Windows.  Viruses.  Notebooks.  Internet.  office.  Utilities.  Drivers

  • Continue to use TrueCrypt, because even despite a serious analysis, it did not reveal any security problems. This a good option actions, because TrueCrypt has established itself as an excellent and reliable program in every sense. Plus, it's free. Possibly when changing operating systems to more recent ones, there may be compatibility issues with TrueCrypt in the future.
  • Use one of the TrueCrypt forks. It is also good as the first option, while there is hope for updating the program and adding new functions and algorithms. The main advantage is that they retain all the functionality of TrueCrypt.
  • Select a third party product. There are many such products, we will consider some of them.
Programs instead of TrueCrypt

Hidden from guests

VeraCrypt is a free encryption program from IDRIX (

Hidden from guests

), this program is based on TrueCrypt.

It increases the security of the algorithms used to encrypt the system and partitions, making them immune to new developments in brute-force attacks. For example, when encrypted system partition, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations, while VeraCrypt uses 327661! And for standard containers and other partitions, TrueCrypt uses no more than 2000 iterations, while VeraCrypt uses 655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.

These security enhancements only add some latency to opening partitions, with no loss of performance during the use phase. This is acceptable to the true owners, but it makes it very difficult for attackers to gain access to encrypted data.

Hidden from guests

This program can encrypt system partition and non-system partitions, supports all latest versions Windows OS, third-party bootloaders and much more. DiskCryptor supports multiple encryption algorithms and their combinations, AES hardware acceleration if supported by the system, and full support for external drives. In terms of functionality, this program is closest to TrueCrypt.

Hidden from guests

(a commercial)

Allows you to create encrypted containers. This program officially declares that it does not contain backdoors, bookmarks, because it is located in a country whose legislation cannot force it to do so. Of the interesting features - file manager(Disk Firewall) which protects data from illegal copying, viruses. It allows only authorized programs to make changes to the data on the encrypted drive.

Hidden from guests

This program cannot encrypt sections, only individual files. Although not a complete alternative to TrueCrypt, it can be used to encrypt important files on the system. The program uses the AES 128-bit encryption algorithm and also supports key files.

Hidden from guests

Available for Windows, Mac, Linux and mobile operating systems. It only supports file encryption, it only means that you can click right click by file and encrypt or decrypt it.

Hidden from guests

Bitlocker is part of Windows only in the Enterprise and Ultimate and Pro editions on Windows 8. Claims that Bitlocker has a built-in backdoor for law enforcement and other services has never been proven, but it does have key recovery functionality that can be used to decrypt disks protected by this program, which may be located on Microsoft servers, and not locally.

Hidden from guests

(as well as Boxcryptor, CryptSync and Viivo from PKWare)

Specially designed to protect the data you sync with cloud services, such as Google Drive, OneDrive or Dropbox. It uses 256bit and will detect supported providers automatically upon installation. Not available for Linux.

The service has stopped working (Sophie Hunt- thanks for the info). The website has the following inscription:

The Cloudfogger project has been stopped, Cloudfogger is not available anymore.
Current Cloudfogger users should re-encrypt their files with a new solution as we will also turn off our keyservers in the following weeks.
Looking for an alternative? How about

Hidden from guests

Might be worth taking a look at

Hidden from guests

As an alternative to Cloudfogger.

Hidden from guests

Can be used to synchronize encrypted copies of files on a cloud service.

Hidden from guests

Another program if you want to encrypt on the cloud.

Hidden from guests

(free for personal use)

This program can be used to encrypt individual files, directories or drives on Windows. The project website lacks information about the ciphers and encryption algorithms used.

Hidden from guests

Available for Linux only. Supports TrueCrypt drives and others. Source code is available.

Programs for data encryption

Of course, it will not be possible to cover all programs in one note. But if you want to continue research in this direction, then here is another list of data protection programs for you. Try it, post your results in the comments.

  • Encrypt4all
  • Exlade Cryptic Disk
  • Folder Encryption Dog
  • GiliSoft Private Disk
  • G-Soft Easy Crypter
  • HiTek Software AutoCrypt
  • idoo Full Disk Encryption
  • Jetico BCArchive
  • Jetico BestCrypt
  • KakaSoft KaKa Private Disk
  • Kruptos 2
  • NCH ​​MEO Encryption Software
  • Odin HDD Encryption
  • Odin U Disk Encrypt Creator
  • PC-Safety Advanced File Vault
  • Rohos Disk Encryption
  • SafeEnterprise Protect Drive
  • SafeHouse Professional
  • SecurStar DriveCrypt
  • Steganos Safe Professional
  • Symantec Encryption Desktop Professional
  • Utimaco SafeGuard Easy
  • Utimaco Safeware AG PrivateDisk
  • ZardsSoftware SafeKeeping
  • AbelsSoft CryptBox Pro
  • Comodo Disk Encryption
And now you: are there other alternatives not mentioned here? Share them with everyone in the comments. Tell us which program do you prefer and why?


This is the first of five articles in our blog dedicated to VeraCrypt, it discusses the differences between VeraCrypt and its ancestor TrueCrypt, where to download VeraCrypt, portable installation and Russification.

If you are looking for encryption instructions, read:

Since the closure of the TrueCrypt project in 2014, VeraCrypt has remained its most popular fork, which not only repeats the capabilities of the original, but also fixes a number of TrueCrypt vulnerabilities, and also brings additional functionality that was missing before.

Features of VeraCrypt and differences from TrueCrypt

  1. TrueCrypt produced an insufficient number of iterations for PBKDF2 (password-based encryption key generation standard), in VeraCrypt the number of iterations for the system partition was increased from 1000 to 327661, and for other partitions and file containers from 2000 to 655331, which significantly increases the cryptographic strength of the received keys .
  2. VeraCrypt fixes bugs and optimizes the bootloader code, which made it possible to use the SHA-256 algorithm as a hash function when encrypting the system partition hard drive, while TrueCrypt used the less secure RIPEMD-160 algorithm.
  3. VeraCrypt drivers signed digital signature Microsoft, which is necessary for correct installation in Windows 10.
  4. Versions 1.18 and older allow you to encrypt Windows computers with EFI instead of BIOS, they also fixed a vulnerability that allowed hidden partitions to be detected.
  5. Starting with version 1.0f, VeraCrypt supports loading partitions and containers encrypted with TrueCrypt, and the ability to convert TrueCrypt encrypted containers and non-system hard disk partitions to VeraCrypt format has also been added.
  6. Fixed many software bugs: memory leaks, buffer overflows and dll loading vulnerabilities.
  7. A complete analysis and refactoring of the code was carried out
  8. Versions available for MACOS and Linux
VeraCrypt is evolving, new versions, fixes and improvements are coming out. Three years after TrueCrypt was shut down, the time has finally come to abandon it and start using a more modern and secure tool.

Where to download VeraCrypt

Official download page on the VeraCrypt website, versions available for Windows, Linux, MacOSX, as well as PGP signed installer and user manual in English.

VeraCrypt Portable (portable) version or traditional installation

If you are going to encrypt the system partition of a disk with Windows, then you need to install VeraCrypt, to do this, select Install during the installation process, for all other cases, a simple extraction of the program files to the specified folder is suitable - Extract(this is the portable version).

Russifier VeraCrypt

The Russian language, among others, is available in the main menu of the program. Select Settings -> Languages, in the window that opens, find Russian and click OK. All instructions and recommendations in the following articles will be provided for the English and Russian versions of the interface.

P.S

We hope our article turned out to be useful, and you encrypted your data securely, but do not forget to take care of communication security - try our

  • Continue to use TrueCrypt, because even despite a serious analysis, it did not reveal any security problems. This is a good course of action, because TrueCrypt has proven itself to be an excellent and reliable program in every sense. Plus, it's free. Perhaps, when changing operating systems to more recent ones, there may be compatibility issues with TrueCrypt in the future.
  • Use one of the TrueCrypt forks. It is also good as the first option, while there is hope for updating the program and adding new functions and algorithms. The main advantage is that they retain all the functionality of TrueCrypt.
  • Select a third party product. There are many such products, we will consider some of them.
Programs instead of TrueCrypt

Hidden from guests

VeraCrypt is a free encryption program from IDRIX (

Hidden from guests

), this program is based on TrueCrypt.

It increases the security of the algorithms used to encrypt the system and partitions, making them immune to new developments in brute-force attacks. For example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations, while VeraCrypt uses 327661! And for standard containers and other partitions, TrueCrypt uses no more than 2000 iterations, while VeraCrypt uses 655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.

These security enhancements only add some latency to opening partitions, with no loss of performance during the use phase. This is acceptable to the true owners, but it makes it very difficult for attackers to gain access to encrypted data.

Hidden from guests

This program can encrypt the system partition and non-system partitions, supports all the latest versions of Windows OS, third-party bootloaders and much more. DiskCryptor supports multiple encryption algorithms and their combinations, AES hardware acceleration if supported by the system, and full support for external drives. In terms of functionality, this program is closest to TrueCrypt.

Hidden from guests

(a commercial)

Allows you to create encrypted containers. This program officially declares that it does not contain backdoors, bookmarks, because it is located in a country whose legislation cannot force it to do so. Of the interesting features - a file manager (Disk Firewall) that protects data from illegal copying, viruses. It allows only authorized programs to make changes to the data on the encrypted drive.

Hidden from guests

This program cannot encrypt sections, only individual files. Although not a complete alternative to TrueCrypt, it can be used to encrypt important files on the system. The program uses the AES 128-bit encryption algorithm and also supports key files.

Hidden from guests

Available for Windows, Mac, Linux and mobile operating systems. It only supports file encryption, it only means that you can right-click on a file and encrypt or decrypt it.

Hidden from guests

Bitlocker is part of Windows only in the Enterprise and Ultimate and Pro editions on Windows 8. Claims that Bitlocker has a built-in backdoor for law enforcement and other services has never been proven, but it does have key recovery functionality that can be used to decrypt disks protected by this program, which may be located on Microsoft servers, and not locally.

Hidden from guests

(as well as Boxcryptor, CryptSync and Viivo from PKWare)

Specifically designed to protect the data you sync with cloud services such as Google Drive, OneDrive or Dropbox. It uses 256bit and will detect supported providers automatically upon installation. Not available for Linux.

The service has stopped working (Sophie Hunt- thanks for the info). The website has the following inscription:

The Cloudfogger project has been stopped, Cloudfogger is not available anymore.
Current Cloudfogger users should re-encrypt their files with a new solution as we will also turn off our keyservers in the following weeks.
Looking for an alternative? How about

Hidden from guests

Might be worth taking a look at

Hidden from guests

As an alternative to Cloudfogger.

Hidden from guests

Can be used to synchronize encrypted copies of files on a cloud service.

Hidden from guests

Another program if you want to encrypt on the cloud.

Hidden from guests

(free for personal use)

This program can be used to encrypt individual files, directories or drives on Windows. The project website lacks information about the ciphers and encryption algorithms used.

Hidden from guests

Available for Linux only. Supports TrueCrypt drives and others. Source code is available.

Programs for data encryption

Of course, it will not be possible to cover all programs in one note. But if you want to continue research in this direction, then here is another list of data protection programs for you. Try it, post your results in the comments.

  • Encrypt4all
  • Exlade Cryptic Disk
  • Folder Encryption Dog
  • GiliSoft Private Disk
  • G-Soft Easy Crypter
  • HiTek Software AutoCrypt
  • idoo Full Disk Encryption
  • Jetico BCArchive
  • Jetico BestCrypt
  • KakaSoft KaKa Private Disk
  • Kruptos 2
  • NCH ​​MEO Encryption Software
  • Odin HDD Encryption
  • Odin U Disk Encrypt Creator
  • PC-Safety Advanced File Vault
  • Rohos Disk Encryption
  • SafeEnterprise Protect Drive
  • SafeHouse Professional
  • SecurStar DriveCrypt
  • Steganos Safe Professional
  • Symantec Encryption Desktop Professional
  • Utimaco SafeGuard Easy
  • Utimaco Safeware AG PrivateDisk
  • ZardsSoftware SafeKeeping
  • AbelsSoft CryptBox Pro
  • Comodo Disk Encryption
And now you: are there other alternatives not mentioned here? Share them with everyone in the comments. Tell us which program do you prefer and why?

The idea for this article was born when EFSOL specialists were tasked with analyzing information security risks in the restaurant business and developing measures to counter them. One of the significant risks was the possibility of seizing management information, and one of the countermeasures was the encryption of accounting databases.

I will immediately make a reservation that consideration of all possible crypto products or solutions based on specific accounting systems is not within the scope of this article. We are only interested comparative analysis personal encryption tools, for which we have chosen the most popular free and open source solution and a couple of the most promoted commercial analogues. Let inexperienced users not be afraid of the phrase "open source"- it only means that a group of enthusiasts is engaged in the development, who are ready to accept anyone who wants to help them.

So why did we take this approach? The motivation is extremely simple.

  1. Different companies use their own accounting system, so we choose encryption tools that are not tied to a specific platform - universal.
  2. It is more reasonable to use personal cryptoprotection in small enterprises where 1-5 users work with the accounting program. For big companies the withdrawal of management information will entail larger financial losses- therefore, protection solutions will cost much more.
  3. Analysis of many commercial information encryption products makes no sense: it is enough to evaluate a few of them to form an understanding of price and functionality for yourself.

Let's move on to comparing products, which is convenient to do on the basis of a pivot table. I have deliberately left out a lot of technical details (such as support for hardware acceleration or multithreading, multiple logical or physical processors) that give the average user a headache. Let us dwell only on the functionality from which we can really highlight the benefits.

pivot table

TrueCrypt Secret Disc Zecurion Zdisk
Latest version at the time of review 7.1a 4 No data
Price For free From 4 240 rub. for 1 computer From 5250 rub. for 1 computer
operating system Windows 7, Windows Vista, Windows XP, Windows Server 2003, Windows Server 2008: (32-bit and 64-bit versions);
Windows Server 2008 R2;
Windows 2000 SP4;

Mac OS X 10.7 Lion (32-bit and 64-bit);
Mac OS X 10.6 Snow Leopard; Mac OS X 10.5 Leopard;
Mac OS X 10.4 Tiger;

Linux (32-bit and 64-bit, kernel 2.6 or compatible)

Windows 7, Windows Vista, Windows XP: (32-bit and 64-bit) Windows 98;
Windows Me;
Windows NT Workstation;
Windows 2000 Professional;
Windows XP;
Windows Vista
Built-in encryption algorithms AES
Serpent
Twofish
No No
Using Cryptographic Providers (CSPs) No Microsoft Enhanced CSP: Triple DES and RC2
Secret Disk NG Crypto Pack: AES and Twofish;
CryptoPro CSP, Signal-COM CSP or Vipnet CSP: GOST 28147-89
rc5,
AES,
KRYPTON CSP: GOST 28147-89
XTS encryption mode Yes No No
Cascading Encryption AES-Twofish-Serpent;
Serpent-AES;
Serpent-Twofish-AES;
Twofish Serpent
No No
Transparent Encryption Yes Yes Yes
System partition encryption Yes Yes No
Authentication before OS boot Password Pin + token No
Disk partition encryption Yes Yes No
Creating container files Yes Yes Yes
Creating hidden partitions Yes No No
Creating a hidden OS Yes No No
Portable Drive Encryption Yes Yes Yes
Working with portable drives Yes No No
Networking Yes No Yes
Multiplayer mode By means of NTFS Yes Yes
Password-only authentication Yes No No
Authentication by key file Yes No No
Support for tokens and smart cards Supporting PKCS #11 2.0 protocol or higher eToken PRO/32K USB key (64K);
eToken PRO/72K USB dongle (Java);
Smart card eToken PRO/32K (64K);
Smart card eToken PRO/72K (Java);
Combination key eToken NG-FLASH
eToken NG-OTP Combined Key
eToken PRO Anywhere
Rainbow iKey 10xx/20xx/30xx;
ruToken;
eToken R2/Pro
Emergency Disable Encrypted Drives Hotkeys Hotkeys Hotkeys
Duress password protection No Yes Yes
Ability to use "Plausible Deniability" Yes No No
Contents of delivery No boxed version - the distribution is downloaded from the developer's site eToken PRO Anywhere USB key with a license to use the product;
Quick Guide in printed form;
CD-ROM (distribution kit, detailed documentation, MBR boot part;
Packing DVD box
License;
USB key and USB extension cable;
Distribution disk; Documentation in printed form;
ACS-30S Smart Card Reader/Writer

Following the laws of the genre, it remains only to comment on individual points and highlight the advantages of a particular solution. Everything is clear with product prices, as well as with supported operating systems. I will only note the fact that versions of TrueCrypt for MacOS and Linux have their own nuances of use, and installing it on server platforms from Microsoft, although it gives certain advantages, it is completely unable to replace the huge functionality of commercial data protection systems in corporate network. Let me remind you that we are still considering personal cryptoprotection.

Built-in algorithms, crypto providers, XTS and cascading encryption

Crypto providers, unlike built-in encryption algorithms, are separately plug-in modules that determine the encoding (decoding) method used by the program. Why do commercial solutions use packages of crypto providers? The answers are simple, but financially justified.

  1. There is no need to make changes to the program to add certain algorithms (to pay for the work of programmers) - just create a new module or connect third-party solutions.
  2. All over the world, international standards are being developed, tested and implemented, but for Russian government agencies it is necessary to comply with the requirements of the FSTEC and the FSB. These requirements imply licensing the creation and distribution of information security tools.
  3. Crypto providers are the means of data encryption, and the programs themselves do not require development and distribution certification.

Cascading encryption is the ability to encode information with one algorithm when it has already been encoded with another. This approach, although it slows down the work, allows you to increase the resistance of protected data against hacking - the more the “opponent” knows about encryption methods (for example, the algorithm used or the key character set), the easier it is for him to disclose information.

XTS encryption technology (XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS)) is a logical development of the previous XEX and LRW block encryption methods, in which vulnerabilities were discovered. Since read/write operations on storage media are performed sector-by-sector in blocks, the use of streaming encoding methods is unacceptable. Thus, on December 19, 2007, the XTS-AES encryption method for the AES algorithm was described and recommended by the international standard for protecting stored information IEEE P1619.

This mode uses two keys, the first of which is used to generate the initialization vector, and the second is to encrypt the data. The method works according to the following algorithm:

  1. generates a vector by encrypting the sector number with the first key;
  2. adds the vector with the original information;
  3. encrypts the addition result with the second key;
  4. adds a vector with the encryption result;
  5. multiplies the vector by the generating polynomial of the finite field.

The National Institute of Standards and Technology recommends using XTS to encrypt device data with a block internal structure because it:

  • described by international standard;
  • has high performance due to the performance of preliminary calculations and parallelization;
  • allows processing an arbitrary sector block by computing an initialization vector.

I also note that IEEE P1619 recommends using the XTS method with the AES encryption algorithm, however, the mode architecture allows it to be used in conjunction with any other block cipher. Thus, if it is necessary to certify a device that implements transparent encryption in accordance with the requirements of Russian legislation, it is possible sharing XTS and GOST 28147-89.

Emergency shutdown of drives, password entry "under duress", denial of involvement

Emergency disabling of encrypted disks is an undeniably necessary feature in situations that require an instant response to protect information. But what happens next? The "opponent" sees a system on which crypto protection is installed and unreadable system means disk. The conclusion about the concealment of information is obvious.

There comes a stage of "coercion". "Opponent" will use physical or legal measures to force the owner to disclose information. The domestic well-established solution “entering a password under duress” from the category of “I will die, but I will not betray” becomes irrelevant. It is impossible to delete information that the "opponent" previously copied, and he will do it - do not hesitate. Removing the encryption key only confirms that the information is really important, and the spare key is necessarily hidden somewhere. And even without a key, information is still available for cryptanalysis and hacking. I will not expand on how these actions bring the information owner closer to a legal fiasco, but I will talk about logical method plausible deniability.

The use of hidden partitions and a hidden OS will not allow the "opponent" to prove the existence of information that is protected. In this light, disclosure requirements become absurd. TrueCrypt developers recommend to further obscure the traces: in addition to hidden partitions or operating systems, create encrypted visible ones that contain deceptive (fictitious) data. The “opponent”, having discovered visible encrypted sections, will insist on disclosing them. By disclosing such information under duress, the owner does not risk anything and relieves himself of suspicion, because real secrets will remain invisible on hidden encrypted sections.

Summarizing

There are a great many nuances in protecting information, but the lighted ones should be enough to sum up the intermediate results - everyone will make the final decision for himself. To the benefits free program TrueCrypt should be attributed to its functionality; the opportunity for everyone to participate in testing and improvement; an excessive amount of open information on the application. This solution was created by people who know a lot about the secure storage of information and are constantly improving their product, for people who need a really high level of reliability. The disadvantages include the lack of support, high complexity for the average user, the lack of two-level authentication before starting the OS, the inability to connect modules from third-party crypto providers.

Commercial products are full of user care: technical support, excellent equipment, low cost, availability of certified versions, the ability to use the GOST 28147-89 algorithm, multi-user mode with delimited two-level authentication. Only limited functionality and naivety in maintaining the secrecy of storing encrypted data upsets.

Updated: June 2015.

Although TrueCrypt 7.1a was released on February 7, 2011, it remains the last fully functional version of the product.

The mysterious story with the termination of development of TrueCrypt is curious. On May 28, 2014, all previous versions product and released version 7.2. This version can only decrypt previously encrypted disks and containers - the encryption option has been removed. From that moment on, the site and the program are calling for the use of BitLocker, and the use of TrueCrypt is called insecure.

This caused a wave of gossip on the Internet: the authors of the program were suspected of setting a “bookmark” in the code. Fueled by information from former NSA employee Snowden that intelligence agencies are deliberately weakening cryptographic tools, users began raising funds to audit the TrueCrypt code. Over $60,000 was raised to test the program.

The audit was fully completed by April 2015. Code analysis did not reveal any bookmarks, critical architecture flaws or vulnerabilities. TrueCrypt has been proven to be a well-designed cryptographic tool, although not perfect.

Now the developers' advice to switch to Bitlocker is seen by many as "evidence of a canary". TrueCrypt authors have always ridiculed Bitlocker and its security in particular. Using Bitlocker is also unreasonable due to the closed nature of the program code and its inaccessibility in the "younger" editions of Windows. Because of all of the above, the Internet community tends to believe that developers are being influenced by intelligence agencies, and they are hinting at something important by their silence, insincerely recommending Bitlocker.

Let's recap

TrueCrypt continues to be the most powerful, reliable and functional cryptography tool. Both the audit and the pressure of the special services only confirm this.

Zdisk and Secret Disk have versions FSTEC certified. Therefore, it makes sense to use these products to comply with the requirements of the legislation of the Russian Federation in the field of information protection, for example, the protection of personal data, as required by Federal Law 152-FZ and its subordinate regulations.



For those who are seriously concerned about the security of information, there is a comprehensive solution "Server in Israel", in which comprehensive approach to data protection enterprises.

System integration. Consulting

There are many reasons to encrypt the data on your hard drive, but the cost of data security is slower system performance. The purpose of this article is to compare performance when working with a disk encrypted by different means.

To make the difference more dramatic, we chose not an ultra-modern, but an average car. The usual 500 GB mechanical hard drive, dual-core AMD at 2.2 GHz, 4 gigabytes of RAM, 64-bit Windows 7 SP 1. No antiviruses or other programs will be launched during the test so that nothing could affect the results.

To evaluate performance, I chose CrystalDiskMark. As for the tested encryption tools, I settled on the following list: BitLocker, TrueCrypt, VeraCrypt, CipherShed, Symantec Endpoint Encryption and CyberSafe Top Secret.

bitlocker

This standard remedy disk encryption built into Microsoft Windows. Many just use it without installing third party programs. Indeed, why, if everything is already in the system? On the one hand, right. On the other hand, the code is closed, and there is no certainty that no backdoors were left in it for the FBI and other interested people.

The disk is encrypted using the AES algorithm with a key length of 128 or 256 bits. The key can be stored in the Trusted Platform Module, on the computer itself or on a flash drive.

If TPM is used, then when the computer boots up, the key can be obtained immediately from it or after authentication. You can log in using a key on a USB flash drive or by entering a PIN code from the keyboard. Combinations of these methods give many options for restricting access: just TPM, TPM and USB, TPM and PIN, or all three at once.

BitLocker has two undeniable advantages: firstly, it can be controlled through group policies; second, it encrypts volumes, not physical drives. This allows you to encrypt an array of multiple drives, which some other encryption tools cannot do. BitLocker also supports the GUID Partition Table (GPT), which even the most advanced TruCrypt fork VeraCrypt cannot boast of. To encrypt a system GPT disk with it, you will first have to convert it to MBR format. In the case of BitLocker, this is not required.

In general, there is only one drawback - closed source. If you're keeping secrets from the household, BitLocker is great. If your disk is full of documents of national importance, it is better to find something else.

Is it possible to decrypt BitLocker and TrueCrypt

If you ask Google, it will find interesting program Elcomsoft Forensic Disk Decryptor, suitable for decrypting BitLocker, TrueCrypt and PGP drives. In the framework of this article, I will not test it, but I will share my impressions of another utility from Elcomsoft, namely Advanced EFS Data Recovery. It was excellent at decrypting EFS folders, but on the condition that no user password was set. If you set a password of at least 1234, the program turned out to be powerless. In any case, I failed to decrypt the encrypted EFS folder belonging to the user with the password 111. I think the situation will be the same with the Forensic Disk Decryptor product.

TrueCrypt

This is a legendary disk encryption program that was discontinued in 2012. The story that happened to TrueCrypt is still shrouded in darkness, and no one really knows why the developer decided to stop supporting his brainchild.

There are only bits of information that do not allow you to put the puzzle together. So, in 2013, fundraising began for an independent audit of TrueCrypt. The reason was information received from Edward Snowden about the intentional weakening of TrueCrypt encryption tools. More than 60 thousand dollars were collected for the audit. At the beginning of April 2015, the work was completed, but no serious errors, vulnerabilities or other significant flaws in the application architecture were identified.

As soon as the audit ended, TrueCrypt was again at the center of the scandal. ESET specialists published a report that the Russian-language version of TrueCrypt 7.1a, downloaded from truecrypt.ru, contained malware. Moreover, the truecrypt.ru site itself was used as a command center - commands were sent from it to infected computers. In general, be vigilant and do not download programs from anywhere.

The advantages of TrueCrypt include open source, the reliability of which is now backed up by independent audits, and support for Windows dynamic volumes. Disadvantages: the program is no longer developed, and the developers did not have time to implement UEFI / GPT support. But if the goal is to encrypt one non-system drive, then it doesn't matter.

Unlike BitLocker, where only AES is supported, TrueCrypt also has Serpent and Twofish. To generate encryption keys, salt and header key, the program allows you to select one of three hash functions: HMAC-RIPEMD-160, HMAC-Whirlpool, HMAC-SHA-512. However, a lot has already been written about TrueCrypt, so we will not repeat ourselves.

VeraCrypt

The most advanced TrueCrypt clone. It has its own format, although it is possible to work in TrueCrypt mode, which supports encrypted and virtual disks in TrueCrypto format. Unlike CipherShed, VeraCrypt can be installed on the same computer at the same time as TrueCrypt.

INFO

Having retired, TrueCrypt left a rich legacy: it has many forks, starting with VeraCrypt, CipherShed and DiskCryptor.

TrueCrypt uses 1000 iterations to generate the key that will encrypt the system partition, while VeraCrypt uses 327,661 iterations. For standard (non-system) partitions, VeraCrypt uses 655,331 iterations for the RIPEMD-160 hash function and 500,000 iterations for SHA-2 and Whirlpool. This makes encrypted partitions much more resistant to brute-force attacks, but also significantly reduces the performance of working with such a partition. How much, we will soon find out.

Among the advantages of VeraCrypt are open source code, as well as a proprietary and more secure virtual and encrypted disk format compared to TrueCrypt. The disadvantages are the same as in the case of the progenitor - the lack of support for UEFI / GPT. It is still impossible to encrypt the system GPT disk, but the developers claim that they are working on this problem and soon such encryption will be available. But they have been working on this for two years now (since 2014), and when there will be a release with GPT support and whether it will be at all, it is not yet known.

CipherShed

Another clone of TrueCrypt. Unlike VeraCrypt, it uses the original TrueCrypt format, so you can expect its performance to be close to that of TrueCrypt.

The advantages and disadvantages are the same, although the inability to install TrueCrypt and CipherShed on the same computer can be added to the disadvantages. Moreover, if you try to install CipherShed on a machine with TrueCrypt already installed, the installer offers to remove the previous program, but fails to do the job.

Symantec Endpoint Encryption

In 2010, Symantec bought the rights to the PGPdisk program. The result was products such as PGP Desktop and, subsequently, Endpoint Encryption. That is what we will consider. The program is, of course, proprietary, the source code is closed, and one license costs 64 euros. But there is support for GPT, but only starting with Windows 8.

In other words, if GPT support is needed and there is a desire to encrypt the system partition, then you will have to choose between two proprietary solutions: BitLocker and Endpoint Encryption. It is unlikely, of course, that a home user will install Endpoint Encryption. The problem is that this requires Symantec Drive Encryption, which requires an agent and a Symantec Endpoint Encryption (SEE) management server to install, and the server wants to install IIS 6.0 as well. Isn't it too much goodness for one disk encryption program? We went through all this just to measure performance.

moment of truth

So, we proceed to the most interesting, namely testing. The first step is to check the performance of the disk without encryption. Our “victim” will be a 28 GB hard disk partition (regular, not SSD), formatted as NTFS.

Open CrystalDiskMark, select the number of passes, the size of the temporary file (in all tests we will use 1 Gbps) and the disk itself. It is worth noting that the number of passes practically does not affect the results. The first screenshot shows the results of measuring the performance of a disk without encryption with a number of passes of 5, the second - with a number of passes of 3. As you can see, the results are almost identical, so we will focus on three passes.



CrystalDiskMark results should be interpreted as follows:

  • Seq Q32T1 - sequential write / sequential read test, number of queues - 32, threads - 1;
  • 4K Q32T1 - random write / random read test (block size 4 KB, number of queues - 32, threads - 1);
  • Seq - sequential write / sequential read test;
  • 4K - random write / random read test (block size 4 KB);

Let's start with BitLocker. It took 19 minutes to encrypt a 28 GB partition.

Continued available to members only

Option 1. Join the "site" community to read all the materials on the site

Membership in the community during the specified period will give you access to ALL Hacker materials, increase your personal cumulative discount and allow you to accumulate a professional Xakep Score rating!

If you notice an error, select a piece of text and press Ctrl + Enter
SHARE: