file security

Why not?

Hehe, hey there! I’m back with a new info here. Do you know about encryption?

            Encryption is a method in which plaintext (readable data) is converted to ciphertext (encoded data) and can be translated by other entities if they have access to the decryption key. Encryption is one of the most important methods for providing data security, especially for end-to-end protection of data sent over the network. Encryption is widely used on the internet to protect user information sent between browsers and servers, including passwords, payment information and other personal information that is considered to be classified. Organizations and individuals also usually use encryption to protect sensitive data stored on computers, servers and mobile devices such as cellphones or tablets. VeraCrypt is one of the “tools” that can be used to encrypt.

            VeraCrypt is an open source software used for on-the-fly (OTFE) encryption on Windows, Mac and Linux. VeraCrypt can create virtual encrypted disks in files or encrypt partitions or entire storage devices with pre-boot authentication. VeraCrypt is a derivative of the terminated TrueCrypt project. Many security improvements have been implemented and problems raised by TrueCrypt code audits have been fixed.

            VeraCrypt can quickly encrypt system partitions or entire system drives, e.g. partition or drive where the operating system is installed. System encryption provides the highest level of security and privacy, because all files, including temporary files created and applications on the system partition, hibernation files, swap files, etc., are always permanently encrypted. All log files and registry entries are always encrypted permanently.

            System encryption involves pre-boot authentication, which means that anyone who wants to obtain, access and use an encrypted system, reads and writes files stored on the system drive, etc., must enter the correct password every time before the operating system boots (starts). Pre-boot authentication is handled by the VeraCrypt Boot Loader, which is on the first boot drive track and on the VeraCrypt Rescue Disk. VeraCrypt can encrypt an unencrypted system partition or drive in storage while the operating system is running. The operating mode used for system encryption is XTS.

            VeraCrypt adds enhanced security to the algorithm used for system and partition encryption which makes it more resistant to brute-force attacks. VeraCrypt can also overcome many of the vulnerabilities and security problems found in TrueCrypt. For example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations while in VeraCrypt it uses 327661. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses 655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool. This enhanced security adds delay only to opening encrypted partitions without any performance impact on the application usage phase. This can be accepted by the rightful owner, but makes it difficult for the attacker to gain access to the encrypted data.


The following are the main features provided by VeraCrypt, namely:

• Creating virtual encrypted disks in files and installing them as real disks;

• Encrypt entire partitions or storage devices such as a USB flash drive or hard drive;

• Encrypts the partition or drive where Windows is installed (pre-boot authentication);

• Automatic, real-time (on-the-fly) and transparent encryption;

• Paralization and piping allow data to be read and written as quickly as if the drive was not encrypted;

• Encryption can be hardware accelerated in modern operating system prerequisites, and

• Provides reasonable denial, if the enemy forces you to reveal a password: hidden volume (steganography) and hidden operating system.


Please enter your comment!
Please enter your name here