VeraCrypt

by IDRIX

Freware utility for encryption on Windows

Operating system: Windows

Publisher: IDRIX

Antivirus check: passed

Last revision: Last week

Report misleading

VeraCrypt is a free open source program used to encrypt data on hard drives. It can be used to create a separate virtual volume with data or to fully encrypt the hard disk partition, including the system partition. When using the last function, the user will have to enter the password each time the PC starts up. The program also provides an opportunity to "hide" the encrypted volume from strangers' eyes.

VeraCrypt uses the following encryption algorithms: Twofish, Serpent and AES. All of the above algorithms are supported in combination: Serpent-AES, AES-Twofish-Serpent, AES-Twofish, Twofish-Serpent and Serpent-Twofish-AES. The list of cryptographic hash functions used includes: SHA-256, SHA-512, RIPEMD-160 and Whirlpool. In fact, VeraCrypt is a slightly improved version of TrueCrypt encryptor. It fixes the vulnerability of the bootloader for Windows and also uses much more iterations when generating the key.

All you need to know for a user who doesn't know much about cryptography is that VeraCrypt reliably protects private data. It is equipped with a volume creation wizard, which allows you to set up encryption in a few steps. VeraCrypt also supports the ability to assign hotkeys to various operations, such as automatic mounting of all devices, closing token sessions, cleaning the cache and so on. They will help you in situations where you urgently need to hide the encrypted volume and clear the data about working with it.

- allows you to create new encrypted data volumes and encrypt entire hard drive partitions;

- allows you to hide the encrypted volumes;

- uses strong encryption algorithms: Twofish, Serpent and AES;

- includes a step-by-step master of tomatoes;

- is completely free and has open source code.

dirLock logo
Free program that allows you to password protect folders and hide them if you choose
Advanced Office Password Recovery logo
Recover, remove or circumvent passwords protecting documents created with a variety of office suites
CyberGhost VPN logo
Highest encryption with no logs policy
TrueCrypt logo
An application for on-the-fly encryption in a file, partition, or the entire storage device
Advanced RAR Password Recovery logo
Recover passwords protecting encrypted ZIP and RAR archives