How to Install VeraCrypt on Ubuntu 22.04LTS?

In this article, we’ll learn how to install VeraCrypt. This is a FOSS disk encryption tool to create a virtual encrypted disk or encrypt an entire partition, storage device, or even a complete drive in Windows. It is available for Windows, Linux, and macOS. It is a fork of Truecrypt, a project that was discontinued in 2014. VeraCrypt is an easy-to-use disk encryption software with a user-friendly graphical user interface.

Veracrypt has fixed a lot of the inherent security vulnerabilities that were found in Truecrypt. There have been multiple new developments in brute-force attacks since the discontinuation of Truecrypt, which have been addressed with the development of Veracrypt.

It is necessary to prevent others from accessing your data, especially if the data is stored on a portable disk. If the disk is stolen, all your data can be accessed easily. To prevent this, VeraCrypt can be used to encrypt the entire disk, making it impossible to access. The encryption keys are stored in the RAM itself, so access to data is impossible until these keys are extracted. In this article, we will discuss how to install VeraCrypt on Linux.

Also read: Linux Kodachi: Get Supreme Level of Privacy

Steps to Install VeraCrypt on Ubuntu

VeraCrypt can be installed in two modes: either through the GUI or through the console. The files for both methods are available to download from the official website.

Veracrypt Site As Of August 2023
Veracrypt Site As Of August 2023

Installing GUI Veracrypt

To install GUI VeraCrypt, download the .deb package from the official website or directly by clicking here.

However, you can follow the following tutorial to properly install Veracrypt:

First, we will start with updating the system repositories by running the following command:

sudo apt update
veracrypt-ubuntu-2

We will be running the ‘wget‘ command to download the Veracrypt GUI installer package:

sudo wget https://launchpad.net/veracrypt/trunk/1.25.9/+download/veracrypt-1.25.9-Debian-12-amd64.deb
veracrypt-ubuntu-3

Now that we have downloaded the Veracrypt GUI installer, We will install the package by executing the following command:

sudo apt install ./veracrypt-1.25.9-Debian-12-amd64.deb
veracrypt-ubuntu-4

You may have to enter ‘y’ while the installation is taking place. Once through, the package is successfully installed. Now, all we have to do is go to the activities menu, type veracrypt in the search box, and hit Enter.

Installing Console VeraCrypt

To install VeraCrypt Console, download the ‘.deb package’ for the Console installer from the official website or directly by clicking here.

You can also download the package by executing the wget command in a terminal window:

sudo wget https://launchpad.net/veracrypt/trunk/1.25.9/+download/veracrypt-console-1.25.9-Debian-12-amd64.deb
veracrypt-ubuntu-5

Now, execute the dpkg command to install the downloaded package:

sudo dpkg -i ./veracrypt-console-1.25.9-Debian-12-amd64.deb
veracrypt-ubuntu-6

That’s all! VeraCrypt has been installed successfully.

Overcoming The Errors During Installation

Sometimes, while installing the package, errors may be encountered. Here, the libfuse2 package is not installed on the system.

veracrypt-ubuntu-7

This package can be installed by executing the following command:

sudo apt install libfuse2
veracrypt-ubuntu-8

Launching Veracrypt

We have learned how to install GUI-based Veracrypt as well as console-based Veracrypt. To learn about the options and usage information about VeraCrypt, Run the following command in a terminal window:

veracrypt -h
veracrypt-ubuntu-9

Why Should We Encrypt Data?

We are increasingly living in a digitally enabled, data-centric world. Even a small portion of our data could cause a lot of harm in unfathomable ways: Mental, Physical, Financial, National Security, Law, etc.

I will compress the most important one’s into top 3 reasons:

1. Privacy: Encryption ensures that your personal or sensitive information remains confidential, accessible only to those with the correct decryption key.

2. Security: It protects data from unauthorized access, making it a vital tool for safeguarding information in the digital age.

3. Compliance: Many regulations require the encryption of sensitive data, especially in industries like healthcare and finance.

Veracrypt ensures we are protected against at least easy access to our data by encrypting it with a strong encryption algorithm. Now, Let’s Explore how to Encrypt data using Veracrypt. Before we do that, let us understand what a Veracrypt volume is!

What is a Veracrypt Volume?

A VeraCrypt volume is a container or space where encrypted data is stored. It can be thought of as a virtual disk that is accessible only through VeraCrypt using the correct password and/or keyfile.

The Veracrypt volume is not just limited to a virtual disk; it can also be

File Container: A VeraCrypt volume can be a file on your system that acts as a virtual encrypted disk. Once mounted with VeraCrypt, you can interact with it like any other drive, but all data within is encrypted.

Partition/Drive Encryption: A VeraCrypt volume can also refer to an entire partition or physical drive that has been encrypted. This includes everything on the drive, from files to the operating system itself, if it’s the system drive.

The major features of Veracrypt that make it versatile are:

On-the-Fly Encryption/Decryption: VeraCrypt volumes provide real-time (on-the-fly) encryption and decryption, meaning files are automatically encrypted when you save them to the volume and decrypted when you read them, provided the volume is mounted.

Security: The contents of a VeraCrypt volume are entirely encrypted using strong encryption algorithms. The volume appears scrambled and unreadable without the correct authentication.

Flexibility: You can create a VeraCrypt volume on various storage devices, including hard drives, USB drives, or even cloud storage. The volume can be moved, backed up, or hidden as needed.

How Can You Use Veracrypt on Linux?

Step 1. Launch Veracrypt

To do so, we will start the Veracrypt program by searching for Veracrypt in the Activities Menu.

Start Veracrypt
Start Veracrypt

Once launched, We will be greeted by their main screen.

Step 2. Create New Volume

Here we will be Creating a new volume by clicking on the Create Volume button.

Create A New Volume
Create A New Volume

Step 3. Create an Ecrypted File Container

Now Volume Creation Wizard will appear, where we will select the ‘Create an encrypted file container‘ button and go ahead by pressing next.

Create An Encrypted File Container
Create An Encrypted File Container

Step 4. Setting the Volume Type

We will set the volume type as ‘Standard Veracrypt Volume’, The ‘e’ is missing, if not too much inconvenience to you.

Veracypt Volume Creation Wizard
Veracypt Volume Creation Wizard

Step 5. Select the file that needs to be encrypted

Press the Select File button, for the file selection window to appear.

Select The File That Needs To Be Encrypted
Select The File That Needs To Be Encrypted

Step 6. Choose the file from the Selection Window

Choose the file or folder that needs to be encrypted and hit save.

File Selection Dialog Box In Veracrypt
File Selection Dialog Box In Veracrypt

Step 7. Confirm The Selected Path

Verify if the path is correct, then press next.

Path Of The Selected File
Path Of The Selected File

Step 8. Encryption Option Screen

In this Screen, We will be selecting the type of Encryption and Hash Algorithm that we would like to use.

Encryption Options Screen
Encryption Options Screen

Let’s Understand Veracrypt’s Various Encryption and Hashing Algorithms

Understanding these options can help you make an informed decision on how to best protect your sensitive information.

Each of these options comes with its own set of trade-offs between security and performance. By understanding your specific needs and the capabilities of these encryption options, you can tailor your VeraCrypt setup for optimal security and usability.

Let’s dive into the different types of encryption options available in VeraCrypt:

Symmetric Encryption Algorithms

  1. AES (Advanced Encryption Standard)
    • Strength: High
    • Speed: Fast
    • Use Case: General-purpose encryption, widely accepted.
  2. Serpent
    • Strength: Very High
    • Speed: Moderate
    • Use Case: When you need an extra layer of security and don’t mind a slight performance hit.
  3. Twofish
    • Strength: High
    • Speed: Fast
    • Use Case: Similar to AES but less commonly used.
  4. Camellia
    • Strength: High
    • Speed: Fast
    • Use Case: An alternative to AES, mostly used in Japan.
  5. Kuznyechik
    • Strength: Moderate
    • Speed: Fast
    • Use Case: Mostly used in Russia, less common elsewhere.
All Encryption Algoriths Supported By Veracrypt
All Encryption Algoriths Supported By Veracrypt

Hash Algorithms

  1. SHA-256 (Secure Hash Algorithm 256-bit)
    • Strength: High
    • Speed: Moderate
    • Use Case: General-purpose hashing, widely accepted.
  2. SHA-512
    • Strength: Very High
    • Speed: Slow
    • Use Case: When you need the highest level of integrity checking.
  3. Whirlpool
    • Strength: High
    • Speed: Moderate
    • Use Case: An alternative to SHA algorithms, less commonly used.
  4. Streebog
    • Strength: Moderate
    • Speed: Fast
    • Use Case: Mostly used in Russia, less common elsewhere.
All Hashing Algorithms Supported By Veracrypt
All Hashing Algorithms Supported By Veracrypt

Cascades

VeraCrypt also allows you to use a combination of multiple encryption algorithms in a cascade, such as AES-Twofish or Serpent-AES.

  • Strength: Extremely High
  • Speed: Slow
  • Use Case: When you need the utmost security and are willing to sacrifice performance.

