From 5e1fffa87191c3566bcbe20c6e8d29d5f21651d5 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Sat, 13 May 2017 17:34:16 +0200 Subject: Add HTML documentation. --- doc/html/Authenticity and Integrity.html | 49 ++++++++++++++++++++++++++++++++ 1 file changed, 49 insertions(+) create mode 100644 doc/html/Authenticity and Integrity.html (limited to 'doc/html/Authenticity and Integrity.html') diff --git a/doc/html/Authenticity and Integrity.html b/doc/html/Authenticity and Integrity.html new file mode 100644 index 00000000..b7075beb --- /dev/null +++ b/doc/html/Authenticity and Integrity.html @@ -0,0 +1,49 @@ + + + + +VeraCrypt - Free Open source disk encryption with strong security for the Paranoid + + + + + + +
+VeraCrypt +
+ + + +
+

+Documentation +>> +Security Requirements and Precautions +>> +Authenticity and Integrity +

+ +
+
+

Authenticity and Integrity

+

VeraCrypt uses encryption to preserve the confidentiality of data it encrypts. VeraCrypt neither preserves nor verifies the integrity or authenticity of data it encrypts or decrypts. Hence, if you allow an adversary to modify data encrypted by VeraCrypt, + he can set the value of any 16-byte block of the data to a random value or to a previous value, which he was able to obtain in the past. Note that the adversary cannot choose the value that you will obtain when VeraCrypt decrypts the modified block — + the value will be random — unless the attacker restores an older version of the encrypted block, which he was able to obtain in the past. It is your responsibility to verify the integrity and authenticity of data encrypted or decrypted by VeraCrypt (for + example, by using appropriate third-party software).
+
+See also: +Physical Security, +Security Model

+
+
\ No newline at end of file -- cgit v1.2.3