Program Menu
Note: To save space, only the menu items that are not self-explanatory are described in this documentation.
Volumes -> Auto-Mount All Device-Hosted Volumes
See the section Auto-Mount Devices.
Volumes -> Dismount All Mounted Volumes
See the section Dismount All.
Volumes -> Change Volume Password
Allows changing the password of the currently selected VeraCrypt volume (no matter whether the
volume is hidden or standard). Only the header key and the secondary header key (XTS mode) are
changed – the master key remains unchanged. This function re-encrypts the volume header using a
header encryption key derived from a new password. Note that the volume header contains the
master encryption key with which the volume is encrypted. Therefore, the data stored on the
volume will not be lost after you use this function (password change will only take a few seconds).
To change a VeraCrypt volume password, click on Select File or Select Device, then select the
volume, and from the Volumes menu select Change Volume Password.
Note: For information on how to change a password used for pre-boot authentication, please see
the section System -> Change Password.
See also the chapter Security Requirements and Precautions.
PKCS-5 PRF
In this field you can select the algorithm that will be used in deriving new volume header
keys (for more information, see the section Header Key Derivation, Salt, and Iteration
Count) and in generating the new salt (for more information, see the section Random
Number Generator).
Note: When VeraCrypt re-encrypts a volume header, the original volume header is first
overwritten many times (3, 7, 35 or 256 depending on the user choice) with random data to
prevent adversaries from using techniques such
as magnetic force microscopy or magnetic
force scanning tunneling microscopy [17] to
recover the overwritten header (however, see
also the chapter Security Requirements and
Precautions).
Volumes -> Set Header Key Derivation Algorithm
This function allows you to re-encrypt a volume header with a header key derived using a different
PRF function (for example, instead of HMAC-RIPEMD-160 you could use HMAC-Whirlpool). Note
that the volume header contains the master encryption key with which the volume is encrypted.
Therefore, the data stored on the volume will not be lost after you use this function. For more