="CreationProcess" style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:12px; margin-bottom:1px"> +Process of Creation of Hidden Operating System</h4> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To start the process of creation of a hidden operating system, select <em style="text-align:left"> +System</em> > <em style="text-align:left">Create Hidden Operating System</em> and then follow the instructions in the wizard.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Initially, the wizard verifies that there is a suitable partition for a hidden operating system on the system drive. Note that before you can create a hidden operating system, you need to create a partition for it on the system drive. It must be the first partition + behind the system partition and it must be at least 5% larger than the system partition (the system partition is the one where the currently running operating system is installed). However, if the outer volume (not to be confused with the system partition) + is formatted as NTFS, the partition for the hidden operating system must be at least 110% (2.1 times) larger than the system partition (the reason is that the NTFS file system always stores internal data exactly in the middle of the volume and, therefore, + the hidden volume, which is to contain a clone of the system partition, can reside only in the second half of the partition).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +In the next steps, the wizard will create two VeraCrypt volumes (<a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html">outer and hidden</a>) within the first partition behind the + system partition. The <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden volume</a> will contain the hidden operating system. The size of the hidden volume is always the same as the size of the system partition. The reason is that the hidden volume will need to contain a clone of the content of the system partition (see below). + Note that the clone will be encrypted using a different encryption key than the original. Before you start copying some sensitive-looking files to the outer volume, the wizard tells you the maximum recommended size of space that the files should occupy, so + that there is enough free space on the outer volume for the hidden volume.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Remark: After you copy some sensitive-looking files to the outer volume, the cluster bitmap of the volume will be scanned in order to determine the size of uninterrupted area of free space whose end is aligned with the end of the outer volume. This area will + accommodate the hidden volume, so it limits its maximum possible size. The maximum possible size of the hidden volume will be determined and it will be verified that it is greater than the size of the system partition (which is required, because the entire + content of the system partition will need to be copied to the hidden volume — see below). This ensures that no data stored on the outer volume will be overwritten by data written to the area of the hidden volume (e.g. when the system is being copied + to it). The size of the hidden volume is always the same as the size of the system partition.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Then, VeraCrypt will create the hidden operating system by copying the content of the system partition to the hidden volume. Data being copied will be encrypted on the fly with an encryption key different from the one that will be used for the decoy operating + system. The process of copying the system is performed in the pre-boot environment (before Windows starts) and it may take a long time to complete; several hours or even several days (depending on the size of the system partition and on the performance of + the computer). You will be able to interrupt the process, shut down your computer, start the operating system and then resume the process. However, if you interrupt it, the entire process of copying the system will have to start from the beginning (because + the content of the system partition must not change during cloning). The hidden operating system will initially be a clone of the operating system under which you started the wizard.</div> +<div id="SecureEraseOS" style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Windows creates (typically, without your knowledge or consent) various log files, temporary files, etc., on the system partition. It also saves the content of RAM to hibernation and paging files located on the system partition. Therefore, if an adversary analyzed + files stored on the partition where the original system (of which the hidden system is a clone) resides, he might find out, for example, that you used the VeraCrypt wizard in the hidden-system-creation mode (which might indicate the existence of a hidden operating + system on your computer). To prevent such issues, VeraCrypt will securely erase the entire content of the partition where the original system resides after the hidden system has been created. Afterwards, in order to achieve plausible deniability, VeraCrypt + will prompt you to install a new system on the partition and encrypt it using VeraCrypt. Thus, you will create the decoy system and the whole process of creation of the hidden operating system will be completed.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Note: VeraCrypt will erase the content of the partition where the original system resides by filling it with random data entirely. If you revealed the password for the decoy system to an adversary and he asked you why the free space of the (decoy) system partition + contains random data, you could answer, for example: "The partition previously contained a system encrypted by VeraCrypt, but I forgot the pre-boot authentication password (or the system was damaged and stopped booting), so I had to reinstall Windows and encrypt + the partition again."</div> +<h4 id="data_leak_protection" style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:12px; margin-bottom:1px"> +Plausible Deniability and Data Leak Protection</h4> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +For security reasons, when a hidden operating system is running, VeraCrypt ensures that all local unencrypted filesystems and non-hidden VeraCrypt volumes are read-only (i.e. no files can be written to such filesystems or VeraCrypt volumes).† Data is + allowed to be written to any filesystem that resides within a <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden VeraCrypt volume</a> (provided that the hidden volume is not located in a container stored on an unencrypted filesystem or on any other read-only filesystem).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +There are three main reasons why such countermeasures have been implemented:</div> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +It enables the creation of a secure platform for mounting of hidden VeraCrypt volumes. Note that we officially recommend that hidden volumes are mounted only when a hidden operating system is running. For more information, see the subsection +<a href="Security%20Requirements%20for%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions Pertaining to Hidden Volumes</a>. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +In some cases, it is possible to determine that, at a certain time, a particular filesystem was not mounted under (or that a particular file on the filesystem was not saved or accessed from within) a particular instance of an operating system (e.g. by analyzing + and comparing filesystem journals, file timestamps, application logs, error logs, etc). This might indicate that a hidden operating system is installed on the computer. The countermeasures prevent these issues. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +It prevents data corruption and allows safe hibernation. When Windows resumes from hibernation, it assumes that all mounted filesystems are in the same state as when the system entered hibernation. VeraCrypt ensures this by write-protecting any filesystem accessible + both from within the decoy and hidden systems. Without such protection, the filesystem could become corrupted when mounted by one system while the other system is hibernated. +</li></ol> +<p>If you need to securely transfer files from the decoy system to the hidden system, follow these steps:</p> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Start the decoy system. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Save the files to an unencrypted volume or to an outer/normal VeraCrypt volume. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Start the hidden system </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If you saved the files to a VeraCrypt volume, mount it (it will be automatically mounted as read-only). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Copy the files to the hidden system partition or to another hidden volume. </li></ol> +<p> </p> +<h4 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:12px; margin-bottom:1px"> +Possible Explanations for Existence of Two VeraCrypt Partitions on Single Drive</h4> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +An adversary might ask why you created two VeraCrypt-encrypted partitions on a single drive (a system partition and a non-system partition) rather than encrypting the entire disk with a single encryption key. There are many possible reasons to do that. However, + if you do not know any (other than creating a hidden operating system), you can provide, for example, one of the following explanations:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If there are more than two partitions on a system drive and you want to encrypt only two of them (the system partition and the one behind it) and to leave the other partitions unencrypted (for example, to achieve the best possible performance when reading and + writing data, which is not sensitive, to such unencrypted partitions), the only way to do that is to encrypt both partitions separately (note that, with a single encryption key, VeraCrypt could encrypt the entire system drive and +<em style="text-align:left">all</em> partitions on it, but it cannot encrypt only two of them — only one or all of the partitions can be encrypted with a single key). As a result, there will be two adjacent VeraCrypt partitions on the system drive (the + first will be a system partition, the second will be a non-system one), each encrypted with a different key (which is also the case when you create a hidden operating system, and therefore it can be explained this way).<br style="text-align:left"> +<br style="text-align:left"> +If you do not know any good reason why there should be more than one partition on a system drive at all:<br style="text-align:left"> +<br style="text-align:left"> +It is generally recommended to separate non-system files (documents) from system files. One of the easiest and most reliable ways to do that is to create two partitions on the system drive; one for the operating system and the other for documents (non-system + files). The reasons why this practice is recommended include: +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If the filesystem on one of the partitions is damaged, files on the partition may get corrupted or lost, whereas files on the other partition are not affected. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +It is easier to reinstall the system without losing your documents (reinstallation of an operating system involves formatting the system partition, after which all files stored on it are lost). If the system is damaged, full reinstallation is often the only + option. </li></ul> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +A <a href="Cascades.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +cascade encryption algorithm</a> (e.g. AES-Twofish-Serpent) can be many times slower than a non-cascade one (e.g. +<a href="AES.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +AES</a>). However, a cascade encryption algorithm may be more secure than a non-cascade one (for example, the probability that three distinct encryption algorithms will be broken, e.g. due to advances in cryptanalysis, is significantly lower than the probability + that only one of them will be broken). Therefore, if you encrypt the outer volume with a cascade encryption algorithm and the decoy system with a non-cascade encryption algorithm, you can answer that you wanted the best performance (and adequate security) + for the system partition, and the highest possible security (but worse performance) for the non-system partition (i.e. the outer volume), where you store the most sensitive data, which you do not need to access very often (unlike the operating system, which + you use very often, and therefore you need it to have the best possible performance). On the system partition, you store data that is less sensitive (but which you need to access very often) than data you store on the non-system partition (i.e. on the outer + volume). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Provided that you encrypt the outer volume with a cascade encryption algorithm (e.g. AES-Twofish-Serpent) and the decoy system with a non-cascade encryption algorithm (e.g. AES), you can also answer that you wanted to prevent the problems about which VeraCrypt + warns when the user attempts to choose a cascade encryption algorithm for system encryption (see below for a list of the problems). Therefore, to prevent those problems, you decided to encrypt the system partition with a non-cascade encryption algorithm. However, + you still wanted to use a cascade encryption algorithm (because it is more secure than a non-cascade encryption algorithm) for the most sensitive data, so you decided to create a second partition, which those problems do +<em style="text-align:left">not</em> affect (because it is non-system) and to encrypt it with a cascade encryption algorithm. On the system partition, you store data that is less sensitive than data you store on the non-system partition (i.e. on the outer volume). +<br style="text-align:left"> +<br style="text-align:left"> +Note: When the user attempts to encrypt the system partition with a cascade encryption algorithm, VeraCrypt warns him or her that it can cause the following problems (and implicitly recommends to choose a non-cascade encryption algorithm instead): +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px; font-size:10px; line-height:12px"> +For cascade encryption algorithms, the VeraCrypt Boot Loader is larger than normal and, therefore, there is not enough space in the first drive track for a backup of the VeraCrypt Boot Loader. Hence, +<em style="text-align:left">whenever</em> it gets damaged (which often happens, for example, during inappropriately designed anti-piracy activation procedures of certain programs), the user must use the VeraCrypt Rescue Disk to repair the VeraCrypt Boot Loader + or to boot. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px; font-size:10px; line-height:12px"> +On some computers, resuming from hibernation takes longer. </li></ul> +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +In contrast to a password for a non-system VeraCrypt volume, a pre-boot authentication password needs to be typed each time the computer is turned on or restarted. Therefore, if the pre-boot authentication password is long (which is required for security purposes), + it may be very tiresome to type it so frequently. Hence, you can answer that it was more convenient for you to use a short (and therefore weaker) password for the system partition (i.e. the decoy system) and that it is more convenient for you to store the + most sensitive data (which you do not need to access as often) in the non-system VeraCrypt partition (i.e. in the outer volume) for which you chose a very long password. +<br style="text-align:left"> +<br style="text-align:left"> +As the password for the system partition is not very strong (because it is short), you do not intentionally store sensitive data on the system partition. However, you still prefer the system partition to be encrypted, because potentially sensitive or mildly + sensitive data is stored on it as a result of your everyday use of the computer (for example, passwords to online forums you visit, which can be automatically remembered by your browser, browsing history, applications you run, etc.) +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +When an attacker gets hold of your computer when a VeraCrypt volume is mounted (for example, when you use a laptop outside), he can, in most cases, read any data stored on the volume (data is decrypted on the fly as he reads it). Therefore, it may be wise to + limit the time the volume is mounted to a minimum. Obviously, this may be impossible or difficult if the sensitive data is stored on an encrypted system partition or on an entirely encrypted system drive (because you would also have to limit the time you work + with the computer to a minimum). Hence, you can answer that you created a separate partition (encrypted with a different key than your system partition) for your most sensitive data and that you mount it only when necessary and dismount it as soon as possible + (so as to limit the time the volume is mounted to a minimum). On the system partition, you store data that is less sensitive (but which you need to access often) than data you store on the non-system partition (i.e. on the outer volume). +</li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> + </div> +<h4 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:12px; margin-bottom:1px"> +Safety/Security Precautions and Requirements Pertaining to Hidden Operating Systems</h4> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +As a hidden operating system resides in a hidden VeraCrypt volume, a user of a hidden operating system must follow all of the security requirements and precautions that apply to normal hidden VeraCrypt volumes. These requirements and precautions, as well as + additional requirements and precautions pertaining specifically to hidden operating systems, are listed in the subsection +<a href="Security%20Requirements%20for%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions Pertaining to Hidden Volumes</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +WARNING: If you do not protect the hidden volume (for information on how to do so, refer to the section +<a href="Protection%20of%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Protection of Hidden Volumes Against Damage</a>), do <em style="text-align:left"> +not</em> write to the outer volume (note that the decoy operating system is <em style="text-align:left"> +not</em> installed in the outer volume). Otherwise, you may overwrite and damage the hidden volume (and the hidden operating system within it)!</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If all the instructions in the wizard have been followed and if the security requirements and precautions listed in the subsection +<a href="Security%20Requirements%20for%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Security Requirements and Precautions Pertaining to Hidden Volumes</a> are followed, it should be impossible to prove that the hidden volume and hidden operating system exist, even when the outer volume is mounted or when the decoy operating system is decrypted + or started.</div> +<p> </p> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* It is not practical (and therefore is not supported) to install operating systems in two VeraCrypt volumes that are embedded within a single partition, because using the outer operating system + would often require data to be written to the area of the hidden operating system (and if such write operations were prevented using the +<a href="Protection%20of%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden volume protection</a> feature, it would inherently cause system crashes, i.e. 'Blue Screen' errors).<br style="text-align:left"> +† This does not apply to filesystems on CD/DVD-like media and on custom, atypical, or non-standard devices/media.</span><br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> + See also: <strong style="text-align:left"><a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none">System Encryption</a></strong>, <strong style="text-align:left"><a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html">Hidden + Volume</a></strong></p> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/VeraCrypt License.html b/doc/html/VeraCrypt License.html new file mode 100644 index 00000000..6b670e1c --- /dev/null +++ b/doc/html/VeraCrypt License.html @@ -0,0 +1,408 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20License.html">VeraCrypt License</a> +</p></div> + +<div class="wikidoc"> +<h1><strong style="text-align:left">VeraCrypt License</strong></h1> +<p>Software distributed under this license is distributed on an "AS IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE SOFTWARE + IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE SOFTWARE, NOR ANY PART(S) THEREOF.</p> +<p>VeraCrypt is multi-licensed under <a href="https://www.apache.org/licenses/LICENSE-2.0">Apache License 2.0</a> and the TrueCrypt License version 3.0, a verbatim copy of both licenses can be found below.<br> +<br> +This license does not grant you rights to use any contributors' name, logo, or trademarks, including IDRIX, +<br> +VeraCrypt and all derivative names. For example, the following names are not allowed: VeraCrypt, VeraCrypt+, VeraCrypt Professional, iVeraCrypt, etc. Nor any other names confusingly similar to the name VeraCrypt (e.g., Vera-Crypt, Vera Crypt, VerKrypt, etc.).</p> +<div id="left_column"> +<p id="license_text">Apache License<br> +Version 2.0, January 2004<br> +http://www.apache.org/licenses/<br> +<br> +TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION<br> +<br> +1. Definitions.