Files
VeraCrypt/src/Common
Mounir IDRASSI c0f8179f2a Windows: enhancement to RAM encryption
- use a more standard-looking memory value tag instead of fully random one that will look suspicious and outstanding
 - If we fail to allocate 1MiB for derivation area, we device the size by two in a loop until we succeed. This is better than falling back directly to 8KiB size
 - Better method to derive actual encryption key: instead of simply duplicating 128bit key value, we combine a xor addition and self-encryption to build a 256-bit key
 - use both encID and pbKeyDerivationArea to derive IV for encryption and not only endID
2023-09-29 22:26:54 +02:00
..
2023-09-24 10:18:54 +02:00
2023-08-20 09:21:54 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2023-07-02 15:25:21 +02:00
2017-06-23 22:15:59 +02:00
2016-05-10 22:18:34 +02:00
2016-05-10 20:20:14 +02:00
2016-05-10 22:18:34 +02:00
2016-05-10 22:18:34 +02:00
2016-05-10 20:20:14 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2016-05-10 20:20:14 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00
2017-06-23 22:15:59 +02:00