|バージョン||1.23-Hotfix-2 1.23 1.22 1.21 1.20 1.19 1.18 1.17 1.16|
2018/11/25 ver 1.23-Hotfix-2
Latest Stable Release
For Windows: 1.23-Hotfix-2 (Monday October 8, 2018)
For FreeBSD, Linux and MacOSX: 1.23 (Wednesday September 12, 2018)
VeraCrypt Setup 1.23-Hotfix-2.exe (34.1 MB)
VeraCrypt Portable 1.23-Hotfix-2.exe (34 MB)
VeraCrypt_1.23-Hotfix-2_Source.zip (24.1 MB)
SHA256 Checksum: veracrypt-1.23-Hotfix-2-sha256sum.txt
2018/09/14 ver 1.23
PGP Public Key: https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc (ID=0x680D16DE, Fingerprint=5069A233D55A0EEB174A5FC3821ACD02680D16DE)
Latest Stable Release - 1.23 (Wednesday September 12, 2018)
VeraCrypt Setup 1.23.exe (34.1 MB)
VeraCrypt Portable 1.23.exe (34 MB)
VeraCrypt_1.23.dmg (8.85 MB) (PGP Signature)
veracrypt-1.23-setup.tar.bz2 (14.7 MB) (PGP Signature)
Linux Legacy 32-bit CPU with no SSE2:
veracrypt-1.23-x86-legacy-setup.tar.bz2 (7.01 MB)
FreeBSD 11 (i386 & amd64):
veracrypt-1.23-freebsd-setup.tar.bz2 (14.9 MB) (PGP Signature)
VeraCrypt 1.23 Source (Windows Zip)
(PGP Signature) VeraCrypt 1.23 Source (UNIX tar bzip2)
(PGP Signature) VeraCrypt DCS EFI Bootloader 1.23 Source
User Guide CHM: VeraCrypt 1.23 user Guide CHM (PGP
SHA256 sums for VeraCrypt 1.23 release files
SHA512 sums for VeraCrypt 1.23 release files
VeraCrypt_1.23_Bundle.7z (PGP Signature)
SHA256/SHA512 sums of VeraCrypt 1.23 Bundle (PGP Signature)
2018/04/04 ver 1.22
Note to publishers: If you intend to host our files on your server, please instead consider linking to this page. It will help us prevent spreading of obsolete versions, which we believe is critical when security software is concerned. Thank you.
Supported versions of operating systems
PGP Public Key: https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc (ID=0x54DDD393, Fingerprint=993B7D7E8E413809828F0F29EB559C7C54DDD393)
Latest Stable Release - 1.22 (Friday March 30, 2018)
VeraCrypt Setup 1.22.exe (29.6 MB)
VeraCrypt Portable 1.22.exe (29.4 MB)
Mac OS X:
VeraCrypt_1.22.dmg (11.1 MB) (PGP Signature)
OSXFUSE 2.5 or later must be installed.
2017/07/10 ver 1.21
1.21 (July 9th, 2017):
Fix 1.20 regression crash when running on CPU not supporting extended features.
Fix 1.20 regression that caused PIM value stored in favorites to be ignored during mount.
Fix 1.20 regression that causes system favorites not to mount in some cases. Fix some cases of "Parameter Incorrect" error during EFI system encryption wizard.
Install PDF documents related to EFI system encryption configuration for advanced users;
disk_encryption_v1_2.pdf related to EFI hidden OS and full fisk encryption dcs_tpm_owner_02.pdf related to TPM configuration for EFI system encryption.
Add support for building on FreeBSD.
Last edited Today at 9:17 AM by idrassi, version 47
2017/06/30 ver 1.20
CodePlex is shutting down. Read about the shutdown plan, including archive and migration information, on Brian Harry's blog.
This project has moved. For the latest updates, please go here.
1.20 (June 29th, 2017):
Use 64-bit optimized assembly implementation of Twofish and Camellia by Jussi Kivilinna.
Camellia 2.5 faster when AES-NI supported by CPU. 30% faster without it.
Use optimized implementation for SHA-512/SHA256.
33% speedup on 64-bit systems.
Deploy local HTML documentation instead of User Guide PDF. Change links in UI from ones on Codeplex to ones hosted at veracrypt.fr Security: build binaries with support for Address Space Layout Randomization (ASLR).
Fix bug in EFI system decryption using EFI Rescue Disk Enable using Secure Desktop for password entry. Add preferences option and command line switch (/secureDesktop) to activate it.
Use default mount parameters when mounting multiple favorites with password caching.
Use CHM file for User Guide instead of PDF. Fix false warning in case of EFI system encryption about Windows not installed on boot drive.
Enhancements to driver handling of various disk IOCTL. Enhancements to EFI bootloader. Add possibility to manually edit EFI configuration file.
Driver Security: Use enhanced protection of NX pool under Windows 8 and later.
Reduce performance impact of internal check for disconnected network drives. Minor fixes.
OSX 10.7 or newer is required to run VeraCrypt. Make VeraCrypt default handler of .hc & .tc files. Add custom VeraCrypt icon to .hc and .tc files in Finder. Check TrueCryptMode in password dialog when opening container file with .tc extension.
2016/10/18 ver 1.19
1.19 (October 17th, 2016):
Fix issues raised by Quarkslab audit.
Remove GOST89 encryption algorithm. Make PBKDF2 and HMAC code clearer and easier to analyze. Add test vectors for Kuznyechik. Update documentation to warn about risks of using command line switch ”tokenpin”.
Use SSE2 optimized Serpent algorithm implementation from Botan project (2.5 times faster on 64-bit platforms).
Fix keyboard issues in EFI Boot Loader. Fix crash on 32-bit machines when creating a volume that uses Streebog as PRF.
Fix false positive detection of Evil-Maid attacks in some cases (e.g. hidden OS creation)
Fix failure to access EFS data on VeraCrypt volumes under Windows 10. Fix wrong password error in the process of copying hidden OS. Fix issues raised by Quarkslab audit:
Fix leak of password length in MBR bootloader inherited from TrueCrypt. EFI bootloader: Fix various leaks and erase keyboard buffer after password is typed.
Use libzip library for handling zip Rescue Disk file instead of vulnerable XUnzip library.
Support EFI system encryption for 32-bit Windows. Perform shutdown instead of reboot during Pre-Test of EFI system encryption to detect incompatible motherboards.
Minor GUI and translations fixes.
Remove dependency to MacFUSE compatibility layer in OSXFuse.
1.18a (August 17th, 2016):
Last edited Today at 6:34 PM by idrassi, version 45
2016/08/18 ver 1.18
1.18 (August 17th, 2016):
Support Japanese encryption standard Camellia, including for Windows system encryption (MBR & EFI).
Support Russian encryption and hash standards Kuznyechik, Magma and Streebog, including for Windows EFI system encryption.
Support EFI Windows system encryption (limitations: no hidden os, no boot custom message)
Fix TrueCrypt vulnerability allowing detection of hidden volumes presence(reported by Ivanov Aleksey Mikhailovich, alekc96 [at] mail dot ru)
Enhanced protection against dll hijacking attacks. Fix boot issues on some machines by increasing required memory by 1 KiB Add benchmarking of hash algorithms and PRF with PIM (including for pre-boot).
Move build system to Visual C++ 2010 for better stability. Workaround for AES-NI support under Hyper-V on Windows Server 2008 R2. Correctly remove driver file veracrypt.sys during uninstall on Windows 64-bit.
Implement passing smart card PIN as command line argument (/tokenpin) when explicitly mounting a volume.
When no drive letter specified, choose A: or B: only when no other free drive letter is available.
Reduce CPU usage caused by the option to disable use of disconnected network drives.
Add new volume ID mechanism to be used to identify disks/partitions instead of their device name.
Add option to avoid PIM prompt in pre-boot authentication by storing PIM value unencrypted in MBR.
Add option and command line switch to hide waiting dialog when performing operations.
Add checkbox in "VeraCrypt Format" wizard GUI to skip Rescue Disk verification during system encryption procedure.
Allow files drag-n-drop when VeraCrypt is running as elevated process. Minor GUI and translations fixes.
Fix mount issue on Fedora 23. Fix mount failure when compiling source code using gcc 5.x. Adhere to XDG Desktop Specification by using XDG_CONFIG_HOME to determine location of configuration files.
2016/02/14 ver 1.17
1.17 (February 13th, 2016):
Add support for creating exFAT volumes. Add GUI indicator for the amount of randomness gathered using mouse movement.
Include new icons and graphics contributed by Andreas Becker (http://www.andreasbecker.de)
Solve issue with system favorites not being able to be mounted to drive A: Solve lost focus issues for after displaying the waiting dialog Solve rare issue where some partitions where asscoiated with wrong disk the "Select Device" dialog.
Implement PIM caching, for both system encryption and normal volumes. Add option to activate it.
Don't try mounting using cached passwords if password and/or keyfile are specified in the command line.
Internal rewrite to make VeraCrypt native UNICODE application. Workaround to avoid false positive detection by some anti-virus software. Hide disconnected network drives in the list of available drives. Add option to make them available for mounting.
Last edited Today at 12:30 AM by idrassi, version 41
2016/02/02 ver 1.16