658732
155
Zoom out
Zoom in
Previous page
1/169
Next page
The format of file-hosted volumes is identical to the format of partition/device-hosted volumes
(however, the "volume header", or key data, for a system partition/drive is stored in the last 512 bytes
of the first logical drive track). VeraCrypt volumes have no "signature" or ID strings. Until decrypted,
they appear to consist solely of random data.
Free space on each VeraCrypt volume is filled with random data when the volume is created.* The
random data is generated as follows: Right before VeraCrypt volume formatting begins, a temporary
encryption key and a temporary secondary key (XTS mode) are generated by the random number
generator (see the section Random Number Generator). The encryption algorithm that the user
selected is initialized with the temporary keys. The encryption algorithm is then used to encrypt
plaintext blocks consisting of zeroes. The encryption algorithm operates in XTS mode (see the section
Hidden Volume). The resulting ciphertext blocks are used to fill (overwrite) the free space on the
volume. The temporary keys are stored in RAM and are erased after formatting finishes.
Note that this specification applies to volumes created by VeraCrypt 1.0b or later. The format of file-
hosted volumes is identical to the format of partition/device-hosted volumes (however, the "volume
header", or key data, for a system partition/drive is stored in the last 512 bytes of the first logical drive
track). VeraCrypt volumes have no "signature" or ID strings. Until decrypted, they appear to consist
solely of random data.
Free space on each VeraCrypt volume is filled with random data when the volume is created.
*
The
random data is generated as follows: Right before VeraCrypt volume formatting begins, a
temporary encryption key and a temporary secondary key (XTS mode) are generated by the random
number generator (see the section Random Number Generator). The encryption algorithm that the
user selected is initialized with the temporary keys. The encryption algorithm is then used to
encrypt plaintext blocks consisting of zeroes. The encryption algorithm operates in XTS mode (see
the section Modes of Operation). The resulting ciphertext blocks are used to fill (overwrite) the free
space on the volume. The temporary keys are stored in RAM and are erased after formatting
finishes.
The fields located at byte #0 (salt) and #256 (master keys) contain random values generated by the
random number generator (see the section Random Number
Generator) during the volume creation
process. If a VeraCrypt volume hosts a hidden volume (within its free space), the header of the
hidden volume is located at byte #65536 of the host volume (the header of the host/outer volume is
located at byte #0 of the host volume – see the section Hidden Volume). If there is no hidden
volume within a VeraCrypt volume, bytes 65536–131071 of the volume (i.e., the area where the
header of a hidden volume can reside) contain random data (see above for information on the
method used to fill free volume space with random data when the volume is created). The layout of
the header of a hidden volume is the same as the one of a standard volume (bytes 0–65535).
The maximum possible VeraCrypt volume size is 2
63
bytes (8,589,934,592 GB). However, due to
security reasons (with respect to the 128-bit block size used by the encryption algorithms), the
maximum allowed volume size is 1 PB (1,048,576 GB).
* Provided that the options Quick Format and Dynamic are disabled and provided that the volume does not contain a
filesystem that has been encrypted in place (note that VeraCrypt does not allow the user to create a hidden volume within such a
volume).
155
155


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for VeraCrypt 1.19 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of VeraCrypt 1.19 in the language / languages: English as an attachment in your email.

The manual is 2,9 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info