Operation Manual

122
Frequently Asked Questions
Note: The latest version of the VeraCrypt FAQ is available at
https://veracrypt.codeplex.com/wikipage?title=FAQ.
Can TrueCrypt and VeraCrypt be running on the same machine?
Yes. There are no conflicts between TrueCrypt and VeraCrypt, thus they can be installed and used
on the same machine.
Can I use my TrueCrypt volumes in VeraCrypt?
Yes. Starting from version 1.0f, VeraCrypt supports mounting TrueCrypt volumes.
Can I convert my TrueCrypt volumes to VeraCrypt format?
Yes. Starting from version 1.0f, VeraCrypt offers the possibility to convert TrueCrypt containers and
non-system partitions to VeraCrypt format. This can achieved using the "Change Volume
Password" or "Set Header Key Derivation Algorithm" actions. Just check the "TrueCrypt Mode",
enter you TrueCrypt password and perform the operation. After that, you volume will have the
VeraCrypt format.
Before doing the conversion, it is advised to backup the volume header using TrueCrypt. You can
delete this backup safely once the conversion is done and after checking that the converted volume
is mounted properly by VeraCrypt.
What's the difference between TrueCrypt and VeraCrypt?
VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption
making it immune to new developments in brute-force attacks.
It also solves many vulnerabilities and security issues found in TrueCrypt. The following post
describes parts of the major enhancements and corrections done in version 1.0e:
https://veracrypt.codeplex.com/discussions/569777#PostContent_1313325
As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with
1000 iterations whereas in VeraCrypt we use 327661. And for standard containers and other
partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses 655331 for RIPEMD160 and
500000 iterations for SHA-2 and Whirlpool.
This enhanced security adds some delay only to the opening of encrypted partitions without any
performance impact to the application use phase. This is acceptable to the legitimate owner but it
makes it much harder for an attacker to gain access to the encrypted data.
I forgot my password is there any way (‘backdoor’) to recover the files from my VeraCrypt
volume?
We have not implemented any 'backdoor' in VeraCrypt (and will never implement any even if asked
to do so by a government agency), because it would defeat the purpose of the software. VeraCrypt
does not allow decryption of data without knowing the correct password or key. We cannot recover
your data because we do not know and cannot determine the password you chose or the key you
generated using VeraCrypt. The only way to recover your files is to try to "crack" the password or
the key, but it could take thousands or millions of years (depending on the length and quality of the
password or keyfiles, on the software/hardware performance, algorithms, and other factors). Back
in 2010, there was news about the FBI failing to decrypt a TrueCrypt volume after a year of trying.
While we can't verify if this is true or just a "psy-op" stunt, in VeraCrypt we have increased the
security of the key derivation to a level where any brute-force of the password is virtually
impossible, provided that all security requirements are respected.