Test programs for encryption data. How to encrypt the entire hard disk using VeracryPt. Encrypt with windows

Run the encryption tool in Windows by entering the "BitLocker" search bar and selecting the "BitLocker Management" item. In the next window, you can activate encryption by clicking on "Enable BitLocker" next to the designation of the hard disk (if an error message appears, read the "Using BitLocker without TPM" section).

Now you can choose whether you want to use a USB flash drive or password when disclooking an encrypted disk. Regardless of the option of the selected option, during the setup process you will need to save or print the recovery key. You will need it if you forget the password or lose your flash drive.

Using BitLocker without TPM

Configure BitLocker.
BitLocker also functions without TPM chip - True, for this you need to make some settings in the Local Group Policy Editor.

{!LANG-109b58514a7d4a524114a55ce22c51d1!}

{!LANG-32dad1da79bd8d36d5bdef8b3c95cdff!}

{!LANG-2366772edb49123cbc178db1d0d03c73!}

After you encrypted your disc, you will need to specify PIM after the password, you will need to specify PIM (Personal Iterations Multiplier). If you have not installed PIM when setting up, then simply press ENTER.

Researchers from Princeton University found a method for bypassing the encryption of hard drives using the property of the RAM modules to store information over a short period of time, even after stopping the power supply.

Preface

Since to access an encrypted hard disk, you must have the key, and it, of course, is stored in RAM - everything you need is to get physical access to the PC for a few minutes. After rebooting from an external hard disk or with USB Flash, a complete memory dump is made and the access key is retrieved within a few minutes.

In this way, it is possible to obtain encryption keys (and full access to the hard disk) used by BitLocker, Filevault and Dm-Crypt programs in Windows Vista, Mac OS X and Linux operating systems, as well as a popular free TrueCRYPT hard disk encryption system.

The importance of this work is that there is no simple protection techniques from this method of hacking, except for the power outage to sufficiently erasing the data.

The visual demonstration of the process is presented in video.

annotation

Contrary to the well-minded opinion, the DRAM memory, which is used in most modern computers, stores data in itself even after turning off the power for a few seconds or minutes, and this happens at room temperature and even, in the event of a chip extraction from the motherboard. This time is quite enough to remove the full dump of RAM. We will show that this phenomenon allows an attacker having physical access to the system by bypassing the OS functions of the protection of data on cryptographic keys. We will show how to reboot can be used to make successful attacks on well-known hard disk encryption systems without using any specialized devices or materials. We experimentally determine the degree and probability of preserving residual magnetization and show that the time for which data can be removed can be significantly increased using simple techniques. It will also be offered new methods for finding cryptographic keys in memory dumps and correcting errors related to the loss of bits. It will also be discussed about several ways to reduce risk data, but we are not known to us a simple solution.

Introduction

Most experts come from the fact that data from the computer's RAM is erased almost instantly after turning off the power, or believe that the residual data is extremely difficult to extract without the use of special equipment. We will show that these assumptions are incorrect. Normal DRAM memory loses data gradually within a few seconds, even at normal temperatures, and even if the memory chip will be extracted from the motherboard, the data will be saved in it for minutes or even hours, subject to storage of this chip at low temperatures. Residual data can be restored using simple methods that require short-term physical access to the computer.

We will show a series of attacks that, using the effects of residual DRAM magnetization, allow us to restore the encryption keys stored in the memory. This is a real threat to laptop users who rely on the hard disk encryption systems. After all, if the attacker will kidnap the laptop, at the moment when the encrypted disk is connected, it will be able to spend one of our attacks to access the content, even if the laptop itself is blocked or is in sleep mode. We will demonstrate this, successfully attacking several popular encryption systems, such as - BitLocker, TrueCrypt and FileVault. These attacks must be successful in relation to other encryption systems.

Although we focused our efforts on encryption systems of hard drives, in case of physical access to the attacker's computer, any important information stored in RAM can be an object for attack. Probably, many other security systems are vulnerable. For example, we found that Mac OS X leaves passwords from records in memory, from where we are able to extract them, we also made attacks on receiving closed RSA keys of the Apache Web Server.

Some representatives of the information security communities and semiconductor physics have already known about the effect of the residual magnetization of DRAM, there were very little information about this. As a result, many who design is developing or uses security systems, just unfamiliar with this phenomenon and how easy it can be used by an attacker. As far as we know, this is the first detailed work of studying the consequences of data of informational safety.

Attacks on encrypted discs

Encryption of hard disks is a well-known way to protect against theft of data. Many believe that the encryption systems of hard drives will protect their data, even if the attacker received physical access to the computer (actually, for this, they are needed, approx. Ed.). California State Law, adopted in 2002, obliges to report possible cases of personal data disclosure, only if the data was not encrypted, because It is believed that data encryption is a sufficient protective measure. Although the law does not describe any specific technical solutions, many experts recommend using the encryption systems of hard drives or sections, which will be considered sufficient measures to protect. The results of our study showed that the faith in encryption disks is unreasonable. Attacking, far from the highest qualification, can bypass many widely used encryption systems, if the laptop with data is kidnapped, while it has been turned on or in sleep mode. And the data on the laptop can be read even when they are on an encrypted disk, so the use of encryption systems of hard drives is not sufficient measure.

