doc/html/en/Digital Signatures.html
Documentation Miscellaneous Digital Signatures
It might happen that a VeraCrypt installation package you download from our server was created or modified by an attacker. For example, the attacker could exploit a vulnerability in the server software we use and alter the installation packages stored on the server, or he/she could alter any of the files en route to you.
Therefore, you should always verify the integrity and authenticity of each VeraCrypt distribution package you download or otherwise obtain from any source. In other words, you should always make sure that the file was created by us and it was not altered by an attacker. One way to do so is to verify so-called digital signature(s) of the file.
We currently use two types of digital signatures:
X.509 signatures have the following advantages, in comparison to PGP signatures:
PGP signatures have the following advantages, in comparison to X.509 signatures:
Please note that X.509 signatures are currently available only for the VeraCrypt self-extracting installation packages for Windows. An X.509 digital signature is embedded in each of those files along with the digital certificate of the VeraCrypt Foundation issued by a public certification authority. To verify the integrity and authenticity of a self-extracting installation package for Windows, follow these steps:
"This digital signature is OK."
If you do not see the above sentence, the file is very likely corrupted. Note: On some obsolete versions of Windows, some of the necessary certificates are missing, which causes the signature verification to fail.
To verify a PGP signature, follow these steps:
Note: If you skip this step and attempt to verify any of our PGP signatures, you will receive an error message stating that the signing key is invalid. 5. Download the digital signature by downloading the PGP Signature of the file you want to verify (on the Downloads page). 6. Verify the downloaded signature (for information on how to do so, please see the documentation for the public-key encryption software).
Under Linux, these steps can be achieved using the following commands: