VeraCrypt

Documentation >> Conversion Guide for Versions 1.26 and Later

Conversion Guide for VeraCrypt 1.26 and Later

1. Introduction

Version 1.26 and newer of VeraCrypt have introduced significant changes by removing support for certain features. If you encounter issues while mounting volumes, this guide will help you understand and resolve them.

2. Deprecated Features in VeraCrypt 1.26 and Later

The following features have been deprecated:

If you experience mounting errors with volumes created in VeraCrypt 1.25.9 or older, use VeraCrypt 1.25.9 to check if these deprecated features are in use. Highlight the volume and click on "Volume Properties" in the GUI to check.

3. Remediation Procedures Based on Version

3.1 Scenario 1: Using VeraCrypt 1.25.9 or Older

If you are using or can upgrade to VeraCrypt 1.25.9, follow these steps:

Download the 1.25.9 version here.

3.2 Scenario 2: Upgraded to VeraCrypt 1.26 or Newer

If you have already upgraded to VeraCrypt 1.26 or newer, follow these steps:

If you are on Linux or Mac, temporarily downgrade to VeraCrypt 1.25.9. Windows users can use the VCPassChanger tool that can be downloaded from here.

All OSes temporarily downgrade to 1.25.9 version.

4. Conversion and Remediation Procedures

4.1 Converting TrueCrypt Volumes to VeraCrypt

TrueCrypt file containers and partitions created with TrueCrypt versions 6.x or 7.x can be converted to VeraCrypt using VeraCrypt 1.25.9 or the VCPassChanger tool on Windows. For more details, refer to the documentation.

After conversion, the file extension will remain as .tc. Manually change it to .hc if you want VeraCrypt 1.26 or newer to automatically recognize it.

4.2 Changing Deprecated HMAC-RIPEMD-160 Hash Algorithm

Use the "Set Header Key Derivation Algorithm" feature to change the HMAC-RIPEMD-160 hash algorithm to one supported in VeraCrypt 1.26. Refer to the documentation for more details.

4.3 Recreating VeraCrypt Volume if Using GOST89 Encryption Algorithm

If your volume uses the GOST89 encryption algorithm, you will need to copy your data elsewhere and recreate the volume using a supported encryption algorithm. More details are available in the encryption algorithm documentation.

5. Important Notes

Note to users who created volumes with VeraCrypt 1.17 or earlier:

To avoid revealing whether your volumes contain a hidden volume or not, or if you rely on plausible deniability, you must recreate both the outer and hidden volumes, including system encryption and hidden OS. Discard existing volumes created prior to VeraCrypt 1.18a.

For more information, visit: