<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Linux_Unified_Key_Setup</id>
	<title>Linux Unified Key Setup - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Linux_Unified_Key_Setup"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Linux_Unified_Key_Setup&amp;action=history"/>
	<updated>2026-05-04T18:46:23Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=Linux_Unified_Key_Setup&amp;diff=3372411&amp;oldid=prev</id>
		<title>imported&gt;Citation bot: Added date. | Use this bot. Report bugs. | Suggested by Abductive | #UCB_toolbar</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Linux_Unified_Key_Setup&amp;diff=3372411&amp;oldid=prev"/>
		<updated>2024-08-08T01:55:57Z</updated>

		<summary type="html">&lt;p&gt;Added date. | &lt;a href=&quot;/wiki143/index.php?title=En:WP:UCB&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;En:WP:UCB (page does not exist)&quot;&gt;Use this bot&lt;/a&gt;. &lt;a href=&quot;/wiki143/index.php?title=En:WP:DBUG&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;En:WP:DBUG (page does not exist)&quot;&gt;Report bugs&lt;/a&gt;. | Suggested by Abductive | #UCB_toolbar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Disk encryption software}}&lt;br /&gt;
{{redirect|LUKS|the American painter|George Luks}}&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;Linux Unified Key Setup&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;LUKS&amp;#039;&amp;#039;&amp;#039;) is a [[disk encryption]] specification created by Clemens Fruhwirth in 2004 and originally intended for [[Linux]].&lt;br /&gt;
&lt;br /&gt;
LUKS implements a platform-independent standard on-disk format for use in various tools. This facilitates compatibility and interoperability among different programs and operating systems, and assures that they all implement [[password management]] in a secure and documented manner.&amp;lt;ref&amp;gt;{{cite web |url=https://gitlab.com/cryptsetup/cryptsetup/-/wikis/LUKS-standard/on-disk-format.pdf |title=LUKS On-Disk Format Specification Version 1.2.3 |first=Clemens |last=Fruhwirth |date=2018-01-20 |accessdate=2021-09-23 }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
LUKS is used to encrypt a [[block device]]. The contents of the encrypted device are arbitrary, and therefore any filesystem can be encrypted, including [[swap partition]]s.&amp;lt;ref&amp;gt;{{Cite web|url=https://docs.fedoraproject.org/en-US/quick-docs/encrypting-drives-using-LUKS/|title=Encrypting drives using LUKS|website=Fedora Docs|access-date=6 May 2022}}&amp;lt;/ref&amp;gt; There is an unencrypted [[header (computing)|header]] at the beginning of an encrypted volume, which allows up to 8 (LUKS1) or 32 (LUKS2) [[encryption key]]s to be stored along with encryption parameters such as cipher type and key size.&amp;lt;ref name=&amp;quot;redhat&amp;quot;&amp;gt;{{Cite web|url=https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/encrypting-block-devices-using-luks_security-hardening|title=Chapter 12. Encrypting block devices using LUKS|website=Red Hat Customer Portal}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.golinuxcloud.com/how-to-encrypt-hard-disk-partition-luks-linux/|title=How to Encrypt Hard Disk (partition) using LUKS in Linux|date=27 February 2019 }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The presence of this header is a major difference between LUKS and [[dm-crypt]], since the header allows multiple different passphrases to be used, with the ability to change and remove them. If the header is lost or corrupted, the device will no longer be decryptable.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.linode.com/docs/guides/encrypt-data-disk-with-dm-crypt/|title=How to Encrypt Your Data with dm-crypt|website=Linode|date=22 November 2022 }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Encryption is done with a multi-layer approach. First, the block device is encrypted using a &amp;#039;&amp;#039;master key.&amp;#039;&amp;#039; This master key is encrypted with each active &amp;#039;&amp;#039;user key&amp;#039;&amp;#039;.&amp;lt;ref&amp;gt;{{Cite journal|url=https://eprint.iacr.org/2016/274.pdf|title=What Users Should Know About Full Disk Encryption Based on LUKS|first1=Simone|last1=Bossi|first2=Andrea|last2=Visconti|date=2015}}&amp;lt;/ref&amp;gt; User keys are derived from passphrases, [[FIDO Alliance|FIDO2]] security keys, [[Trusted Platform Module|TPMs]] or [[Smart card|smart cards]].&amp;lt;ref&amp;gt;{{Cite web |title=systemd-cryptenroll - ArchWiki |url=https://wiki.archlinux.org/title/Systemd-cryptenroll |access-date=2023-11-22 |website=wiki.archlinux.org}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=20 April 2014 |title=How to encrypt a LUKS container using a smart card or token |url=https://blog.g3rt.nl/luks-smartcard-or-token.html}}&amp;lt;/ref&amp;gt; The multi-layer approach allows users to change their passphrase without re-encrypting the whole block device. Key slots can contain information to verify user passphrases or other types of keys.&lt;br /&gt;
