How to Convert TrueCrypt Format into VeraCrypt Format?

If you are a TrueCrypt user then, by now, you must have become aware that this hard drive encryption tool.

If you are a TrueCrypt user then, by now, you must have become aware that this hard drive encryption tool is no more receiving any maintenance or security updates from its developers. VeraCrypt is an open source disk encryption software that supports multiple operating systems such as Windows, Linux, and Mac OS X, etc. This article describes the VeraCrypt features in the interest of ex-TrueCrypt users, who are planning to switch their encrypted data to VeraCrypt.

The Closing

Since May 2014, TrueCrypt is not receiving any security updates, and thus, it can have backdoors. That is why Sourceforge, the official owner of this tool, has clearly published a warning on its website that this tool is insecure to use. Also, Sourceforge has released the latest 7.2 version that is specifically dedicated only to decrypt and migrate the already encrypted data. On the Sourceforge website, you can read how to decrypt and migrate the data from this discontinued file encryption utility to BitLocker, the integrated file encryption program of Windows Vista, Windows 7 and Windows 8.

The three popular operating systems, viz Windows, Mac OS X and Linux, have inbuilt hard drive encryption tools. As these tools are system specific, hence, these are not compatible with each other. If you are looking for something completely in line with TrueCrypt, then you can try using the VeraCrypt. It is also an open-source disk encryption tool based on the original TrueCrypt’s code.

A Note on VeraCrypt

VeraCrypt is an advanced tool that has received fixes for many security issues and vulnerabilities. Not just that, it also has better features and security arrangements. VeraCrypt adds improved security to the algorithms used for system and partitions encryption. That makes the tool immune to new developments in brute-force attacks.

Following is a list of a few of the improvements in this tool:

• Corrected memory leaks.

• Non-absolute DLL has got fixed.

• Multiple issues in the boot loader decompressor have got fixed.

• 'Weak Volume Header key' derivation algorithm has got fixed.

Likewise, there are too many improvements that technically make VeraCrypt a more reliable file encryption utility. Moreover, it is under active development and thus, it receives security updates for its vulnerabilities. Users can easily switch to VeraCrypt and avail better encryption security for their hard drive data.

It’s Limitation

However, VeraCrypt had a limitation that it couldn’t mount or convert the TrueCrypt’s volumes. That means, if a user wants to mount or convert a TrueCrypt’s volume, then he has to first decrypt the drive or data, and then encrypt it with VeraCrypt.

 VeraCrypt Version 1.0

With the release of VeraCrypt version 1.0, this limitation comes to an end. Now, VeraCrypt allows users to convert TrueCrypt’s containers and other non-system partitions to VeraCrypt format. Thus, the user doesn’t require going through the process of data decryption. Converting the pre-encrypted format to VeraCrypt format is a simple process that it gets triggered through "Set Header Key Derivation Algorithm" or "Change Volume Password" actions.

· You just need to check the "TrueCrypt Mode."

· Then, enter your password.

· And then follow the wizard prompts to get the volume converted into the VeraCrypt format.

However, before doing the conversion, you should always create a backup of the TrueCrypt’s data. Once, you safely get the conversion done and have checked it by mounting on VeraCrypt format; then you can delete this backup.

Conclusion

If you are planning to use VeraCrypt or have already started using it and looking forward how to mount or convert the TrueCrypt’s volume into a VeraCrypt format, then use the VeraCrypt version 1.0. It lets you mount the TrueCrypt’s volume and also lets you convert the volumes to VeraCrypt format. The tool is better because it is completely open source, and regularly receiving security updates.

License: You have permission to republish this article in any format, even commercially, but you must keep all links intact. Attribution required.