Breaking VeraCrypt: Obtaining and Extracting On-The-Fly Encr

Breaking VeraCrypt: Obtaining and Extracting On-The-Fly Encryption Keys


 
Released back in 2013, VeraCrypt picks up where TrueCrypt left off. Supporting more encryption algorithms, more hash functions and a variable number of hash iterations, VeraCrypt is the default choice for the security conscious. VeraCrypt has no known weaknesses except one: once the encrypted disk is mounted, the symmetric, on-the-fly encryption key must be kept in the computer’s RAM in order to read and write encrypted data. A recent change in VeraCrypt made OTF key extraction harder, while the latest update to Elcomsoft Forensic Disk Decryptor attempts to counter the effect of the change. Who is going to win this round?

Related Keywords

Truecrypt Veracrypt , , Breaking Veracrypt , Extracting On The Fly Encryption , Elcomsoft Forensic Disk Decryptor , Key Derivation Function , Header Key Derivation , Forensic Disk Decryptor ,

© 2025 Vimarsana