VeraCrypt

by IDRIX

Freware utility for encryption on Windows

Operating system: Windows

Publisher: IDRIX

Antivirus check: passed

Last revision: Last week

Report misleading

VeraCrypt is a free open source program used to encrypt data on hard drives. It can be used to create a separate virtual volume with data or to fully encrypt the hard disk partition, including the system partition. When using the last function, the user will have to enter the password each time the PC starts up. The program also provides an opportunity to "hide" the encrypted volume from strangers' eyes.

VeraCrypt uses the following encryption algorithms: Twofish, Serpent and AES. All of the above algorithms are supported in combination: Serpent-AES, AES-Twofish-Serpent, AES-Twofish, Twofish-Serpent and Serpent-Twofish-AES. The list of cryptographic hash functions used includes: SHA-256, SHA-512, RIPEMD-160 and Whirlpool. In fact, VeraCrypt is a slightly improved version of TrueCrypt encryptor. It fixes the vulnerability of the bootloader for Windows and also uses much more iterations when generating the key.

All you need to know for a user who doesn't know much about cryptography is that VeraCrypt reliably protects private data. It is equipped with a volume creation wizard, which allows you to set up encryption in a few steps. VeraCrypt also supports the ability to assign hotkeys to various operations, such as automatic mounting of all devices, closing token sessions, cleaning the cache and so on. They will help you in situations where you urgently need to hide the encrypted volume and clear the data about working with it.

- allows you to create new encrypted data volumes and encrypt entire hard drive partitions;

- allows you to hide the encrypted volumes;

- uses strong encryption algorithms: Twofish, Serpent and AES;

- includes a step-by-step master of tomatoes;

- is completely free and has open source code.

Tyler
VeraCrypt has added extra security to my work bringing peace of mind back into my life again. Its added increased security too, since I've started using it my system hasn't once been hacked, something that had happened a few times before I started using it!
Leo
It is the real deal and has all the features of an open source product, so any problem can be fixed as soon as it appears. From the encryption of an entire operating system to the ability to create a second hidden operating system that cannot be traced. Same for creating an encrypted volume that can optionally contain a hidden volume that is not discoverable. It even allows you to choose the combination of hash algorithms, along with the ability to use security tokens and smart cards.
dirLock logo
Free program that allows you to password protect folders and hide them if you choose
Advanced Office Password Recovery logo
Recover, remove or circumvent passwords protecting documents created with a variety of office suites
CyberGhost VPN logo
Highest encryption with no logs policy
TrueCrypt logo
An application for on-the-fly encryption in a file, partition, or the entire storage device
Advanced RAR Password Recovery logo
Recover passwords protecting encrypted ZIP and RAR archives