We used several types of attacks on well-known encryption systems of hard drives. The most time was taken by installing encrypted discs and verify the correctness of the discovered encryption keys. Obtaining an image of RAM and the search for keys occupied only a few minutes and were fully automated. There is reason to believe that most of the encryption systems of hard disks are subject to such attacks.

BitLocker

BitLocker is a system that is part of some versions of Windows Vista. It functions as a driver running between the file system and the hard disk driver, encrypting and decrypting on demand selected sectors. The keys used to encrypt the keys are in RAM until the encrypted disk is appreciated.

To encrypt each of the BitLocker hard disk sector, uses the same pair of keys created by the AES algorithm: sector encryption key and encryption key, working in the clutch mode of encrypted blocks (CBC). These two keys in turn are encrypted by a master key. To encrypt the sector, the binary folding procedure is performed with a session key created by encrypting the sector offset byte key sector encryption. Then, the obtained data is processed by two mixing features that are used by the Elephant algorithm developed by Microsoft. These vaults are used to increase the number of changes in all cipher bits and, accordingly, increasing the uncertainty of encrypted sector data. In the last step, the data is encrypted by the AES algorithm in CBC mode using the corresponding encryption key. The initialization vector is determined by encrypting the sector offset byte of the encryption key used in CBC mode.

We have implemented a fully automated demonstration attack called BitUnlocker. At the same time, an external USB disk with Linux OS and a modified syslinux-based loader and a FUSE driver allows you to connect encrypted BitLocker discs in Linux OS. On the test computer with the Windows Vista, the power was disconnected, the USB hard disk connected, and the load was loaded from it. After that, BitunLocker automatically made a dump of RAM to an external disk, using the KeyFind program to search for possible keys, tested all the appropriate options (pairs of sector encryption key and CBC mode pairs), and in case of luck, connected an encrypted disk. As soon as the disk was connected, it appeared with it to work with any other disc. On a modern laptop with 2 gigabytes of RAM, the process occupied about 25 minutes.

It is noteworthy that this attack was made possible without reverse-engineering of any software. In the Microsoft documentation, the BitLocker system is sufficiently described to understand the role of the sector encryption key and the CBC mode key and create its program implementing the entire process.

The main difference between BitLocker from other programs of this class is a way to store keys with a disconnected encrypted disk. By default, in the basic mode, BitLocker protects the wizard only with a TPM module that exists on many modern PCs. This method, which, apparently, is widely used, especially vulnerable to our attack, because it allows you to get encryption keys, even if the computer was turned off for a long time, because when the PC is loaded, the keys are automatically loaded into the RAM (before the appearance login windows) without entering any authentication data.

Apparently, Microsoft specialists are familiar with this problem and therefore recommend configuring BitLocker to an improved mode where key protection is carried out, not only with TPM, but also a password or key on an external USB carrier. But, even in this mode, the system is vulnerable if the attacker gets physical access to the PC at the moment when it works (it can even be blocked or in sleep mode, (states - is simply turned off or Hibernate is considered not subject to this Attack).

FileVault.

The FileVault system from Apple was partially investigated and reverse engineering. Mac OS X 10.4 FILEVAULT uses a 128-bit AES key in CBC mode. When the user's password is entered, the title containing the AES key and the second key of the K2 used to calculate the initialization vectors are decrypted. The initialization vector for the i-thom disc block is calculated as HMAC-SHA1 K2 (I).

We used our EFI program to obtain RAM images to receive data from a Mac (based on the Intel processor) with a connected disk encrypted FileVault. After that, the Keyfind program unmistakably automatically found the AES keys FileVault.

Without an initialization vector, but with the resulting AES key appears the ability to decrypt 4080 of 4096 bytes of each disc block (everything except the first AES block). We made sure that the initialization vector is also in the dump. Assuming that the data did not have time to distort, the attacker can determine the vector, alternately trying all the 160-bit lines in the dump and checking whether they can form a possible open text, with their binary addition with a decryne first part of the unit. Together, using programs like Vilefault, AES keys and initialization vector allow you to fully decrypt the encrypted disk.

In the process of studying FileVault, we found that Mac OS X 10.4 and 10.5 leave multiple copies of a user password in memory, where they are vulnerable to this attack. Passwords of accounts are often used to protect keys, which in turn can be used to protect key phrases encrypted FileVault discs.

TrueCrypt.

