

In connection with this, it is really quite surprising and disappointing at the same time to learn that the TrueCrypt encryption software application program has already been widely used by people all over the world since its initial release in February 2004 before the application program has been shut down. This could have been one of the many reasons why the TrueCrypt foundation decided to voluntarily shutdown the encryption software application program after a decade of being used. There are rumors wherein possible backdoors created by the National Security Administration (NSA) are soon to be found when independent security audits of the TrueCrypt software were launched in 2014. Many speculations have actually risen during such point in time. Up to this day, the reason why such encryption software application program has been discontinued is still a mystery.
BEST VERACRYPT ENCRYPTION ALGORITHM CODE
Most of its code came from an older form of encryption software called the TrueCrypt which has been discontinued in May 2014. As a matter of fact, it was only in August 2020 that the developers of VeraCrypt has been able to create and roll out a stable release of the software application program.īased on my research, VeraCrypt is not entirely original. While it is true that the encryption software application program has already been rolled out to the public for the last 7 years, there are still lots of things that needs improvement in the encryption system. However, I was still able to find out that IDRIX, the company behind VeraCrypt has currently a registered corporate office at 5 Avenue Ingres, 75016, Paris, France.

There is little information about the identity of Mounir Idrassi which led to certain speculations that are quite unfounded. The company was founded by a person named Mounir Idrassi and served as the Chief Executive Officer (CEO) of the business organization. As a matter of fact, the VeraCrypt encryption software program has been initially developed by a French-based company called IDRIX on June 13, 2013. That’s helpful as it tells you which algorithms offer the best performance.VeraCrypt is an encryption software application program that exists in the cybersecurity market for almost a decade already. VeraCrypt includes a tool to benchmark all supported encryption algorithms. VeraCrypt uses the XTS mode of operation.

The software supports RIPEMD-160, SHA-256, SHA-512, Whirlpool, and Streebog hash algorithms.

In a cascade, each block is first encrypted with an algorithm, and then encrypted with a different algorithm There’s also combinations of cascaded algorithms available with two or three different ciphers in a cascade. VeraCrypt supports the following algorithms: AES, Serpent, Twofish, Kuznyechik, and Camellia. VeraCrypt supports plausible deniability by allowing a single “hidden volume” to be created within another volume. With the encrypted file container, you can either create a normal VeraCrypt volume, or a hidden VeraCrypt volume. VeraCrypt supports both and can be used to keep all files as they are on a volume when you run the encrypt command. Volumes are divided into system volumes and non-system volumes. With the wizard users can create an encrypted file container (recommended for inexperienced users), or create a volume within a partition/drive. VeraCrypt ticks this box with a helpful volume creation wizard. We always prefer software that help beginners. You can add selected (or all) volumes as favorites, and there’s the option to organize them. The software lets you mount and dismount volumes.