<br> +<br> +"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.<br> +<br> +"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.<br> +<br> +"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.<br> +<br> +"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.<br> +<br> +"Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files.<br> +<br> +"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.<br> +<br> +"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).<br> +<br> +"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. + For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.<br> +<br> +"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright + owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including + but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that + is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."<br> +<br> +"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.<br> +<br> +2. Grant of Copyright License.<br> +<br> +Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, + sublicense, and distribute the Work and such Derivative Works in Source or Object form.<br> +<br> +3. Grant of Patent License.<br> +<br> +Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, + sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which + such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent + infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.<br> +<br> +4. Redistribution.<br> +<br> +You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:<br> +<br> +1. You must give any other recipients of the Work or Derivative Works a copy of this License; and<br> +<br> +2. You must cause any modified files to carry prominent notices stating that You changed the files; and<br> +<br> +3. You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; + and<br> +<br> +4. If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to + any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated + by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You + distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.<br> +<br> +You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.<br> +<br> +5. Submission of Contributions.<br> +<br> +Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, + nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.<br> +<br> +6. Trademarks.<br> +<br> +This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.<br> +<br> +7. Disclaimer of Warranty.<br> +<br> +Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, + any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise + of permissions under this License.<br> +<br> +8. Limitation of Liability.<br> +<br> +In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, + including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer + failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.<br> +<br> +9. Accepting Warranty or Additional Liability.<br> +<br> +While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, + You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor + by reason of your accepting any such warranty or additional liability.</p> +</div> +<hr> +<p>TrueCrypt License Version 3.0<br> +<br> +Software distributed under this license is distributed on an "AS<br> +IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND<br> +DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO<br> +USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE<br> +SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE<br> +BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT<br> +ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE<br> +SOFTWARE, NOR ANY PART(S) THEREOF.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">I. Definitions</strong><br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">1</strong>. "This Product" means the work (including, but not limited to, source code, graphics, texts, and accompanying files) made available under and governed by this version of this license ("License"), as may be indicated + by, but is not limited to, copyright notice(s) attached to or included in the work.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">2</strong>. "You" means (and "Your" refers to) an individual or a legal entity (e.g., a non-profit organization, commercial organization, government agency, etc.) exercising permissions granted by this License.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">3</strong>. "Modification" means (and "modify" refers to) any alteration of This Product, including, but not limited to, addition to or deletion from the substance or structure of This Product, translation into another language, + repackaging, alteration or removal of any file included with This Product, and addition of any new files to This Product.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">4</strong>. "Your Product" means This Product modified by You, or any work You derive from (or base on) any part of This Product. In addition, "Your Product" means any work in which You include any (modified or unmodified) portion + of This Product. However, if the work in which you include it is an aggregate software distribution (such as an operating system distribution or a cover CD-ROM of a magazine) containing multiple separate products, then the term "Your Product" includes only + those products (in the aggregate software distribution) that use, include, or depend on a modified or unmodified version of This Product (and the term "Your Product" does not include the whole aggregate software distribution). For the purposes of this License, + a product suite consisting of two or more products is considered a single product (operating system distributions and cover media of magazines are not considered product suites).<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">5</strong>. "Distribution" means (and "distribute" refers to), regardless of means or methods, conveyance, transfer, providing, or making available of This/Your Product or portions thereof to third parties (including, but not + limited to, making This/Your Product, or portions thereof, available for download to third parties, whether or not any third party has downloaded the product, or any portion thereof, made available for download).<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">II. Use, Copying, and Distribution of This Product</strong><br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">1</strong>. Provided that You comply with all applicable terms and conditions of this License, You may make copies of This Product (unmodified) and distribute copies of This Product (unmodified) that are not included in another + product forming Your Product (except as permitted under Chapter III). Note: For terms and conditions for copying and distribution of modified versions of This Product, see Chapter III.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">2</strong>. Provided that You comply with all applicable terms and conditions of this License, You may use This Product freely (see also Chapter III) on any number of computers/systems for non-commercial and/or commercial purposes.<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">III. Modification, Derivation, and Inclusion in Other Products</strong><br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">1</strong>. If all conditions specified in the following paragraphs in this Chapter (III) are met (for exceptions, see Section III.2) and if You comply with all other applicable terms and conditions of this License, You may modify + This Product (thus forming Your Product), derive new works from This Product or portions thereof (thus forming Your Product), include This Product or portions thereof in another product (thus forming Your Product, unless defined otherwise in Chapter I), and + You may use (for non-commercial and/or commercial purposes), copy, and/or distribute Your Product.</p> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The name of Your Product (or of Your modified version of This Product) must not contain the name TrueCrypt (for example, the following names are not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor any other names confusingly similar + to the name TrueCrypt (e.g., True-Crypt, True Crypt, TruKrypt, etc.)<br style="text-align:left"> +<br style="text-align:left"> +All occurrences of the name TrueCrypt that could reasonably be considered to identify Your Product must be removed from Your Product and from any associated materials. Logo(s) included in (or attached to) Your Product (and in/to associated materials) must not + incorporate and must not be confusingly similar to any of the TrueCrypt logos (including, but not limited to, the non-textual logo consisting primarily of a key in stylized form) or portion(s) thereof. All graphics contained in This Product (logos, icons, + etc.) must be removed from Your Product (or from Your modified version of This Product) and from any associated materials. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The following phrases must be removed from Your Product and from any associated materials, except the text of this License: "A TrueCrypt Foundation Release", "Released by TrueCrypt Foundation", "This is a TrueCrypt Foundation release." +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Phrase "<em style="text-align:left">Based on TrueCrypt, freely available at www.truecrypt.org</em>" must be displayed by Your Product (if technically feasible) and contained in its documentation. Alternatively, if This Product or its portion You included in + Your Product constitutes only a minor portion of Your Product, phrase "<em style="text-align:left">Portions of this product are based in part on TrueCrypt, freely available at www.truecrypt.org</em>" may be displayed instead. In each of the cases mentioned + above in this paragraph, "<em style="text-align:left">www.truecrypt.org</em>" must be a hyperlink (if technically feasible) pointing to www.truecrypt.org and You may freely choose the location within the user interface (if there is any) of Your Product (e.g., + an "About" window, etc.) and the way in which Your Product will display the respective phrase.<br style="text-align:left"> +<br style="text-align:left"> +Your Product (and any associated materials, e.g., the documentation, the content of the official web site of Your Product, etc.) must not present any Internet address containing the domain name truecrypt.org (or any domain name that forwards to the domain name + truecrypt.org) in a manner that might suggest that it is where information about Your Product may be obtained or where bugs found in Your Product may be reported or where support for Your Product may be available or otherwise attempt to indicate that the domain + name truecrypt.org is associated with Your Product. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +The complete source code of Your Product must be freely and publicly available (for exceptions, see Section III.2) at least until You cease to distribute Your Product. This condition can be met in one or both of the following ways: (i) You include the complete + source code of Your Product with every copy of Your Product that You make and distribute and You make all such copies of Your Product available to the general public free of charge, and/or (ii) You include information (valid and correct at least until You + cease to distribute Your Product) about where the complete source code of Your Product can be obtained free of charge (e.g., an Internet address) or for a reasonable reproduction fee with every copy of Your Product that You make and distribute and, if there + is a web site officially associated with Your Product, You include the aforementioned information about the source code on a freely and publicly accessible web page to which such web site links via an easily viewable hyperlink (at least until You cease to + distribute Your Product).<br style="text-align:left"> +<br style="text-align:left"> +The source code of Your Product must not be deliberately obfuscated and it must not be in an intermediate form (e.g., the output of a preprocessor). Source code means the preferred form in which a programmer would usually modify the program.<br style="text-align:left"> +<br style="text-align:left"> +Portions of the source code of Your Product not contained in This Product (e.g., portions added by You in creating Your Product, whether created by You or by third parties) must be available under license(s) that (however, see also Subsection III.1.e) allow(s) + anyone to modify and derive new works from the portions of the source code that are not contained in This Product and to use, copy, and redistribute such modifications and/or derivative works. The license(s) must be perpetual, non-exclusive, royalty-free, + no-charge, and worldwide, and must not invalidate, weaken, restrict, interpret, amend, modify, interfere with or otherwise affect any part, term, provision, or clause of this License. The text(s) of the license(s) must be included with every copy of Your Product + that You make and distribute. </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +You must not change the license terms of This Product in any way (adding any new terms is considered changing the license terms even if the original terms are retained), which means, e.g., that no part of This Product may be put under another license. You must + keep intact all the legal notices contained in the source code files. You must include the following items with every copy of Your Product that You make and distribute: a clear and conspicuous notice stating that Your Product or portion(s) thereof is/are governed + by this version of the TrueCrypt License, a verbatim copy of this version of the TrueCrypt License (as contained herein), a clear and conspicuous notice containing information about where the included copy of the License can be found, and an appropriate copyright + notice. </li></ol> +<p><br style="text-align:left"> +<strong style="text-align:left">2</strong>. You are not obligated to comply with Subsection III.1.d if Your Product is not distributed (i.e., Your Product is available only to You).<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">IV. Disclaimer of Liability, Disclaimer of Warranty, Indemnification</strong><br style="text-align:left"> +<br style="text-align:left"> +You expressly acknowledge and agree to the following:<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE LIABLE + TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, ANY LOSSES SUSTAINED + BY YOU OR THIRD PARTIES, A FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT (INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE) OR OTHERWISE, + ARISING OUT OF THE USE, COPYING, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF), EVEN IF SUCH DAMAGES (OR THE POSSIBILITY OF SUCH DAMAGES) + ARE/WERE PREDICTABLE OR KNOWN TO ANY (CO)AUTHOR, INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY.</strong><br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. + THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR, OR CORRECTION.</strong><br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">3</strong>. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY + THAT IT IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY + WITH ANY APPLICABLE REGULATIONS, RESTRICTIONS, AND LAWS.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">4</strong>. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS PRODUCT, AND APPLICABLE INTELLECTUAL-PROPERTY OWNERS, HARMLESS FROM AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, SETTLEMENTS, PENALTIES, FINES, COSTS, + EXPENSES (INCLUDING REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES OF ACTION, CLAIMS, ACTIONS, PROCEEDINGS, AND SUITS, DIRECTLY RELATED TO OR ARISING OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, IMPORT AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS + THEREOF) AND/OR YOUR BREACH OF ANY TERM OF THIS LICENSE.<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">V. Trademarks</strong><br style="text-align:left"> +<br style="text-align:left"> +This License does not grant permission to use trademarks associated with (or applying to) This Product, except for fair use as defined by applicable law and except for use expressly permitted or required by this License. Any attempt otherwise to use trademarks + associated with (or applying to) This Product automatically and immediately terminates Your rights under This License and may constitute trademark infringement (which may be prosecuted).<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">VI. General Terms and Conditions, Miscellaneous Provisions</strong><br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">1</strong>. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND BY AND ACCEPTING ALL TERMS + AND CONDITIONS OF THIS LICENSE (AND THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE + THIS PRODUCT, NOR ANY PORTION(S) THEREOF.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">2</strong>. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF APPLICABLE LAW GIVES YOU MORE RIGHTS). + ANY ATTEMPT (EVEN IF PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN + CONSTITUTE COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY CONDITIONS AND RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH + THE TERMS AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). + NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS AND CONDITIONS OF THIS LICENSE.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">3</strong>. This License does not constitute or imply a waiver of any intellectual property rights except as may be otherwise expressly provided in this License. This License does not transfer, assign, or convey any intellectual + property rights (e.g., it does not transfer ownership of copyrights or trademarks).<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">4</strong>. Subject to the terms and conditions of this License, You may allow a third party to use Your copy of This Product (or a copy that You make and distribute, or Your Product) provided that the third party explicitly + accepts and agrees to be bound by all terms and conditions of this License and the third party is not prohibited from using This Product (or portions thereof) by this License (see, e.g., Section VI.7) or by applicable law. However, You are not obligated to + ensure that the third party accepts (and agrees to be bound by all terms of) this License if You distribute only the self-extracting package (containing This Product) that does not allow the user to install (nor extract) the files contained in the package + until he or she accepts and agrees to be bound by all terms and conditions of this License.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">5</strong>. Without specific prior written permission from the authors of This Product (or from their common representative), You must not use the name of This Product, the names of the authors of This Product, or the names of + the legal entities (or informal groups) of which the authors were/are members/employees, to endorse or promote Your Product or any work in which You include a modified or unmodified version of This Product, or to endorse or promote You or Your affiliates, + or in a way that might suggest that Your Product (or any work in which You include a modified or unmodified version of This Product), You, or Your affiliates is/are endorsed by one or more authors of This Product, or in a way that might suggest that one or + more authors of This Product is/are affiliated with You (or Your affiliates) or directly participated in the creation of Your Product or of any work in which You include a modified or unmodified version of This Product.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">6</strong>. <strong style="text-align:left">IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, + MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A LAWYER.</strong><br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">7</strong>. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER THIS LICENSE AND YOU MUST NOT USE, + COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) THEREOF.<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">8</strong>. Except as otherwise provided in this License, if any provision of this License, or a portion thereof, is found to be invalid or unenforceable under applicable law, it shall not affect the validity or enforceability + of the remainder of this License, and such invalid or unenforceable provision shall be construed to reflect the original intent of the provision and shall be enforced to the maximum extent permitted by applicable law so as to effect the original intent of + the provision as closely as possible.<br style="text-align:left"> +<br style="text-align:left"> +____________________________________________________________<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +<strong style="text-align:left">Third-Party Licenses</strong><br style="text-align:left"> +<br style="text-align:left"> +This Product contains components that were created by third parties and that are governed by third-party licenses, which are contained hereinafter (separated by lines consisting of underscores). Each of the third-party licenses applies only to (portions of) + the source code file(s) in which the third-party license is contained or in which it is explicitly referenced, and to compiled or otherwise processed forms of such source code. +<strong style="text-align:left">None of the third-party licenses applies to This Product as a whole, even when it uses terms such as "product", "program", or any other equivalent terms/phrases. This Product as a whole is governed by the TrueCrypt License (see + above).</strong> Some of the third-party components have been modified by the authors of This Product. Unless otherwise stated, such modifications and additions are governed by the TrueCrypt License (see above). Note: Unless otherwise stated, graphics and + files that are not part of the source code are governed by the TrueCrypt License.<br style="text-align:left"> +<br style="text-align:left"> +____________________________________________________________<br style="text-align:left"> +<br style="text-align:left"> +<br style="text-align:left"> +License agreement for Encryption for the Masses.<br style="text-align:left"> +<br style="text-align:left"> +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.<br style="text-align:left"> +<br style="text-align:left"> +This product can be copied and distributed free of charge, including source code.<br style="text-align:left"> +<br style="text-align:left"> +You may modify this product and source code, and distribute such modifications, and you may derive new works based on this product, provided that:<br style="text-align:left"> +<br style="text-align:left"> +1. Any product which is simply derived from this product cannot be called E4M, or Encryption for the Masses.<br style="text-align:left"> +<br style="text-align:left"> +2. If you use any of the source code in your product, and your product is distributed with source code, you must include this notice with those portions of this source code that you use.<br style="text-align:left"> +<br style="text-align:left"> +Or,<br style="text-align:left"> +<br style="text-align:left"> +If your product is distributed in binary form only, you must display on any packaging, and marketing materials which reference your product, a notice which states:<br style="text-align:left"> +<br style="text-align:left"> +"This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"<br style="text-align:left"> +<br style="text-align:left"> +3. If you use any of the source code originally by Eric Young, you must in addition follow his terms and conditions.<br style="text-align:left"> +<br style="text-align:left"> +4. Nothing requires that you accept this License, as you have not signed it. However, nothing else grants you permission to modify or distribute the product or its derivative works.<br style="text-align:left"> +<br style="text-align:left"> +These actions are prohibited by law if you do not accept this License.<br style="text-align:left"> +<br style="text-align:left"> +5. If any of these license terms is found to be to broad in scope, and declared invalid by any court or legal process, you agree that all other terms shall not be so affected, and shall remain valid and enforceable.<br style="text-align:left"> +<br style="text-align:left"> +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, + BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, + REPAIR OR CORRECTION.<br style="text-align:left"> +<br style="text-align:left"> +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL + OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, + EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.<br style="text-align:left"> +____________________________________________________________<br style="text-align:left"> +<br style="text-align:left"> +Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights reserved.<br style="text-align:left"> +<br style="text-align:left"> +LICENSE TERMS<br style="text-align:left"> +<br style="text-align:left"> +The free distribution and use of this software is allowed (with or without changes) provided that:</p> +<ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +source code distributions include the above copyright notice, this list of conditions and the following disclaimer; +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +binary distributions include the above copyright notice, this list of conditions and the following disclaimer in their documentation; +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +the name of the copyright holder is not used to endorse products built using this software without specific written permission. +</li></ol> +<p>DISCLAIMER<br style="text-align:left"> +<br style="text-align:left"> +This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose.<br style="text-align:left"> + ____________________________________________________________<br> + <br> + Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler.<br> + <br> + This software is provided 'as-is', without any express or implied warranty. In no event will the author be held liable for any damages arising from the use of this software.<br> + <br> +Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:<br> +<ol> + <li>The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.</li> + <li> Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.</li> + <li> This notice may not be removed or altered from any source distribution.</li> +</ol> + Jean-loup Gailly Mark Adler<br> + jloup@gzip.org madler@alumni.caltech.edu<br> +____________________________________________________________<br> +<br> + Copyright (C) 1999-2016 Dieter Baron and Thomas Klausner<br> + <br> + The authors can be contacted at <libzip@nih.at><br> + <br> +Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:<br> + <br> +<ol> + <li>Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.</li> + <li>Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.</li> + <li>The names of the authors may not be used to endorse or promote products derived from this software without specific prior written permission.</li> +</ol> +<br> +THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.<br> +____________________________________________________________<br> +<br> +Copyright (c) 2013, Alexey Degtyarev. All rights reserved.<br> +<br> +________________________________________________________<br> +<br> + Copyright (c) 2016. Disk Cryptography Services for EFI (DCS), Alex Kolotnikov<br> + <br> + This program and the accompanying materials are licensed and made available under the terms and conditions of the GNU Lesser General Public License, version 3.0 (LGPL-3.0).<br> + <br> + The full text of the license may be found at https://opensource.org/licenses/LGPL-3.0<br> +____________________________________________________________<br> +<br> + Copyright (c) 1999-2013,2014,2015,2016 Jack Lloyd. <br> + <br> + All rights reserved.<br> + <br> +Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:<br> + <br> +<ol> + <li>Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.</li> + <li>Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.</li> +</ol> +<br> +THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.<br> +____________________________________________________________<br> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/VeraCrypt Rescue Disk.html b/doc/html/VeraCrypt Rescue Disk.html new file mode 100644 index 00000000..b4ab54d0 --- /dev/null +++ b/doc/html/VeraCrypt Rescue Disk.html @@ -0,0 +1,100 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="System%20Encryption.html">System Encryption</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20Rescue%20Disk.html">VeraCrypt Rescue Disk</a> +</p></div> + +<div class="wikidoc"> +<h1>VeraCrypt Rescue Disk</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +During the process of preparing the encryption of a system partition/drive, VeraCrypt requires that you create a so-called VeraCrypt Rescue Disk (CD/DVD), which serves the following purposes:</div> +<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If the VeraCrypt Boot Loader screen does not appear after you start your computer (or if Windows does not boot), the +<strong style="text-align:left">VeraCrypt Boot Loader may be damaged</strong>. The VeraCrypt Rescue Disk allows you restore it and thus to regain access to your encrypted system and data (however, note that you will still have to enter the correct password + then). In the Rescue Disk screen, select <em style="text-align:left">Repair Options</em> > +<em style="text-align:left">Restore VeraCrypt Boot Loader</em>. Then press 'Y' to confirm the action, remove the Rescue Disk from your CD/DVD drive and restart your computer. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If the <strong style="text-align:left">VeraCrypt Boot Loader is frequently damaged +</strong>(for example, by inappropriately designed activation software) or if <strong style="text-align:left"> +you do not want the VeraCrypt boot loader </strong><strong style="text-align:left">to reside on the hard drive +</strong>(for example, if you want to use an alternative boot loader/manager for other operating systems), you can boot directly from the VeraCrypt Rescue Disk (as it contains the VeraCrypt boot loader too) without restoring the boot loader to the hard drive. + Just insert your Rescue Disk into your CD/DVD drive and then enter your password in the Rescue Disk screen. +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If you repeatedly enter the correct password but VeraCrypt says that the password is incorrect, it is possible that the +<strong style="text-align:left">master key or other critical data are damaged</strong>. The VeraCrypt Rescue Disk allows you to restore them and thus to regain access to your encrypted system and data (however, note that you will still have to enter the correct + password then). In the Rescue Disk screen, select <em style="text-align:left">Repair Options</em> > +<em style="text-align:left">Restore key data</em>. Then enter your password, press 'Y' to confirm the action, remove the Rescue Disk from your CD/DVD drive, and restart your computer.<br style="text-align:left"> +<br style="text-align:left"> +Note: This feature cannot be used to restore the header of a hidden volume within which a +<a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden operating system</a> resides (see the section <a href="Hidden%20Operating%20System.html"> +Hidden Operating System</a>). To restore such a volume header, click <em style="text-align:left"> +Select Device</em>, select the partition behind the decoy system partition, click +<em style="text-align:left">OK</em>, select <em style="text-align:left">Tools</em> > +<em style="text-align:left">Restore Volume Header</em> and then follow the instructions.<br style="text-align:left"> +<br style="text-align:left"> +WARNING: By restoring key data using a VeraCrypt Rescue Disk, you also restore the password that was valid when the VeraCrypt Rescue Disk was created. Therefore, whenever you change the password, you should destroy your VeraCrypt Rescue Disk and create a new + one (select <em style="text-align:left">System</em> -> <em style="text-align:left"> +Create Rescue Disk</em>). Otherwise, if an attacker knows your old password (for example, captured by a keystroke logger) and if he then finds your old VeraCrypt Rescue Disk, he could use it to restore the key data (the master key encrypted with the old password) + and thus decrypt your system partition/drive </li><li id="WindowsDamaged" style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +If <strong style="text-align:left">Windows is damaged and cannot start</strong>, the VeraCrypt Rescue Disk allows you to permanently decrypt the partition/drive before Windows starts. In the Rescue Disk screen, select +<em style="text-align:left">Repair Options</em> > <em style="text-align:left"> +Permanently decrypt system partition/drive</em>. Enter the correct password and wait until decryption is complete. Then you can e.g. boot your MS Windows setup CD/DVD to repair your Windows installation. Note that this feature cannot be used to decrypt a hidden + volume within which a <a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +hidden operating system</a> resides (see the section <a href="Hidden%20Operating%20System.html"> +Hidden Operating System</a>).<br style="text-align:left"> +<br style="text-align:left"> +Note: Alternatively, if Windows is damaged (cannot start) and you need to repair it (or access files on it), you can avoid decrypting the system partition/drive by following these steps: If you have multiple operating systems installed on your computer, + boot the one that does not require pre-boot authentication. If you do not have multiple operating systems installed on your computer, you can boot a WinPE or BartPE CD/DVD or you can connect your system drive as a secondary or external drive to another computer + and then boot the operating system installed on the computer. After you boot a system, run VeraCrypt, click Select Device, select the affected system partition, click OK , select System > Mount Without Pre-Boot Authentication, enter your pre-boot-authentication + password and click OK. The partition will be mounted as a regular VeraCrypt volume (data will be on-the-fly decrypted/encrypted in RAM on access, as usual). +</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> +Your VeraCrypt Rescue Disk contains a <strong style="text-align:left">backup of the original content of the first drive track</strong> (made before the VeraCrypt Boot Loader was written to it) and allows you to restore it if necessary. The first track typically + contains a system loader or boot manager. In the Rescue Disk screen, select Repair Options > Restore original system loader. +</li></ul> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> + </div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<em style="text-align:left">Note that even if you lose your VeraCrypt Rescue Disk and an attacker finds it, he or she will +<strong style="text-align:left">not</strong> be able to decrypt the system partition or drive without the correct password.</em></div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +To boot a VeraCrypt Rescue Disk, insert it into your CD/DVD drive and restart your computer. If the VeraCrypt Rescue Disk screen does not appear (or if you do not see the 'Repair Options' item in the 'Keyboard Controls' section of the screen), it is possible + that your BIOS is configured to attempt to boot from hard drives before CD/DVD drives. If that is the case, restart your computer, press F2 or Delete (as soon as you see a BIOS start-up screen), and wait until a BIOS configuration screen appears. If no BIOS + configuration screen appears, restart (reset) the computer again and start pressing F2 or Delete repeatedly as soon as you restart (reset) the computer. When a BIOS configuration screen appears, configure your BIOS to boot from the CD/DVD drive first (for + information on how to do so, please refer to the documentation for your BIOS/motherboard or contact your computer vendor's technical support team for assistance). Then restart your computer. The VeraCrypt Rescue Disk screen should appear now. Note: In the + VeraCrypt Rescue Disk screen, you can select 'Repair Options' by pressing F8 on your keyboard.</div> +<p>If your VeraCrypt Rescue Disk is damaged, you can create a new one by selecting +<em style="text-align:left">System</em> > <em style="text-align:left">Create Rescue Disk</em>. To find out whether your VeraCrypt Rescue Disk is damaged, insert it into your CD/DVD drive and select +<em style="text-align:left">System</em> > <em style="text-align:left">Verify Rescue Disk</em>.</p> +</div><div class="ClearBoth"></div></body></html> diff --git a/doc/html/VeraCrypt System Files.html b/doc/html/VeraCrypt System Files.html new file mode 100644 index 00000000..c220ae3e --- /dev/null +++ b/doc/html/VeraCrypt System Files.html @@ -0,0 +1,106 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Miscellaneous.html">Miscellaneous</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20System%20Files.html">VeraCrypt System Files</a> +</p></div> + +<div class="wikidoc"> +<div> +<h1>VeraCrypt System Files & Application Data</h1> +<p>Note: %windir% is the main Windows installation path (e.g., C:\WINDOWS)</p> +<h4>VeraCrypt Driver</h4> +<p>%windir%\SYSTEM32\DRIVERS\veracrypt.sys</p> +<p>Note: This file is not present when VeraCrypt is run in portable mode.</p> +<h4>VeraCrypt Settings, Application Data, and Other System Files</h4> +<p>WARNING: Note that VeraCrypt does <em>not</em> encrypt any of the files listed in this section (unless it encrypts the system partition/drive).<br> +<br> +The following files are saved in the folder %APPDATA%\VeraCrypt\. In portable mode, these files are saved to the folder from which you run the file Vera<em>Crypt.exe</em> (i.e., the folder in which Vera<em>Crypt.exe</em> resides):</p> +<ul> +<li>"Configuration.xml" (the main configuration file). </li></ul> +<ul> +<li>"System Encryption.xml" (temporary configuration file used during the initial process of in-place encryption/decryption of the system partition/drive). +</li></ul> +<ul> +<li>"Default Keyfiles.xml" +<ul> +<li>Note: This file may be absent if the corresponding VeraCrypt feature is not used. +</li></ul> +</li></ul> +<ul> +<li>"Favorite Volumes.xml" +<ul> +<li>Note: This file may be absent if the corresponding VeraCrypt feature is not used. +</li></ul> +</li></ul> +<ul> +<li>"History.xml" (the list of last twenty files/devices attempted to be mounted as VeraCrypt volumes or attempted to be used as hosts for VeraCrypt volumes; this feature can be disabled – for more information, see the section +<em>Never Save History</em>) +<ul> +<li>Note: This file may be absent if the corresponding VeraCrypt feature is not used. +</li></ul> +</li></ul> +<ul> +<li>"In-Place Encryption" (temporary configuration file used during the initial process of in-place encryption/decryption of a non-system volume). +</li></ul> +<ul> +<li>"In-Place Encryption Wipe Algo" (temporary configuration file used during the initial process of in-place encryption/decryption of a non-system volume). +</li></ul> +<ul> +<li>"Post-Install Task - Tutorial" (temporary configuration file used during the process of installation or upgrade of VeraCrypt). +</li></ul> +<ul> +<li>"Post-Install Task - Release Notes" (temporary configuration file used during the process of installation or upgrade of VeraCrypt). +</li></ul> +<p>The following files are saved in the folder %ALLUSERSPROFILE%\VeraCrypt\:</p> +<ul> +<li>"Original System Loader" (a backup of the original content of the first drive track made before the VeraCrypt Boot Loader was written to it). +<ul> +<li>Note: This file is absent if the system partition/drive has not been encrypted. +</li></ul> +</li></ul> +<p>The following files are saved in the folder %windir%\system32 (32-bit systems) or %windir%\SysWOW64 (64-bit systems):</p> +<ul> +<li>"VeraCrypt System Favorite Volumes.xml" +<ul> +<li>Note: This file may be absent if the corresponding VeraCrypt feature is not used. +</li></ul> +</li></ul> +<ul> +<li>VeraCrypt.exe +<ul> +<li>Note: A copy of this file is located in this folder only when mounting of system favorite volumes is enabled. +</li></ul> +</li></ul> +<p> </p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/VeraCrypt Volume Format Specification.html b/doc/html/VeraCrypt Volume Format Specification.html new file mode 100644 index 00000000..aa10f031 --- /dev/null +++ b/doc/html/VeraCrypt Volume Format Specification.html @@ -0,0 +1,740 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Technical%20Details.html">Technical Details</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20Volume%20Format%20Specification.html">VeraCrypt Volume Format Specification</a> +</p></div> + +<div class="wikidoc"> +<h1>VeraCrypt Volume Format Specification</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The format of file-hosted volumes is identical to the format of partition/device-hosted volumes (however, the "volume header", or key data, for a system partition/drive is stored in the last 512 bytes of the first logical drive track). VeraCrypt volumes have + no "signature" or ID strings. Until decrypted, they appear to consist solely of random data.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Free space on each VeraCrypt volume is filled with random data when the volume is created.* The random data is generated as follows: Right before VeraCrypt volume formatting begins, a temporary encryption key and a temporary secondary key (XTS mode) are generated + by the random number generator (see the section <a href="Random%20Number%20Generator.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Random Number Generator</a>). The encryption algorithm that the user selected is initialized with the temporary keys. The encryption algorithm is then used to encrypt plaintext blocks consisting of random bytes generated by the random number generator. The + encryption algorithm operates in XTS mode (see the section <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Volume</a>). The resulting ciphertext blocks are used to fill (overwrite) the free space on the volume. The temporary keys are stored in RAM and are erased after formatting finishes.</div> +<p><br style="text-align:left"> +VeraCrypt Volume Format Specification:</p> +<table style="border-collapse:separate; border-spacing:0px; width:608px; text-align:left; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; border-width:0px 0px 1px 1px; border-style:solid; border-color:#ffffff #ffffff #000000 #000000"> +<tbody style="text-align:left"> +<tr style="text-align:left"> +<th style="width:76px; font-weight:normal; text-align:center; vertical-align:middle; color:#000000; border-width:1px 1px 1px 0px; border-style:solid solid solid none; padding:9px 0px; border-color:#000000 #000000 #000000 white"> +Offset (bytes)</th> +<th style="width:50px; font-weight:normal; text-align:center; vertical-align:middle; color:#000000; border-width:1px 1px 1px 0px; border-style:solid solid solid none; padding:9px 0px; border-color:#000000 #000000 #000000 white"> +Size (bytes)</th> +<th style="width:98px; font-weight:normal; text-align:center; vertical-align:middle; color:#000000; border-width:1px 1px 1px 0px; border-style:solid solid solid none; padding:9px 0px; border-color:#000000 #000000 #000000 white"> +Encryption<br> +Status†</th> +<th style="width:382px; font-weight:normal; text-align:center; vertical-align:middle; color:#000000; border-width:1px 1px 1px 0px; border-style:solid solid solid none; padding:9px 0px; border-color:#000000 #000000 #000000 white"> +Description</th> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">0 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">64 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Unencrypted§</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Salt</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">64 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">4 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> ASCII string "VERA"</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">68 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">2 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Volume header format version (2)</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">70 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">2 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Minimum program version required to open the volume</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">72 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">4 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> CRC-32 checksum of the (decrypted) bytes 256-511</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">76 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">16 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Reserved (must contain zeroes)</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">92 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">8 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Size of hidden volume (set to zero in non-hidden volumes)</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">100 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">8 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Size of volume</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">108 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">8 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Byte offset of the start of the master key scope</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">116 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">8 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Size of the encrypted area within the master key scope</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">124 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">4 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Flag bits (bit 0 set: system encryption; bit 1 set: non-system</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> in-place-encrypted/decrypted volume; bits 2–31 are reserved)</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">128 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">4 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Sector size (in bytes)</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">132 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">120 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Reserved (must contain zeroes)</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">252 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">4 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> CRC-32 checksum of the (decrypted) bytes 64-251</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">256 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"><em>Var.</em> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Concatenated primary and secondary master keys**</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">512 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">65024 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Reserved (for system encryption, this item is omitted‡‡)</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">65536 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">65536 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted /</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Area for hidden volume header (if there is no hidden volume</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Unencrypted§</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> within the volume, this area contains random data††). For</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> system encryption, this item is omitted.‡‡ See bytes 0–65535.</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">131072 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"><em>Var.</em> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Data area (master key scope). For system encryption, offset</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> may be different (depending on offset of system partition).</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"><em>S</em>-131072‡</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">65536 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted /</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Backup header (encrypted with a different header key derived</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Unencrypted§</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> using a different salt). For system encryption, this item is</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> omitted.‡‡ See bytes 0–65535.</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"><em>S</em>-65536‡</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right">65536 </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Encrypted /</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Backup header for hidden volume (encrypted with a different</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> Unencrypted§</div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> header key derived using a different salt). If there is no hidden</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> volume within the volume, this area contains random data.††</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> For system encryption, this item is omitted.‡‡ See bytes</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="right"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> </div> +</td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> +<div align="left"> 0–65535.</div> +</td> +</tr> +<tr style="text-align:left"> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +<td style="color:#000000; font-size:11px; line-height:13px; font-family:Verdana,Arial,Helvetica,sans-serif; text-align:center; vertical-align:middle; border-width:0px 1px 0px 0px; border-style:none solid solid none; padding:0px 5px; border-color:white #000000 #ffffff white"> + </td> +</tr> +</tbody> +</table> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The fields located at byte #0 (salt) and #256 (master keys) contain random values generated by the random number generator (see the section +<a href="Random%20Number%20Generator.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Random Number Generator</a>) during the volume creation process.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If a VeraCrypt volume hosts a hidden volume (within its free space), the header of the hidden volume is located at byte #65536 of the host volume (the header of the host/outer volume is located at byte #0 of the host volume – see the section +<a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hidden Volume</a>). If there is no hidden volume within a VeraCrypt volume, bytes 65536–131071 of the volume (i.e., the area where the header of a hidden volume can reside) contain random data (see above for information on the method used to fill free + volume space with random data when the volume is created). The layout of the header of a hidden volume is the same as the one of a standard volume (bytes 0–65535).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The maximum possible VeraCrypt volume size is 2<sup style="text-align:left; font-size:85%">63</sup> bytes (8,589,934,592 GB). However, due to security reasons (with respect to the 128-bit block size used by the +<a href="Encryption%20Algorithms.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +encryption algorithms</a>), the maximum allowed volume size is 1 PB (1,048,576 GB).</div> +<h4 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:12px; margin-bottom:1px"> +Embedded Backup Headers</h4> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Each VeraCrypt volume contains an embedded backup header, located at the end of the volume (see above). The header backup is +<em style="text-align:left">not</em> a copy of the volume header because it is encrypted with a different header key derived using a different salt (see the section +<a href="Header%20Key%20Derivation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Header Key Derivation, Salt, and Iteration Count</a>).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +When the volume password and/or PIM and/or keyfiles are changed, or when the header is restored from the embedded (or an external) header backup, both the volume header and the backup header (embedded in the volume) are re-encrypted with different header keys + (derived using newly generated salts – the salt for the volume header is different from the salt for the backup header). Each salt is generated by the VeraCrypt random number generator (see the section +<a href="Random%20Number%20Generator.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Random Number Generator</a>).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +For more information about header backups, see the subsection <a href="Program%20Menu.html#tools-restore-volume-header" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Tools > Restore Volume Header</a> in the chapter <a href="Main%20Program%20Window.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Main Program Window</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="Standard%20Compliance.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +<hr align="left" size="1" width="189" style="text-align:left; height:0px; border-width:0px 1px 1px; border-style:solid; border-color:#000000"> +<p><span style="text-align:left; font-size:10px; line-height:12px">* Provided that the options +<em style="text-align:left">Quick Format</em> and <em style="text-align:left">Dynamic</em> are disabled and provided that the volume does not contain a filesystem that has been encrypted in place (note that VeraCrypt does not allow the user to create a hidden + volume within such a volume).</span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">† The encrypted areas of the volume header are encrypted in XTS mode using the primary and secondary header keys. For more information, see the section +<a href="Encryption%20Scheme.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Encryption Scheme</a> and the section <a href="Header%20Key%20Derivation.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Header Key Derivation, Salt, and Iteration Count</a>.</span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">‡ <em style="text-align:left"> +S</em> denotes the size of the volume host (in bytes).