Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Introduction to whole disk encryption using VeraCrypt

2025-04-07 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

In order to strengthen the control of daily work documents, it is necessary to encrypt the files on the personal PC to prevent the loss of computer, hard disk, U disk and other storage media, resulting in data leakage.

Most of the tools and software based on folder encryption in the market are encrypted and stored by hiding or isolating files, but they can be copied directly by skipping password verification through partition tools such as DiskGenius.

Drive-based encryption tools include Windows BitLocker, VeraCrypt/CnCrypt, and so on. This article focuses on the encryption and use of the entire drive letter by VeraVrypt. The use of CnCrypt is more or less the same as that of VeraCrypt.

First, introduction 1, about TrueCryptTrueCrypt is a free and open source encryption software, while supporting Windows Vista,7/XP, Mac OS X, Linux and other operating systems. TrueCrypt does not need to generate any files to establish a virtual disk on the hard disk. Users can access it according to the drive letter. All the files on the virtual disk are automatically encrypted and need to be accessed by password. TrueCrypt provides a variety of encryption algorithms, including: AES-256, Blowfish (448-bit key), CAST5, Serpent, Triple DES, and Twofish. Other features include support for FAT32 and NTFS partitions, hidden volume labels, hotkey startup, and so on. On May 28th, TrueCrypt transferred its website back to SourceForge and warned on its page that the software might contain unfixed security issues, and the development of TrueCrypt ended after Microsoft terminated Windows XP support in May 2014. The site also provides a new version of TrueCrypt (7.2) download, which only has decryption function.

2, about VeraCryptVeraCrypt, is a free open source cross-platform real-time disk file encryption tool, it is based on the well-known open source encryption tool TrueCrypt project derived. Since TrueCrypt has previously announced on its website that it is insecure and has stopped development, VeraCrypt, which is now more active and also open source and cross-platform, has naturally become one of the new choices of the best file encryption tools. Official website address: https://www.veracrypt.f/, the latest version is VeraCrypt 1.23.

3. About CnCryptCnCrypt is a tool made by Peter Pan, a famous software developer in China, based on the continuous upgrade, improvement and enhancement of the original version of TrueCrypt v7.1a, which can create a variety of encrypted disks inside a file and configure it as a disk encrypted volume creation tool that can access the virtual disk through a drive letter. Any file stored in the virtual disk, the encrypted volume, can be automatically encrypted in real time, but access can only be performed with the correct password or key configuration. CnCrypt adds domestic algorithm SM4 on the basis of TrueCrypt. Official website address: http://cncrypt.com/, the latest version is CnCrypt 1.27.

2. Full disk encryption 1, VeraCrypt download and installation (1) VeraCrypt download address: https://www.veracrypt.fr/en/Downloads.html, download the appropriate version of your operating system, the version downloaded in this article is: VeraCrypt Setup 1.23-Hotfix-2.exe

(2) VeraCrypt installation: install according to the navigation.

2. Double-click to create an encrypted volume

The icon opens VeraCrypt, as shown below:

Create encrypted volume: click "create encrypted volume"

Select encrypt non-system Partition / device

Select VeraCrypt encrypted Volume

Click "Select device"

Select the partition to encrypt

Select create encrypted Volume and format

Choose an encryption algorithm (CnCrypt can choose domestic cryptographic SM4 algorithm here. SM4 is a domestic encryption algorithm, which is similar to international encryption algorithm DES, but has better performance than DES/3DES)

Select the size of the encrypted volume, which is encrypted for the whole disk and cannot be selected.

Set encrypted volume password

Password length requires more than 20 digits, a variety of character combinations, if the password is less than 20 characters, the password will be prompted to be short.

Choose whether to store large files. It is recommended that you choose Yes.

The encrypted volume is formatted. The previous step is large file storage. NTFS is recommended in this step. Shake the mouse in the interface to increase the randomness of encryption, and then click format

You can see the progress of formatting, which takes a long time and has something to do with the reading and writing speed of the storage media.

Formatting complete.

Encrypted volume created

If you do not continue to create encrypted volumes, click "exit"

3. Use the encryption drive letter 1 to load the encryption volume and double-click the icon to open VeraCrypt

Select encrypted device: click "Select device"-> Select encrypted partition (the test environment for this article is "\ Device\ Harddisk3\ Partition1")

Load encrypted partition: click "load"-> enter the password to load the partition, which takes a little longer, which has something to do with the algorithm selected for encryption, partition size and media read and write speed.

4. After loading, you can see that the encrypted and accessible drive letter is: l

2. Unmount the encryption volume. Select the encryption letter to uninstall, and then click "Uninstall" to complete the uninstall.

Other 1. Unloaded decryption drive letter: double-click the drive letter to display "format disk"

2. After decrypting the encrypted volume, double-click to display "Please insert."

3. Store data. Use DiskGenius to recover data without decryption, and the recovered data is garbled.

The recovered data is garbled.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report