How to Recover Files From a TrueCrypt or VeraCrypt Encrypted Disk?

Read this article to find out how to recover files deleted from a TrueCrypt or VeraCrypt container, how to mount and unlock an encrypted disk to access the files.

How to Recover Files From a TrueCrypt or VeraCrypt Encrypted Disk?

If you are looking for an easy and effective way to encrypt all computer data, from the system or logical disk and to a backup disk, external USB drive or a memory card, use VeraCrypt. This is an open-source tool meeting the highest data encryption standards.

What is TrueCrypt and VeraCrypt, and why would we use them?

The best way to protect your files from being viewed by other people is to encrypt them. The encryption tool uses a secret key to turn the file contents into a mishmash of symbols. There is no way to read the contents until an unlocking key is used.

The VeraCrypt tool is based on the very popular open-source utility, TrueCrypt. After the TrueCrypt project was closed, a company named IDRIX added new features to the product and fixed security issues.

With VeraCrypt, you can create an encrypted container which can be then mounted in your system as an ordinary disk. All files from this container are encrypted and encrypted on-the-fly. That is why you can view and edit them just as if they were located on your USB drive. When you finish working with them, the tool blocks access to this container, and cleans the keys and file contents from the system memory.

VeraCrypt can also encrypt your system drive, but we recommend using the Windows-integrated tool, BitLocker. A peculiarity of VeraCrypt is the ability to create a hidden encrypted partition. If you are held by law breakers, and demanded to give the key, you can let them have a fake unlocking key that will open the fake volume you have created beforehand. Meanwhile, using the main key will unlock a different volume containing real data.

How to create an encrypted partition?

Download and install the program, then open the Start menu and run VeraCrypt. You will see the main window:

VeraCrypt

The first step to take is to click Create Volume. This starts the Volume Creation Wizard that offers you a choice of the following options:

VeraCrypt

Creating an encrypted file container lets you generate such file on any disk currently connected to your computer. After that, such file can be mounted as a logical disk. Inside the file, a standard or hidden VeraCrypt volume can be created (we have just explained the difference above).

VeraCrypt

We will create a standard volume. The next step is choosing the volume location.

VeraCrypt

After that, decide on Encryption Algorithm and Hash Algorithm. By default, these are AES, and SHA-512, accordingly. Leave the settings as they are.

VeraCrypt

Now set the maximum volume size. Let’s set it to 5 GB.

VeraCrypt

Click Next and go on to create a password. When the password is given, save it to a safe location or use a password which you remember well. There is no way to restore a forgotten or lost password, and you can’t decrypt the date without the password.

You can use any files that can be applied as an alternative to password, by checking the Use key files option.

VeraCrypt

Click Next and confirm using large files.

VeraCrypt

Click Next and move on to volume format options and encryption key settings. Click and wait until the encrypted volume is created.

VeraCrypt

How to mount and unlock the disk to access files?

Click «Select File» in the program’s main window and choose the file where you saved the VeraCrypt container. After the file is chosen, select one of the available disks above. For example, let us select disk XXX and click on Mount.

VeraCrypt

Now you need to enter the password.

VeraCrypt

Now go to This PC and check if a new disk appeared there.

Recovering deleted files from a VeraCrypt container

Files deleted by mistake or lost after formatting the encrypted disk can be recovered with the help of Hetman Partition Recovery. Before scanning, you should mount the disk in the program. As VeraCrypt uses on-the-fly encryption principle, the recovery process will be no different from working with any other disk.

The tool recovers data from any devices, regardless of the cause of data loss.

Download and install it, then follow the wizard directions for effective file recovery.

Without the unlocking password, all data remains encrypted and can’t be restored.

Vladimir Artiukh

Author: , Technical Writer

Vladimir Artiukh is a technical writer for Hetman Software, as well as the voice and face of their English-speaking YouTube channel, Hetman Software: Data Recovery for Windows. He handles tutorials, how-tos, and detailed reviews on how the company’s tools work with all kinds of data storage devices.

Oleg Afonin

Editor: , Technical Writer

Oleg Afonin is an expert in mobile forensics, data recovery and computer systems. He often attends large data security conferences, and writes several blogs for such resources as xaker.ru, Elcomsoft and Habr. In addition to his online activities, Oleg’s articles are also published in professional magazines. Also, Oleg Afonin is the co-author of a well-known book, Mobile Forensics - Advanced Investigative Strategies.

Recommended For You

Hello! This is AI-based Hetman Software virtual assistant, and it will answer any of your questions right away.
Start Chat