</span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">§ Note that the salt does not need to be encrypted, as it does not have to be kept secret [7] (salt is a sequence of random values).</span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">** Multiple concatenated master keys are stored here when the volume is encrypted using a cascade of ciphers (secondary master keys are used for XTS mode).</span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">†† See above in this section for information on the method used to fill free volume space with random data when the volume is created.</span><br style="text-align:left"> +<span style="text-align:left; font-size:10px; line-height:12px">‡‡ Here, the meaning of "system encryption" does not include a hidden volume containing a hidden operating system.</span></p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/VeraCrypt Volume.html b/doc/html/VeraCrypt Volume.html new file mode 100644 index 00000000..a33ef25e --- /dev/null +++ b/doc/html/VeraCrypt Volume.html @@ -0,0 +1,48 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a> +</p></div> + +<div class="wikidoc"> +<h1>VeraCrypt Volume</h1> +<p>There are two types of VeraCrypt volumes:</p> +<ul> +<li>File-hosted (container) </li><li>Partition/device-hosted (non-system) </li></ul> +<p>Note: In addition to creating the above types of virtual volumes, VeraCrypt can encrypt a physical partition/drive where Windows is installed (for more information, see the chapter +<a href="System%20Encryption.html"><em>System Encryption</em></a>).<br> +<br> +A VeraCrypt file-hosted volume is a normal file, which can reside on any type of storage device. It contains (hosts) a completely independent encrypted virtual disk device.<br> +<br> +A VeraCrypt partition is a hard disk partition encrypted using VeraCrypt. You can also encrypt entire hard disks, USB hard disks, USB memory sticks, and other types of storage devices.</p> +<p><a href="Creating%20New%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p> +</div> +</body></html> diff --git a/doc/html/VeraCrypt128x128.png b/doc/html/VeraCrypt128x128.png Binary files differnew file mode 100644 index 00000000..072fa58b --- /dev/null +++ b/doc/html/VeraCrypt128x128.png diff --git a/doc/html/Volume Clones.html b/doc/html/Volume Clones.html new file mode 100644 index 00000000..a3eb34e6 --- /dev/null +++ b/doc/html/Volume Clones.html @@ -0,0 +1,46 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Volume%20Clones.html">Volume Clones</a> +</p></div> + +<div class="wikidoc"> +<div> +<h2>Volume Clones</h2> +<p>Never create a new VeraCrypt volume by cloning an existing VeraCrypt volume. Always use the VeraCrypt Volume Creation Wizard to create a new VeraCrypt volume. If you clone a volume and then start using both this volume and its clone in a way that both eventually + contain different data, then you might aid cryptanalysis (both volumes will share a single key set). This is especially critical when the volume contains a hidden volume. Also note that plausible deniability (see section +<a href="Plausible%20Deniability.html"><em>Plausible Deniability</em></a>) is impossible in such cases. See also the chapter +<a href="How%20to%20Back%20Up%20Securely.html"> +<em>How to Back Up Securely</em></a>.</p> +</div> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Wear-Leveling.html b/doc/html/Wear-Leveling.html new file mode 100644 index 00000000..10db9f2b --- /dev/null +++ b/doc/html/Wear-Leveling.html @@ -0,0 +1,64 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Wear-Leveling.html">Wear-Leveling</a> +</p></div> + +<div class="wikidoc"> +<h1>Wear-Leveling</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +Some storage devices (e.g., some solid-state drives, including USB flash drives) and some file systems utilize so-called wear-leveling mechanisms to extend the lifetime of the storage device or medium. These mechanisms ensure that even if an application repeatedly + writes data to the same logical sector, the data is distributed evenly across the medium (logical sectors are remapped to different physical sectors). Therefore, multiple "versions" of a single sector may be available to an attacker. This may have various + security implications. For instance, when you change a volume password/keyfile(s), the volume header is, under normal conditions, overwritten with a re-encrypted version of the header. However, when the volume resides on a device that utilizes a wear-leveling + mechanism, VeraCrypt cannot ensure that the older header is really overwritten. If an adversary found the old volume header (which was to be overwritten) on the device, he could use it to mount the volume using an old compromised password (and/or using compromised + keyfiles that were necessary to mount the volume before the volume header was re-encrypted). Due to security reasons, we recommend that +<a href="VeraCrypt%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +VeraCrypt volumes</a> are not created/stored on devices (or in file systems) that utilize a wear-leveling mechanism (and that VeraCrypt is not used to encrypt any portions of such devices or filesystems).</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If you decide not to follow this recommendation and you intend to use in-place encryption on a drive that utilizes wear-leveling mechanisms, make sure the partition/drive does not contain any sensitive data before you fully encrypt it (VeraCrypt cannot reliably + perform secure in-place encryption of existing data on such a drive; however, after the partition/drive has been fully encrypted, any new data that will be saved to it will be reliably encrypted on the fly). That includes the following precautions: Before + you run VeraCrypt to set up pre-boot authentication, disable the paging files and restart the operating system (you can enable the +<a href="Paging%20File.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +paging files</a> after the system partition/drive has been fully encrypted). <a href="Hibernation%20File.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hibernation</a> must be prevented during the period between the moment when you start VeraCrypt to set up pre-boot authentication and the moment when the system partition/drive has been fully encrypted. However, note that even if you follow those steps, it + is <em style="text-align:left">not</em> guaranteed that you will prevent data leaks and that sensitive data on the device will be securely encrypted. For more information, see the sections +<a href="Data%20Leaks.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Data Leaks</a>, <a href="Paging%20File.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Paging File</a>, <a href="Hibernation%20File.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Hibernation File</a>, and <a href="Memory%20Dump%20Files.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +Memory Dump Files</a>.</div> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +If you need <a href="Plausible%20Deniability.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> +plausible deniability</a>, you must not use VeraCrypt to encrypt any part of (or create encrypted containers on) a device (or file system) that utilizes a wear-leveling mechanism.</div> +<p>To find out whether a device utilizes a wear-leveling mechanism, please refer to documentation supplied with the device or contact the vendor/manufacturer.</p> +</div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Whirlpool.html b/doc/html/Whirlpool.html new file mode 100644 index 00000000..796c6673 --- /dev/null +++ b/doc/html/Whirlpool.html @@ -0,0 +1,46 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> +<head> +<meta http-equiv="content-type" content="text/html; charset=utf-8" /> +<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title> +<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/> +<meta name="keywords" content="encryption, security"/> +<link href="styles.css" rel="stylesheet" type="text/css" /> +</head> +<body> + +<div> +<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a> +</div> + +<div id="menu"> + <ul> + <li><a href="Home.html">Home</a></li> + <li><a href="/code/">Source Code</a></li> + <li><a href="Downloads.html">Downloads</a></li> + <li><a class="active" href="Documentation.html">Documentation</a></li> + <li><a href="Donation.html">Donate</a></li> + <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> + </ul> +</div> + +<div> +<p> +<a href="Documentation.html">Documentation</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Hash%20Algorithms.html">Hash Algorithms</a> +<img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> +<a href="Whirlpool.html">Whirlpool</a> +</p></div> + +<div class="wikidoc"> +<h1>Whirlpool</h1> +<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +The Whirlpool hash algorithm was designed by Vincent Rijmen (co-designer of the AES encryption algorithm) and Paulo S. L. M. Barreto. The size of the output of this algorithm is 512 bits. The first version of Whirlpool, now called Whirlpool-0, was published + in November 2000. The second version, now called Whirlpool-T, was selected for the NESSIE (<em style="text-align:left">New European Schemes for Signatures, Integrity and Encryption</em>) portfolio of cryptographic primitives (a project organized by the European + Union, similar to the AES competition). VeraCrypt uses the third (final) version of Whirlpool, which was adopted by the International Organization for Standardization (ISO) and the IEC in the ISO/IEC 10118-3:2004 international standard [21].</div> + <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> +<a href="Streebog.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div> +</div> +</body></html>
\ No newline at end of file diff --git a/doc/html/arrow_right.gif b/doc/html/arrow_right.gif Binary files differnew file mode 100644 index 00000000..665bf8ef --- /dev/null +++ b/doc/html/arrow_right.gif diff --git a/doc/html/gf2_mul.gif b/doc/html/gf2_mul.gif Binary files differnew file mode 100644 index 00000000..b6e15a6a --- /dev/null +++ b/doc/html/gf2_mul.gif diff --git a/doc/html/styles.css b/doc/html/styles.css new file mode 100644 index 00000000..67d27847 --- /dev/null +++ b/doc/html/styles.css @@ -0,0 +1,31 @@ +#menu { + display: none; +} + +#menu ul { + list-style-type: none; + margin: 0px auto; + padding: 0; + overflow: hidden; + background-color: #08aad7; +} + +#menu li { + float: left; +} + +#menu li a { + display: block; + color: white; + text-align: center; + padding: 16px; + text-decoration: none; +} + +#menu li a.active { + background-color: #84c7b0; +} + +#menu li a:hover { + background-color: #111111; +}
\ No newline at end of file diff --git a/doc/html/twitter_veracrypt.PNG b/doc/html/twitter_veracrypt.PNG Binary files differnew file mode 100644 index 00000000..63279293 --- /dev/null +++ b/doc/html/twitter_veracrypt.PNG |