VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Setup
AgeCommit message (Expand)AuthorFilesLines
2016-06-17Windows: Use Visual C++ 2010 instead of Visual C++ 2008.Mounir IDRASSI3-0/+389
2016-05-10Remove trailing whitespaceDavid Foerster15-177/+177
2016-05-10Normalize all line terminatorsDavid Foerster15-6125/+6125
2016-02-20Windows: Correctly remove driver file veracrypt.sys during uninstall on Windo...Mounir IDRASSI1-15/+33
2016-02-14MacOSX: increment installer version to 1.17.Mounir IDRASSI1-2/+2
2016-02-14Increment version to 1.17. Update user guide PDF file.Mounir IDRASSI1-4/+4
2016-02-07Windows:Fix various issues and warnings reported by static code analysis tool...Mounir IDRASSI2-6/+16
2016-01-31Windows: Fix link issue in Debug configuration for Setup project.Mounir IDRASSI1-1/+1
2016-01-27Windows/Linux: Implement exFAT support.Mounir IDRASSI1-1/+3
2016-01-20Copyright: update dates to include 2016.Mounir IDRASSI11-11/+11
2016-01-10Windows: Don't show disconnected network drives in the list of available driv...Mounir IDRASSI1-3/+4
2016-01-04Windows: Enhance fix for dll hijacking vulnerability affecting installer (CVE...Mounir IDRASSI1-0/+2
2016-01-03Windows: Fix Dll hijacking vulnerability affecting installer that allows arbi...Mounir IDRASSI2-10/+23
2015-12-06MacOSX: Customize dmg file using VeraCrypt new logoMounir IDRASSI1-0/+0
2015-12-05Windows: use new icons an graphics contributed by Andreas Becker (https://git...Mounir IDRASSI2-0/+0
2015-11-26Windows: solve crash caused by system function FormatMessage failure on rare ...Mounir IDRASSI1-4/+13
2015-11-26Windows: Full UNICODE rewrite and implement support for UNICODE passwords.Mounir IDRASSI10-688/+632
2015-10-27Windows: workaround to solve false positive detection by some anti-virus soft...Mounir IDRASSI1-1/+3
2015-10-07Increment version to 1.16. Update user guide PDF file.VeraCrypt_1.16Mounir IDRASSI2-6/+6
2015-09-26Increment version to 1.15. Update user guide PDF file.VeraCrypt_1.15Mounir IDRASSI2-6/+6
2015-09-26Windows Installer: check newly added files if they are used before resuming i...Mounir IDRASSI1-1/+8
2015-09-16Increment version to 1.14. Update user guide PDF file.VeraCrypt_1.14Mounir IDRASSI2-6/+6
2015-09-10Windows: Don't offer creating a restore point if it is disabled in Windows.Mounir IDRASSI1-5/+43
2015-09-06Windows: Installer and Traveler Disk Setup both always copy 32-bit and 64-bit...Mounir IDRASSI2-0/+36
2015-09-06Windows Installer: better handling for updating system favorite service from ...Mounir IDRASSI1-24/+91
2015-08-09Increment version to 1.13VeraCrypt_1.13Mounir IDRASSI2-6/+6
2015-08-06Linux: Correct formating of license displayed in the installerMounir IDRASSI1-24/+24
2015-08-06Increment version to 1.12. Update user guide PDF file.Mounir IDRASSI2-6/+6
2015-08-06Update license information to reflect the use of a dual license Apache 2.0 an...Mounir IDRASSI11-69/+291
2015-07-13Windows: on 64-bit Windows, more System favorite service from SysWoW64 to Sys...Mounir IDRASSI1-1/+40
2015-07-06Windows: Display source location of errors in order to help diagnose issues r...Mounir IDRASSI2-15/+19
2015-07-03Windows: Explicitly use internal PKCS#11 headers for buildingMounir IDRASSI1-2/+2
2015-06-12Windows installer: solve Windows XP 32-bit incompatibility issue introduced p...Mounir IDRASSI1-3/+21
2015-06-10Windows: solve installer issue on Windows 10 caused by failure to overwrite V...Mounir IDRASSI3-21/+32
2015-05-22Windows Setup: Integrate 64-bit builds of exe files into the installer. Only ...Mounir IDRASSI2-5/+26
2015-05-22Windows: remove crash dump analysis functionality. It didn't always work and ...Mounir IDRASSI1-1/+3
2015-05-03Windows: Modify custom window class names to less generic value in order to a...Mounir IDRASSI1-2/+2
2015-04-19Linux installer: Add support for kdesudo and correct usage of konsole externa...Mounir IDRASSI1-2/+3
2015-04-06MacOSX: Set properly the version in the bundle and the installation package. ...VeraCrypt_1.0f-2Mounir IDRASSI1-1/+3
2015-04-06Increment VeraCrypt version to 1.0f-2Mounir IDRASSI2-5/+5
2015-04-05Windows Setup: Avoid potential issues by correctly initializing variables and...Mounir IDRASSI1-13/+13
2015-03-17Windows Setup: When clicking uninstall link, launch Windows Add/Remove progra...Mounir IDRASSI1-6/+15
2015-03-16Windows Setup: remove other VeraCrypt references for registry.Mounir IDRASSI1-0/+6
2015-03-15Windows Setup: implement removal of special LEGACY_VERACRYPT registry keys.Mounir IDRASSI1-60/+258
2015-03-13Windows: VeraCrypt reference from various registry locations. Uninstall old V...Mounir IDRASSI2-2/+123
2015-02-16Windows Installer: don't add link to VeraCryptExpander in the desktop.Mounir IDRASSI1-8/+0
2015-02-13Windows: Add VeraCryptExpander.exe to the Windows installer.Mounir IDRASSI2-0/+17
2015-02-11Linux: modify installer script to make it run when the "less" command doesn't...Mounir IDRASSI1-3/+23