TrueCrypt is a popular open source encryption system operating on Windows, MacOS and Linux. It supports many algorithms, including AES, Serpent and Twofish. In the 4th version, all algorithms worked in LRW mode; In the current 5th version, they use XTS mode. TrueCrypt stores the encryption key and the TWEAK key in the section title on each disc, which is encrypted by another key received from the password entered by the user.

We tested TrueCrypt 4.3a and 5.0a working under Linux OS. We connected the disk encrypted using a 256-bit AES key, then turned off the power and used to download your own software dump. In both cases, Keyfind has discovered a 256-bit intact encryption key. Also, in the case of TrueCrypt 5.0.a, Keyfind was able to recover the TWEAK key XTS mode.

To decrypt the discs created by TrueCHRYPT 4, you need a TWEAK key key LRW. We found that the system stores it in four words before the key schedule of the AES key. In our dump, the LRW key was not distorted. (If errors appear, we still could restore the key).

Dm-Crypt.

The Linux kernel, starting with version 2.6, includes the built-in support for DM-Crypt - the disk encryption subsystem. DM-Crypt uses many algorithms and modes, but by default, it uses a 128-bit AES cipher in CBC mode with initialization vectors not based on key information.

We tested the created DM-Crypt partition using LUKS (Linux Unified Key Setup) The CryptSetup utility branch and 2.6.20 kernel. The disc was encrypted using AES in CBC mode. We briefly disconnected the power and, using the modified PXE loader, made a memory dump. The KeyFind program has discovered the correct 128-bit AES key, which has been restored without any errors. After its recovery, the attacker can decipher and connect the Encrypted DM-Crypt section, modifying the CryptSetup utility so that it perceives the keys in the required format.

Ways to protect and restrict them

The implementation of protection against attacks on RAM is nontrivial, since the cryptographic keys used must be stored somewhere. We suggest focusing efforts to destroy or hide the keys before the attacker can receive physical access to the PC, preventing the launch of RAM to dump, physically protecting the RAM microcircuits and, if possible, reducing the data storage period in RAM.

Overwrite memory

First of all, it is necessary to avoid storage of keys in RAM. You must overwrite key information if it is no longer used, and prevent data from copying data into paging files. Memory should be cleaned in advance of OS or additional libraries. Naturally, these measures will not protect the keys currently as they must be stored in memory, such as such keys both used for encrypted discs or on protected web servers.

Also, RAM should be cleaned during the download process. Some PCs can be configured in such a way as to clean RAM when loading using a Power-On Self-Test) before you download the OS. If the attacker cannot prevent the execution of this request, then on this PC it will not have the ability to make a memory dump with important information. But, he still has the opportunity to pull out the RAM chips and insert them into another PC with the BIOS settings necessary.

Limit download from a network or removable media

Many of our attacks were implemented using boot over a network or from removable media. The PC must be configured to require an administrator password to download from these sources. But it should be noted that even if the system is configured to download only from the main hard disk, the attacker can change the rigid disk itself, or in many cases, reset the computer's NVRAM to roll back to the initial BIOS settings.

Safe sleep mode

The results of the study showed that the simple blocking of the desktop PC (i.e., the OS continues to work, but in order to start interaction with it, the password is needed) does not protect the contents of RAM. Sleeping mode is not effective and if the PC is blocked when you return from the sleep mode, since the attacker can activate the return from the sleep mode, after which it is possible to restart the laptop and make a memory dump. Hibernate Mode (RAM contents is copied to the hard disk) will also not help, except cases of using key information on alienated media to restore normal functioning.

Most of the encryption systems of hard drives, users can turn off the PC. (The BitLocker system in the basic mode of operation of the TPM module remains vulnerable, since the disk will be connected automatically when the PC is turned on). The contents of the memory can be saved for a short period after the disconnection, so it is recommended to watch your workstation for another couple of minutes. Despite its effectiveness, this measure is extremely inconvenient due to the long loading of workstations.

The transition to sleep mode can be secured in the following ways: require a password or other other secret to "wake up" the workstation and encrypt the contents of the memory key derived from this password. The password must be resistant, since the attacker can make a memory dump and then try to choose a password for busting. If all memory encryption is not possible, it is necessary to encrypt only those areas that contain key information. Some systems can be configured in such a way as to switch to such a type of protected sleep mode, although this is usually not the default setting.

Refusal of preliminary calculations

Our studies have shown that the use of preliminary calculations in order to speed up cryptographic operations makes key information more vulnerable. Pre-calculations lead to the fact that redundant key data information appears in the memory, which allows an attacker to restore the keys even if errors have. For example, as described in Section 5, information about the iterative keys of the AES and DES algorithms is extremely redundant and useful for the attacker.

Refusal of preliminary calculations will reduce performance because potentially complex calculations will have to repeat. But, for example, you can cache pre-calculated values \u200b\u200bat a certain time interval and erase the data obtained if they are not used during this interval. This approach is a compromise between the security and performance of the system.

Expansion of keys

Another way to prevent key recovery is to change key information stored in memory, so as to complicate the key recovery due to various errors. This method was considered in the theory where the function was shown, resistant to disclosure, whose input data remains hidden, even if almost all outputs were detected, which is very similar to the operation of unidirectional functions.

In practice, imagine that we have a 256-bit AES key K, which is not currently used, but will be needed later. We cannot overwrite it, but we want to make it resistant to recovery attempts. One way to achieve this is to highlight a large b-bit area of \u200b\u200bdata, fill it with random data R, after which it is stored in memory the result of the next conversion K + H (R) (binary summation, approx. Ed.), Where h is a hash Function, for example SHA-256.

Now imagine that the electricity has been disabled, this will lead to the fact that D bits in this area will be changed. If the hash feature is resistant, when you try to restore the K key, the attacker can only calculate that it can guess which bits of the region B were changed from about half that could change. If D bits were changed, the attacker will have to search the area size (b / 2 + d) / d To find the correct values \u200b\u200bof R and after that, to restore the key K. If the area B is large, such a search can be very long, even if D relative Mala.

Theoretically, in such a way you can store all the keys, counting each key, only when we need it, and deleting it when we do not need it. Thus, applying the above method, we can store keys in memory.

Physical protection

Some of our attacks were based on the presence of physical access to memory microcircuits. Such attacks can be prevented by physical memory protection. For example, the memory modules are located in a closed PC body, or filled with epoxy glue to prevent attempts to extract them or access them. Also, you can realize the memory of memory as a response to low temperatures or attempts to open the case. This method will require the installation of sensors with an independent power system. Many of these methods are associated with equipment protected from unauthorized intervention (for example, the IBM 4758 coprocessor) and can greatly increase the cost of the workstation. On the other hand, the use of memory soldered to the motherboard will cost much cheaper.

Change architecture

You can change the PC architecture. What is impossible for the already used PCs, but will allow you to secure new ones.

The first approach is to design DRAM modules in such a way that they are fasterly erased by all data. This may not be easy, since the goal as quickly erasing the data is contrary to another purpose so that the data does not disappear between the memory update periods.

Another approach is to add key information storage equipment that would guarantee all the information from its repositories when starting, restarting and shutting down. Thus, we will get a reliable place to store multiple keys, although the vulnerability associated with their preliminary calculations will remain.

Other experts offered architecture, in which the contents of the memory will be constantly encrypted. If, in addition to this, to implement the erase of keys when rebooting and disconnecting electricity, this method will provide sufficiently protected from the attacks we have described.

Trusted calculations

The equipment corresponding to the concept of "trusted calculations", for example, in the form of TPM modules is already used in some PCs. Despite its utility in defense against some attacks, in its current form, such equipment does not help prevent the attacks described by us.

Used TPM modules do not implement complete encryption. Instead, they are watching the download process to make a decision on whether to load the key in RAM is safe or not. If you want to use the key, you can implement the following technology: the key, the form suitable for use will not be stored in RAM, until the download process goes to the expected scenario. But, as soon as the key turns out to be in RAM - it immediately becomes a target for our attacks. TPM modules can prevent the key to memory load, but they do not prevent it from reading from memory.

conclusions

Contrary to popular opinion, the DRAM modules are in disabled status stored data for a relatively long time. Our experiments have shown that this phenomenon allows you to implement a whole class of attacks that allow you to obtain important data, such as encryption keys from RAM, despite OS attempts to protect its contents. The attacks described by us are realizable in practice, and our examples of attacks on popular encryption systems prove it.

But other types are also vulnerable. Digital Right Control Systems (DRM) often use symmetric keys stored in memory, and they can also be obtained using the methods described. As we have shown, web servers with SSL support are also vulnerable because they store closed keys necessary to create SSL sessions. Our ways to search for key information are likely to be effective to search for passwords, account numbers and any other important information stored in RAM.

It seems that there is no simple way to eliminate the found vulnerabilities. The change in most likely will not be effective; Hardware changes will help, but temporary and resource costs will be great; The technology of "trusted calculations" in today's form is as little effective, since it cannot protect the keys in memory.

In our opinion, laptops are most susceptible to this risk, which are often in public places and operate in modes vulnerable to attack data. The presence of such risks shows that the encryption of discs protects important data to a lesser extent than is considered to be.

As a result, it may have to consider DRAM memory as a not trusted component of the modern PC, and avoid processing important confidential information in it. But at the moment it is inappropriate, as long as the architecture of modern PCs does not change to allow the keys to keep keys in a safe place.

Editor's Choice

Programs encryption files

Encrypt everything!

Every time the information about the scandal associated with the fact that important documents leaked somewhere were leaked, I ask myself why they were not encrypted? Document protection should be everywhere in the end.

Encryption algorithms

The encryption algorithm is similar to a black box. Dump document, images or other file that you download to it, you get back. But what you see seems to be nonsense.

You can turn this plate back to a normal document through a window with the same password that you entered when encrypted. Only so you get the original.

The US government recognized the advanced encryption standard (AES) as a standard, and all products that are assembled here, support AES encryption standard.

Even those who support other algorithms are usually recommended to use AES.

If you are an encryption expert, you may prefer another algorithm, blowfish, and perhaps even the algorithm of the Soviet government for GOST.

But it is already completely for lovers of extreme entertainment. For an ordinary user AES is just an excellent solution.

Open key cryptography and exchange

Passwords are important and you must keep them secret, right? Well, not when using open key infrastructure (PKI), which is used in cryptography.

If I want to send you a secret document, I just encrypt it using an open key. When you get it, you can use it to decipher the document. All simple!

Using this system in the opposite direction, you can create a digital signature that confirms that your document came from you and was not changed. How? Just encrypt it with your closed key.

The fact that your public key decrypts it is proof that you have the right to edit it.

PKI support is less common than support for traditional symmetric algorithms.

Many products allow the creation of self-seeping executable files.

You may also find that the recipient can use a free definite tool for decryption only.

What's better?

Now there is a huge selection of products available in the encryption area.

Everyone simply has to choose the solution that will be convenient for functionality, practical and stylish from the point of view of the primary program interface.

Digital CertainSafe Safe passes through a multistage security algorithm that identifies you on the site. You will have to pass several authentication.

Your files are encrypted if they are trying to hack, they crumple themselves, and no one can recreate them. In this case, there is a certain risk, but at the same time, the level of reliability is very worthy.

Then each piece of file is stored on another server. A hacker who was able to hack one of the servers will not be able to do anything useful.

Lock can encrypt files or just lock them so that no one can open them. It also offers encrypted lockers for safe storage personal confidential.

Among other useful features, it is possible to mention the possibility of grinding, free space shutter, secure network backup and self-seeping files.

Veracrypt (Windows / OS X / Linux)

Veracrypt supports encryption on TrueCrypt, which has ceased to develop last year.

The developer team argues that they have already considered the issue raised during the initial TrueCrypt audit, and believe that it can still be used as an accessible version for, OS X and.

If you are looking for a file encryption tool that really works, then it is it. Veracrypt supports AES (most frequently used algorithm).

It also supports TWOFISH and Serpent Encryption Ciphers, supports both hidden encrypted volumes.

The program code is open, most of the code base consists of TrueCrypt.

The program is also constantly developing, regular security updates and independent audit at the planning stage (according to developers).

Those of you who have already tried it, praised it for the fact that the encryption tool works perfectly on the fly, and in your files are decrypted only when they are needed. So the rest of the time they are stored in an encrypted form.

Especially users note that the program is a powerful tool that is easy to use and always to the place. Yes, he lacks a pretty interface or tons of bells.

AXCRYPT (Windows)

AxCrypt is a free program, open source GNU license.

The GPL-licensed encryption tool for Windows, which is proud to be simple, efficient and reliable to use.

It is perfectly integrated with the Windows shell, so you can right-click on the file that you want to encrypt and give the command.

Or you can simply configure the executable code, so the file will be blocked if it is not used for a certain period of time. It can be decrypted later, or when the recipient will notify about receipt.

Files with AxCrypt can be decrypted on request or keep them decrypted while they are used, and then automatically they will be encrypted.

It supports 128-bit AES encryption, provides protection against hacking attempts. It is very light (less than 1 MB.)

Everyone himself decides which program to use, but if your data is at least worth something for you, be sure to think about what you need a program for encryption.

Encryption of files and folders in Windows

Programs for encryption files: what better to choose?

Our carriers in huge quantities are kept personal and important information, documents and media files. They must be protected. Cryptographic methods like AES. and TwofishStandardly offered in encryption programs belong to about one generation and provide a relatively high level of security.

In practice, the usual user will not be able to make a mistake in choosing. Instead, it is worth deciding to determine the specialized program depending on the intentions: often the encryption of the hard disk uses a different operating mode than encrypting files.

For a long time, the best choice was utility TrueCrypt.If it came about the full encryption of the hard disk or save data in an encrypted container. Now this project is closed. An open source program was his worthy receiver Veracrypt.. The TrueCrypt code was put in its foundation, but it was finalized, thanks to which the encryption quality increased.

For example, in VeraCrypt improved password key generation. For encryption hard drives, not such a common mode is used as CBC., but XTS.. In this mode, blocks are encrypted by type ECB.However, the sector number is added and insegoment displacement.

Random numbers and strong passwords

To protect individual files, a fairly free program with a simple interface, for example, Maxa Crypt Portable. or AxCrypt.. We recommend AxCrypt because it is an open source project. However, when it is installed, you should pay attention to the fact that unnecessary additions are in the package with the application, so they need to withdraw flags.

The utility is run by right-clicking on a file or folder and password input (for example, when opening an encrypted file). This program uses the AES algorithm. 128 bits with CBC mode. To create a reliable initialization vector (IV) AX-CRYPT embeds the generator of pseudo-random numbers.

If IV is not a true random number, then the CBC mode weakens it. Maxa Crypt Portable works in a similar way, but encryption occurs with the key 256 bits long. If you download personal information to cloud storage facilities, you must proceed from the fact that their owners, such as Google and Dropbox, scan content.

BoxCryptor is embedded in the process as a virtual hard disk and right-clicking on the right mouse button encrypts all the files there are even before downloading to the cloud. It is important to get a password manager, such as Password Depot.. He creates difficult passwords who will not be able to remember any person. Need to only not to lose Master password to this program.

Use encrypted discs

Like TrueCrypt, Master Utilities Veracrypt. Will a user through all the stages of creating an encrypted disc. You can also protect the existing partition.

Encryption with one click

Free program Maxa Crypt Portable It offers all the necessary options for quick encryption of individual files according to the AES algorithm. Pressing the button you start generating a secure password.

We associate a cloud with a private life

Boxcryptor One click encrypts important files before downloading to the Dropbox or Google storage. Default applies AES encryption with a key length of 256 bits.

Crowded Stone - Password Manager

Long passwords enhance safety. Program Password Depot. Generates and applies them, including for encrypting files and working with web services that transmits data to access an account.

Photo: Manufacturers companies

In the present days, we are constantly dealing with information. Thanks to the development of information technologies, now work, creativity, entertainment has largely turned into processes for processing or consuming information. And among this huge array of information, part of the data should not be publicly available. An example of such information may be files and data related to commercial activities; Private archives.

Some of these data is not intended for a wide range just for the reason that "they have no need to know about it"; And some information is vital.

This article is devoted to reliable protection precisely vital information, as well as any files that you want to protect from access to other persons, even if your computer or carrier (flash drive, hard disk) fell into the hands of unauthorized persons, including technically advanced and access to powerful computing resources.

Why do not trust programs for encryption with a closed source code

In the closed source software, "bookmarks" can be implemented (and it is not necessary to hope that there are no there!) And the ability to open encrypted files using a master key. Those. You can use any, the most difficult password, but your encrypted file is still with ease, without password generation, it can be opened using the "bookmark" or master key owner. The size of the manufacturer of software for encryption and the name of the country in this issue is not played, as it is part of the state policy of many countries. After all, we all surround the terrorists and drug dealers (and what to do?).

Those. On really reliable encryption, you can hopefully using the popular open source software and resistant to hack encryption algorithm.

Is it worth moving with TrueCrypt on veracrypt

The reference program, which for many years allows you to very reliably encrypt files is TrueCrypt. This program still works great. Unfortunately, the program is currently terminated.

Her best heir was the VERACRYPT program.

Veracrypt is free disk encryption software, it is based on TrueCrypt 7.1a.

Veracrypt continues the best TrueCrypt traditions, but at the same time adds enhanced safety algorithms used to encrypt systems and partitions, which makes your encrypted files immune to new achievements in the attacks of full password enumeration attacks.

Veracrypt also corrected many vulnerabilities and security problems found in TrueCrypt. It can work with TrueCrypt volumes and offers the ability to convert TrueCrypt containers and non-system sections to VeraCrypt format.

This improved security adds some delay only to the opening of encrypted sections without any influence on performance in the use phase of the encrypted disk. For a legitimate user, this is a practically inconspicuous inconvenience, but for an attacker it becomes almost impossible to access encrypted data, despite the presence of any computing capacities.

This can be demonstrated by clearly the following benchmarks for hacking (mischief) passwords in Hashcat:

For TrueCrypt:

Hashtype: TrueCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 Bit Speed.dev. # 1.: 21957 H / S (96.78MS) Speed.dev. # 2.: 1175 H / S (99.79ms) Speed.Dev. # * .: 23131 H / S Hashtype: TrueCrypt PBKDF2-HMAC-SHA512 + XTS 512 Bit Speed.dev. # 1.: 9222 H / S (74.13ms) Speed.dev. # 2.: 4556 H / S (95.92ms) Speed.dev. # * .: 13778 H / S Hashtype: TrueCrypt PBKDF2-HMAC-Whirlpool + XTS 512 Bit Speed.dev. # 1.: 2429 H / S (95.69ms) Speed.dev. # 2nd: 891 H / S (98.61ms) Speed.dev. # *.: 3321 H / S Hashtype: TrueCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 Bit + Boot-Mode Speed.dev. # 1.: 43273 H / S (95.60ms) Speed.dev. # 2.: 2330 H / S (95.97MS) Speed.dev. # * .: 45603 H / S

For Veracrypt:

Hashtype: Veracrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 Bit Speed.dev. # 1.: 68 H / S (97.63ms) Speed.dev. # 2.: 3 H / S (100.62ms) Speed.Dev. # * .: 71 H / S Hashtype: Veracrypt PBKDF2-HMAC-SHA512 + XTS 512 Bit Speed.dev. # 1.: 26 H / S (87.81ms) Speed.dev. # 2.: 9 H / S (98.83ms) Speed.dev. # *.: 35 H / S Hashtype: Veracrypt PBKDF2-HMAC-Whirlpool + XTS 512 Bit Speed.dev. # 1.: 3 H / S (57.73ms) Speed.dev. # 2.: 2 H / S (94.90ms) Speed.dev. # *.: 5 H / S Hashtype: Veracrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 Bit + Boot-Mode Speed.dev. # 1.: 154 H / S (93.62ms) Speed.dev. # 2: 7 H / S (96.56ms) Speed.dev. # *.: 161 H / S Hashtype: Veracrypt PBKDF2-HMAC-SHA256 + XTS 512 Bit Speed.dev. # 1: 118 H / s (94.25ms) Speed.dev. # 2.: 5 H / S (95.50ms) Speed.dev. # *.: 123 H / S Hashtype: Veracrypt PBKDF2-HMAC-SHA256 + XTS 512 Bit + Boot-Mode Speed.dev. # 1.: 306 H / S (94.26ms) Speed.dev. # 2.: 13 H / S (96.99ms) Speed.dev. # * .: 319 H / S

As you can see, hack encrypted VeraCrypt containers for several orders of magnitude more difficult than TrueCrypt containers (which are also not completely simple).

Full Benchmark and Iron Description I published in the article "".

The second important question is reliability. No one wants to be particularly valuable and important files and information are lost due to an error in the program. I know about VeraCrypt immediately after its appearance. I watched her development and constantly looked at it. Over the past year, I completely switched to TrueCrypt on VeraCrypt. During the year of daily work, Veracrypt never let me down.

Thus, in my opinion, now it is worth moving with TrueCrypt on VeraCrypt.

How Veracrypt works

Veracrypt creates a special file called a container. This container is encrypted and can only be connected when entering the correct password. After entering the password, the container is displayed as an optional disk (as the inserted flash drive). Any files placed on this disk (i.e. in the container) are encrypted. While the container is connected, you can easily copy, delete, record new files, open them. Once the container is disabled, all files on it become absolutely unavailable until its connection will be performed, i.e. until the password is entered.

Working with files in an encrypted container is no different from working with files on any other disk.

When you open a file or write it to the container, you do not need to wait for the decryption - everything happens very quickly, as if you really work with a regular disc.

How to install veracrypt in windows

With TrueCrypt there was a half-eyed story - sites were created to "download TrueCrypt", the binary file (well, naturally!) It was infected with the virus / trojan. Those who downloaded TrueCrypt from these unofficial sites have infected their computers, which allowed the attackers to steal personal information and promote the spread of malicious software.

Actually, all programs need to download only from official sites. And even more so it concerns programs that affect security issues.

Official places to place the installation files Veracrypt are:

Installing Veracrypt in Windows

There is a setup wizard, so the process of installing Veracrypt is similar to the similar process of other programs. Unless you can explain a few moments.

The VERACRYPT installer will offer two options:

  • Install(Install Veracrypt to your system)
  • Extract.(Extract. If you select this option, all files from this package will be extracted, but nothing will be installed in your system. Do not choose it if you intend to encrypt the system partition or system disk. Selecting this option may be useful, for example, if you Want to run Veracrypt in the so-called portable mode. Veracrypt does not require installation in the operating system in which it will run. After extracting all files, you can start the directly extracted file "veracrypt.exe" (VERACRYPT will open in portable mode))

If you select the marked option, i.e. Association with files .hc.This will add convenience. Because if you create a container with extension.hc, the VERACRYPT will be launched on the double click on this file. But minus is that unauthorized persons can know that.hc are encrypted VeraCrypt containers.

The program recalls Donate:

If you are not constrained in the means, of course, be sure to help the author of this program (he one) would not like to lose it, as we lost the author TrueCrypt ...

VERACRYPT instruction for beginners

VERACRYPT has many different features and advanced features. But the most popular function is the encryption of files. Next step by step is shown how to encrypt one or more files.

Let's start with switching to Russian. Russian is already built into VeraCrypt. It only needs to be turned on. To do this in the menu Settingschoose Language ...:

Select the Russian language there, after that the program language will immediately change.

As already mentioned, the files are stored in encrypted containers (they are also called "volumes"). Those. You need to start with creating such a container, for this in the main program interface, click on the button " Create volume».

The VERACRYPT volume creation wizard appears:

We are interested in exactly the first option (" Create an Encrypted File Container"), So we, without changing, press Further,

Veracrypt has a very interesting feature - the ability to create a hidden volume. The bottom line is that there is no one and two containers. The fact that there is an encrypted section know everything, including possible unfavorers. And if you force you by force to give the password, it is difficult to refer to what the "encrypted disk is not". When creating a hidden partition, two encrypted containers are created that are posted in one file, but are opened with different passwords. Those. You can place files that look "sensitive" in one of the containers. And in the second container - really important files. For your needs, you enter a password to open an important partition. If it is impossible to refuse, you disclose a password from a not very important disk. No opportunity to prove that there is a second disk, no.

For many cases (concealing not very critical files from prying eyes) It will be enough to create a normal volume, so I just click Further.

Select the location of the file:

Tom Veracrypt can be in the file (in the VERACRYPT container) on the hard disk, USB flash drive, etc. Flash Drive The VERACRYPT container is no different from any other regular file (for example, it can be moved or deleted as other files). Click the "File" button to specify the name and path to the generated container file to store a new volume.

ATTENTION: If you choose an existing file, Veracrypt does not encrypt it; This file will be deleted and replaced by the newly created VeraCrypt container. You can encrypt the available files (subsequently), moving them to the Veracrypt container created now.

You can select any file extension, it does not affect the work of the encrypted volume. If you select Extension .hc., And also if you set the VERACRYPT association with this extension, then VERACRYPT will be launched with a double click on this file.

The history of recently open files allows you to quickly access these files. Nevertheless, entries in history like "H: \\ My offshore bills renovated on Okhuladr dollars.doc" can have unauthorized persons to tax doubts about your decency. So that the files open from the encrypted disk did not fall into history, check the box in front of " Do not save history».

Selection of encryption and hashing algorithms. If you are not sure to choose, then leave the default values:

Enter the volume size and select Units of Measurement (kilobytes, megabytes, gigabytes, terabytes):

Very important stage, set the password for your encrypted disk:

A good password is very important. Avoid passwords from one or more words that can be found in the dictionary (or combinations of 2, 3 or 4 such words). The password should not contain names or dates. It must be difficult for guessing. A good password is a random combination of uppercase and lowercase letters, numbers and special characters (@ ^ \u003d $ * +, etc.).

Now russian letters can be used as passwords.

Help the program to collect random data:

Please note that here you can put a tick to create a dynamic disk. Those. It will expand as it fills it with information.

As a result, I was created on the desktop. Test.hc file:

If you have created a file with extension.hc, then you can click on it twice, the main program window will open, and the path to the container will already be inserted:

In any case, you can open veracrypt and select the path to the file manually (for this click the "File" button).

If the password is entered correctly, you will have a new disc in the system:

You can copy / move any files to it. You can also create folders there, copy files from there, delete, etc.

To close the container from strangers, click Unmount:

To get access to your secret files again, reinstate the encrypted disk.

Setting up VeraCrypt.

Veracrypt has a lot of settings that you can change for your convenience. I strongly recommend putting a tick on " Automatically unmount volumes when inactivity during»:

And also set the hot key for " Immediately unmount everything, clean the cache and go out»:

It can be very ... very useful ...

Portable version of VeraCrypt in Windows

Starting from version 1.22 (which at the time of this writing is a beta) a portable option was added for Windows. If you have read the installation section, you must remember that the program is so portable and allows you to simply extract your files. However, a separate portable package has its own features: To start the installer you need administrator rights (even if you want to simply unpack the archive), and the portable version can be unpacked without administrator rights - the difference only in this.

Official beta versions are available only. The VERACRYPT NIGHTLY BUILDS folder with a portable version is VERACRYPT Portable 1.22-beta4.exe.

The file with the container can be placed on the flash drive. You can copy the portable version of Veracrypt to the same flash drive - this will allow you to open an encrypted partition on any computer, including without VeraCrypt installed. But remember the danger of interception of keystrokes - probably the screen keyboard can help in this situation.

How to use software for encryption

Several tips that will help you better save your secrets:

  1. Try to prevent unauthorized persons to your computer, including do not give laptops to luggage at airports; If possible, give computers to repair without a systemic hard disk, etc.
  2. Use a complex password. Do not use the same password you use for mail, etc.
  3. Do not forget the password! Otherwise, the data will not be possible to restore.
  4. Download all programs only from official sites.
  5. Use free programs or purchased (do not use the cracked software). And also do not download and do not launch dubious files, since all such programs, among other malicious elements, may have kiloggers (keystroke interceptors), which will allow an attacker to find out the password from your encrypted container.
  6. Sometimes it is recommended to use the on-screen keyboard as a means of interception of keystrokes - it makes sense.

You already know about faculty of information security from geekbrains? Comprehensive annual program practical training with coverage of all major topics, as well as with additional courses as a gift. According to the results of training is issued certificate Sample I. certificate. By a special discount on any faculties and courses!