Back to the Volume Creation Wizard

Step 9. Select the Volume Size

We have the option to select the volume in KB, MB, GB, & TB. Ensure that you select appropriately. You also have the option to take all the available free space for the volume, but I would recommend leaving some space for your OS, so you’ve got to go the custom way. Another useful piece of information that is displayed is the free space available, which helps us make an informed decision on the size of the volume we need to create.

Select Volume Size
Select Volume Size
Im Going With 100 Mb
Im Going With 100 Mb

Step 10. Set Password for the Volume

There’s not much to write about; ensure you choose a strong password. There is detailed information on how to choose a strong password given on this screen. I would recommend you follow that. If you notice, there are two options below Use PIM and keyfiles. Let’s understand what they are.

Set The Password
Set The Password

Keyfiles

VeraCrypt allows the use of keyfiles in addition to passwords for an extra layer of security.

  • Strength: Depends on the keyfile
  • Speed: N/A
  • Use Case: When you want to add an additional authentication mechanism.

PIM (Personal Iterations Multiplier)

This is an advanced feature that allows you to set the number of iterations for the PBKDF2 algorithm.

  • Strength: Customizable
  • Speed: Depends on the setting
  • Use Case: Fine-tuning the balance between security and performance

Step 11. Formatting the Volume

Choose the filesystem according to your preference. If you are unsure, read this article on different filesystems in detail.

Format The Volume
Format The Volume

I will be going with Linux Ext4 for my volume. Hit next.

Setting Linux Ext4 As Default
Setting Linux Ext4 As Default

Step 12. Cross-Platform Support

Depending on whether you will be using this volume on other operating Systems or just sticking to Linux, Make a decision. I won’t be moving this volume out of Linux, so I’m going with the second option.

Cross Platform Support
Cross Platform Support

Step 13. Move the Mouse Vigorously

This screen creates cryptographic keys for randomness. So the program tracks the mouse movement to do this. Ensure you make your mouse movement as random as possible, then click on ‘Format’.

Randomness Collection Screen
Randomness Collection Screen

Step 14. Volume Creation is Successful

We have successfully created the volume; we will then be guided to the next screen after clicking OK.

Volume Sucessfully Created
Volume Sucessfully Created

Step 15. Exit Veracrypt Volume Creation Wizard

There is nothing more to do here. Just Click Exit.

Final Screen
Final Screen

Mounting Veracrypt Volume

We previously saw how to create a Veracrypt volume; now we will explore how to mount it. It’s quite simple: launch Veracrypt again and go to the main home screen.

Main Homescreen
Main Homescreen

On the main screen, we will select the Slot we want to mount on. If you have multiple volumes, you can assign different slots to different volumes.

Select The Slot For Our Encrypted Volume To Be Mounted
Select The Slot For Our Encrypted Volume To Be Mounted

Once the Slot is selected, we have to locate the volume that we created by clicking on the ‘select file’ button. After the selection is done just press the ‘mount’ button in the bottom left of the screen.

Click On Select File And Locate The Volume
Click On Select File And Locate The Volume

The program will prompt us to enter the password we previously set during volume creation. Enter that and press the ‘OK’ button.

Enter Password For The Volume
Enter Password For The Volume

Great! Now we have successfully mounted the encrypted Veracrypt volume.

The Volume Is Now Successfully Mounted
The Volume Is Now Successfully Mounted

Double-Click on the mounted slot; it will directly open our encrypted Volume.

Double Click The Slot To Access The Volume Directly
Double Click The Slot To Access The Volume Directly

Uninstalling Veracrypt from Ubuntu 22.04 LTS?

To uninstall Veracrypt on Ubuntu 22.04 LTS, just enter the following command in the terminal.

sudo apt autoremove veracrypt -y

That’s it We have successfully uninstalled Veracrypt.

Uninstalling Veracrypt
Uninstalling Veracrypt

Summary

In this comprehensive guide, we’ve walked you through the step-by-step process of installing VeraCrypt on Ubuntu 22.04 LTS, a robust disk encryption tool that’s essential for safeguarding your data. From downloading the installer package to overcoming installation errors and finally mounting an encrypted volume, we’ve covered it all. We also delved into the importance of data encryption and explored VeraCrypt’s advanced features, like various encryption and hashing algorithms, making it a versatile choice for both beginners and seasoned users.

Whether you’re concerned about privacy, security, or compliance, VeraCrypt offers a robust solution that adapts to your needs. It’s not just about installing the software; it’s about understanding its capabilities and leveraging them for optimal data protection. With this guide, you’re now equipped to take control of your digital security.

So go ahead, encrypt those drives, and sleep a little easier tonight, knowing that your data is well protected.

References