2015-02-10Linux: Add graphical installer support when xterm is not available (Linux Min...Mounir IDRASSI1-4/+36
2015-02-09Static Code Analysis: check return of remove function and display message whe...Mounir IDRASSI1-22/+45
ass="p">>For system encryption that uses SHA-512 or Whirlpool, non-system encryption and file containers: Iterations = <strong>15000 &#43; (PIM x 1000)</strong> </li></ul> <p>Prior to version 1.12, the security of a VeraCrypt volume was only based on the password strength because VeraCrypt was using a fixed number of iterations.<br> With the introduction of PIM, VeraCrypt has a 2-dimensional security space for volumes based on the couple (Password, PIM). This provides more flexibility for adjusting the desired security level while also controlling the performance of the mount/boot operation.</p> <h3>PIM Usage</h3> It is not mandatory to specify a PIM.</div> <div><br> When creating a volume or when changing the password, the user has the possibility to specify a PIM value by checking the &quot;Use PIM&quot; checkbox which in turn will make a PIM field available in the GUI so a PIM value can be entered.</div> <div>&nbsp;</div> <div>The PIM is treated like a secret value that must be entered by the user each time alongside the password. If the incorrect PIM value is specified, the mount/boot operation will fail.</div> <div>&nbsp;</div> <div>Using high PIM values leads to better security thanks to the increased number of iterations but it comes with slower mounting/booting times.</div> <div>With small PIM values, mounting/booting is quicker but this could decrease security if a weak password is used.</div> <div>&nbsp;</div> <div>During the creation of a volume or the encryption of the system, VeraCrypt forces the PIM value to be greater than or equal to a certain minimal value when the password is less than 20 characters. This check is done in order to ensure that, for short passwords, the security level is at least equal to the default level provided by an empty PIM.</div> <div>&nbsp;</div> <div>The PIM minimal value for short passwords is <strong>98</strong> for system encryption that doesn't use SHA-512 or Whirlpool and <strong>485</strong> for the other cases. For password with 20 characters and more, the PIM minimal value is <strong>1</strong>. In all cases, leaving the PIM empty or setting its value to 0 will make VeraCrypt use the default high number of iterations as explained in section <a href="Header%20Key%20Derivation.html"> Header Key Derivation</a>.</div> <div><br> Motivations behind using a custom PIM value can be:<br> <ul> <li>Add an extra secret parameter (PIM) that an attacker will have to guess </li><li>Increase security level by using large PIM values to thwart future development of brute force attacks. </li><li>Speeding up booting or mounting through the use of a small PIM value (less than 98 for system encryption that doesn't use SHA-512 or Whirlpool and less than 485 for the other cases) </li></ul> <p>The screenshots below show the step to mount a volume using a PIM equal to 231:</p> <table style="margin-left:auto; margin-right:auto"> <tbody> <tr> <td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png" alt="" width="499" height="205"></td> </tr> <tr> <td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png" alt="" width="499" height="205"></td> </tr> </tbody> </table> <p>&nbsp;</p> <h3>Changing/clearing the PIM</h3> <p>The PIM of a volume or for system encryption can be changed or cleared using the change password functionality. The screenshots below shows an example of changing the PIM from the empty default value to a value equal to 3 (this is possible since the password has more than 20 characters). In order to do so, the user must first tick &quot;Use PIM&quot; checkbox in the &quot;New&quot; section to reveal the PIM field.</p> <table width="519" style="height:896px; width:519px; margin-left:auto; margin-right:auto"> <caption><strong>Normal volume case</strong></caption> <tbody> <tr> <td style="text-align:center"><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.png" alt="" width="511" height="436"></td> </tr> <tr> <td> <p><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.png" alt="" width="511" height="436"></p> </td> </tr> </tbody> </table> <h5>&nbsp;</h5> <table style="margin-left:auto; margin-right:auto"> <caption><strong>System encryption case</strong></caption> <tbody> <tr> <td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.png" alt="" width="501" height="426"></td> </tr> <tr> <td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.png" alt="" width="501" height="426"></td> </tr> </tbody> </table> <p>&nbsp;</p> <p><a href="VeraCrypt%20Volume%20Format%20Specification.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section &gt;&gt;</a></p> </div> </div><div class="ClearBoth"></div></body></html>