658731
66
Zoom out
Zoom in
Previous page
1/162
Next page
67
Keyfiles
Keyfile is a file whose content is combined with a password (for information on the method used to
combine a keyfile with password, see the chapter Technical Details, section Keyfiles). Until the
correct keyfile is provided, no volume that uses the keyfile can be mounted.
You do not have to use keyfiles. However, using keyfiles has some advantages:
May improve protection against brute force attacks (significant particularly if the volume
password is not very strong).
Allows the use of security tokens and smart cards (see below).
Allows multiple users to mount a single volume using different user passwords or PINs.
Just give each user a security token or smart card containing the same VeraCrypt keyfile
and let them choose their personal password or PIN that will protect their security token or
smart card.
Allows managing multi-user shared access (all keyfile holders must present their keyfiles
before a volume can be mounted).
Any kind of file (for example, .txt, .exe, mp3
*
, .avi) can be used as a VeraCrypt keyfile (however,
we recommend that you prefer compressed files, such as .mp3, .jpg, .zip, etc). Note that VeraCrypt
never modifies the keyfile contents.
You can select more than one keyfile; the order does not matter. You can also let VeraCrypt
generate a file with random content and use it as a keyfile. To do so, select Tools -> Keyfile
Generator.
Note: Keyfiles are currently not supported for system encryption.
WARNING: If you lose a keyfile or if any bit of its first 1024 kilobytes changes, it will be impossible
to mount volumes that use the keyfile!
WARNING: If password caching is enabled, the password cache also contains the
processed contents of keyfiles used to successfully mount a volume. Then it is possible to
remount the volume even if the keyfile is not available/accessible. To prevent this, click Wipe
Cache or disable password caching (for more information, please see the section Settings ->
Preferences, subsection Cache passwords in driver memory).
See also the section Choosing Passwords and Keyfiles in the chapter Security Requirements and
Precautions.
Keyfiles Dialog Window
If you want to use keyfiles (i.e. apply” them) when creating or mounting volumes, or changing
passwords, look for the Use keyfiles option and the Keyfiles button below a password input field.
*
However, if you use an MP3 file as a keyfile, you must ensure that no program modifies the ID3 tags (e.g. song title,
name of artist, etc.) within the MP3 file. Otherwise, it will be impossible to mount volumes that use the keyfile.
66


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for VeraCrypt 1.16 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of VeraCrypt 1.16 in the language / languages: English as an attachment in your email.

The manual is 2,98 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info