Disk image formats

Disk Decipher supports these disk image formats:
If you use another disk image format and would like Disk Decipher to support that, please let me know.

TrueCrypt

Disk Decipher supports TrueCrypt containers created by TrueCrypt 6.0 and later (header version 4 and 5). Almost all TrueCrypt features are supported:
  • Operating mode: XTS

  • Ciphers: AES-256, Serpent, Twofish

  • Cascade ciphers: AES-Twofish, AES-Twofish-Serpent, Serpent-AES, Serpent-Twofish-AES, Twofish-Serpent

  • Hash functions: RIPEMD160, SHA-512, Whirlpool

  • Hidden volumes
  • Keyfiles

Note that if you store your TrueCrypt images inside a folder which is synchronized to a cloud storage service like Dropbox or Box, you probably want to turn the TrueCrypt option "Preserve modification timestamp of file containers" off to allow the cloud storage agent to correctly detect changes to your TrueCrypt containers after unmount. Otherwise your TrueCrypt container will not be correctly synchronized to your cloud storage service.

FreeOTFE

Disk Decipher supports FreeOTFE volumes with version 3 and 4. The most common FreeOTFE features are supported:
  • Operating modes: XTS, CBC
  • Ciphers: AES-256, Serpent, Twofish, Blowfish-448
  • Hash functions: RIPEMD160, SHA-512, Whirlpool
Most advanced FreeOTFE features are currently not supported, like keyfiles, hidden volumes, non-default key iterations and salt length. If you would like support for such a feature added to Disk Decipher, please let me know.

LUKS

Disk Decipher supports LUKS volumes with version 1. The most common LUKS features are supported:
  • Operating modes: XTS
  • Ciphers: AES-256, Serpent, Twofish
  • Hash functions: SHA1, SHA-256, SHA-512, RIPEMD160
To create a LUKS volume compatible with the above features, use commands like this on a Linux system:

# cryptsetup --cipher aes-xts-plain64 --key-size 512 luksFormat /dev/loop0
# cryptsetup luksOpen /dev/loop0 test
# mkdosfs /dev/mapper/test
# mount /dev/mapper/test /mnt
...
# umount /mnt
# cryptsetup luksClose test

If you need support for other LUKS features (like CBC with ESSIV), please let me know.

VeraCrypt

From version 2.2.0, Disk Decipher supports VeraCrypt containers created by VeraCrypt 1.0 and later (header version 5). Almost all VeraCrypt features are supported:
  • Operating mode: XTS

  • Ciphers: AES-256, Serpent, Twofish

  • Cascade ciphers: AES-Twofish, AES-Twofish-Serpent, Serpent-AES, Serpent-Twofish-AES, Twofish-Serpent

  • Hash functions: RIPEMD160, SHA-512, Whirlpool

  • Hidden volumes
  • Keyfiles

Note that if you store your VeraCrypt images inside a folder which is synchronized to a cloud storage service like Dropbox or Box, you probably want to turn the VeraCrypt option "Preserve modification timestamp of file containers" off to allow the cloud storage agent to correctly detect changes to your VeraCrypt containers after unmount. Otherwise your VeraCrypt container will not be correctly synchronized to your cloud storage service.

Due to VeraCrypt's high number of hash algorithm iterations for key derivation, Disk Decipher will not try to detect the VeraCrypt disk image format for containers having a file extension registered to other disk formats (.tc and .vol). To enable VeraCrypt disk image format detection, use VeraCrypt's default extension (.hc), an unrelated extension, or no extension at all, for your VeraCrypt container file.