&lt;br /&gt;
There are two versions of LUKS, with LUKS2 featuring resilience to header corruption, and using the [[Argon2]] [[key derivation function]] by default, whereas LUKS1 uses [[PBKDF2]].&amp;lt;ref&amp;gt;{{Cite web|url=https://infosecwriteups.com/how-luks-works-with-full-disk-encryption-in-linux-6452ad1a42e8|title=How LUKS works with Full Disk Encryption in Linux|date=25 September 2021 }}&amp;lt;/ref&amp;gt; Conversion between both versions of LUKS is possible in certain situations, but some features may not be available with LUKS1 such as Argon2.&amp;lt;ref name=&amp;quot;redhat&amp;quot; /&amp;gt; LUKS2 uses [[JSON]] as a metadata format.&amp;lt;ref name=&amp;quot;redhat&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;luks2-format&amp;quot;&amp;gt;{{Cite web|url=https://gitlab.com/cryptsetup/cryptsetup/blob/master/docs/on-disk-format-luks2.pdf|title=on-disk-format-luks2.pdf|date=7 March 2024 }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Available cryptographic algorithms depend on individual kernel support of the host. [[Libgcrypt]] can be used as a backend for hashing, which supports all of its algorithms.&amp;lt;ref name=&amp;quot;man8cryptsetup&amp;quot;&amp;gt;{{man|8|cryptsetup|die.net}}&amp;lt;/ref&amp;gt; It is up to the operating system vendor to choose the default algorithm.&amp;lt;ref&amp;gt;{{Cite web|url=https://eforensicsmag.com/breaking-luks-encryption-by-oleg-afonin/|title=Breaking LUKS Encryption|website=eForensics|date=21 August 2020 }}&amp;lt;/ref&amp;gt; LUKS1 makes use of an [[anti-forensics]] technique called AFsplitter, allowing for secure [[data erasure]] and protection.&amp;lt;ref&amp;gt;{{Cite web|url=https://clemens.endorphin.org/AFsplitter|title=AFsplitter}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LUKS with LVM ===&lt;br /&gt;
&lt;br /&gt;
[[Logical Volume Manager (Linux)|Logical Volume Management]] can be used alongside LUKS.&amp;lt;ref name=&amp;quot;archwiki&amp;quot;&amp;gt;{{Cite web|url=https://wiki.archlinux.org/title/Dm-crypt/Encrypting_an_entire_system|title=dm-crypt/Encrypting an entire system|access-date=6 May 2022}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; LVM on LUKS : When LVM is used on an unlocked LUKS container, all underlying partitions (which are LVM logical volumes) can be encrypted with a single key. This is akin to splitting a LUKS container into multiple partitions. The LVM structure is not visible until the disk is decrypted.&amp;lt;ref&amp;gt;{{Cite web|url=https://tonisagrista.com/blog/2020/arch-encryption/|title= Arch with LVM on LUKS}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
; LUKS on LVM : When LUKS is used to encrypt LVM logical volumes, an encrypted volume can span multiple devices. The underlying LVM volume group is visible without decrypting the encrypted volumes.&amp;lt;ref&amp;gt;{{Cite web|url=https://amkeisntall.wordpress.com/2014/09/12/luks-on-lvm-encrypted-logical-volumes-and-secure-backups/|title=LUKS on LVM: encrypted logical volumes and secure backups|date=12 September 2014 }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Full disk encryption ===&lt;br /&gt;
[[File:Debian Graphical Installer Partman-auto init automatically partition 1.png|thumb|[[Debian-Installer]] showing an option for automated partitioning with [[Logical Volume Manager (Linux)|LVM]] on LUKS]]&lt;br /&gt;
A common usage of LUKS is to provide [[full disk encryption]], which involves encrypting the [[root directory|root partition]] of an operating system installation, which protects the operating system files from being [[Evil maid attack|tampered with]] or read by [[adversary (cryptography)|unauthorized parties]].&amp;lt;ref name=&amp;quot;archwiki&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On a Linux system, the [[boot partition]] (&amp;lt;code&amp;gt;/boot&amp;lt;/code&amp;gt;) may be encrypted if the [[bootloader]] itself supports LUKS (e.g. [[GRUB]]). This is undertaken to prevent tampering with the [[Linux kernel]]. However, the [[Bootloader#first stage bootloader|first stage bootloader]] or an [[EFI system partition]] cannot be encrypted (see [[Full disk encryption#The boot key problem]]).&amp;lt;ref name=&amp;quot;archwiki&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On mobile Linux systems, [[postmarketOS]] has developed [https://wiki.postmarketos.org/wiki/Osk-sdl osk-sdl] to allow a full disk encrypted system to be unlocked using a touch screen.&lt;br /&gt;
&lt;br /&gt;
For systems running [[systemd]], the &amp;lt;code&amp;gt;systemd-homed&amp;lt;/code&amp;gt; component can be used to encrypt individual [[home directory|home directories]].&amp;lt;ref&amp;gt;{{Cite web|url=https://systemd.io/HOME_DIRECTORY/|title=Home Directories|website=systemd}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Operating system support ==&lt;br /&gt;
&lt;br /&gt;
The [[reference implementation (computing)|reference implementation]] for LUKS operates on Linux and is based on an enhanced version of [[cryptsetup]], using [[dm-crypt]] as the disk encryption backend. Under [[Microsoft]] [[Windows]], LUKS-encrypted disks can be used via the [[Windows Subsystem for Linux]].&amp;lt;ref&amp;gt;{{Cite web|url=https://devblogs.microsoft.com/commandline/servicing-the-windows-subsystem-for-linux-wsl-2-linux-kernel/|title=Servicing the Windows Subsystem for Linux (WSL) 2 Linux Kernel|website=Microsoft Developer Blogs|date=16 April 2021 }}&amp;lt;/ref&amp;gt; (Formerly, this was possible with LibreCrypt,&amp;lt;ref&amp;gt;{{Cite web|url=https://github.com/t-d-k/LibreCrypt|title=LibreCrypt|website=GitHub|date=27 July 2022 }}&amp;lt;/ref&amp;gt; which currently has fundamental security holes,&amp;lt;ref&amp;gt;{{Cite web|url=https://github.com/t-d-k/LibreCrypt/issues/38|title=Flaw in driver allows privilege escalation. Feedback wanted · Issue #38 · t-d-k/LibreCrypt|website=GitHub|date=30 September 2015}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web|url=https://github.com/t-d-k/LibreCrypt/issues/39|title=Driver allows writing to arbitrary devices · Issue #39 · t-d-k/LibreCrypt|website=[[GitHub]] |date=7 October 2015}}&amp;lt;/ref&amp;gt; and which succeeded [[FreeOTFE]], formerly DoxBox.)&lt;br /&gt;
&lt;br /&gt;
[[DragonFly BSD]] supports LUKS.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.dragonflybsd.org/features/#index6h2|title=DragonFly&amp;#039;s Major Features List|access-date=6 May 2022}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Installer support ===&lt;br /&gt;
&lt;br /&gt;
Several Linux distributions allow the root device to be encrypted upon OS installation. These installers include [[Calamares (software)|Calamares]],&amp;lt;ref&amp;gt;{{Cite web|url=https://www.phoronix.com/scan.php?page=news_item&amp;amp;px=Calamares-LUKS-Support|title=Calamares Installer Adds LUKS Encryption Support|author=Michael Larabel|date=8 May 2016|website=Phoronix}}&amp;lt;/ref&amp;gt; [[Ubiquity (software)|Ubiquity]],&amp;lt;ref&amp;gt;{{Cite web|url=https://www.maketecheasier.com/encrypt-hard-disk-in-ubuntu/|title=How to Encrypt Your Hard Disk in Ubuntu|website=Make Tech Easier|date=13 January 2017 }}&amp;lt;/ref&amp;gt; [[Debian-Installer]],&amp;lt;ref&amp;gt;{{Cite web|url=https://wiki.debian.org/DebianInstaller/PartmanCrypto|title=PartmanCrypto|website=Debian Wiki|access-date=6 May 2022}}&amp;lt;/ref&amp;gt; and more.&lt;br /&gt;
&lt;br /&gt;
== On-disk format ==&lt;br /&gt;
&lt;br /&gt;
LUKS headers are backward compatible; newer versions of LUKS are able to read headers of previous versions.&amp;lt;ref name=&amp;quot;luks1-standard&amp;quot;&amp;gt;{{Cite web|url=https://gitlab.com/cryptsetup/cryptsetup/wikis/LUKS-standard/on-disk-format.pdf|title=LUKS On-Disk Format Specification}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LUKS1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ LUKS1 Header&amp;lt;ref name=&amp;quot;luks1-standard&amp;quot; /&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
!colspan=&amp;quot;2&amp;quot;| Offset !! Data type !! Description&lt;br /&gt;
|-&lt;br /&gt;
| {{0}}{{0}}0   || {{0}}{{0}}0&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt; || char[6]    || [[Magic number (programming)|Magic number]] {&amp;#039;L&amp;#039;, &amp;#039;U&amp;#039;, &amp;#039;K&amp;#039;, &amp;#039;S&amp;#039;, 0xBA, 0xBE }&lt;br /&gt;
|-&lt;br /&gt;
| {{0}}{{0}}6   || {{0}}{{0}}6&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || uint16_t   || LUKS Version (0x0001 for LUKS1)&lt;br /&gt;
|-&lt;br /&gt;
| {{0}}{{0}}8   || {{0}}{{0}}8&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || char[32]   || Cipher Algorithm (e.g. &amp;quot;twofish&amp;quot;, &amp;quot;aes&amp;quot;)&lt;br /&gt;
|-&lt;br /&gt;
| {{0}}40  || {{0}}28&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || char[32]   || Cipher mode (e.g. &amp;quot;cbc-essiv:sha256&amp;quot;)&lt;br /&gt;
|-&lt;br /&gt;
| {{0}}72  || {{0}}48&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || char[32]   || [[Cryptographic hash function]] (e.g. &amp;quot;sha1&amp;quot;, &amp;quot;ripemd160&amp;quot;)&lt;br /&gt;
|-&lt;br /&gt;
| 104 || {{0}}68&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || uint32_t   || Payload offset (position of encrypted data) in 512 byte offsets&lt;br /&gt;
|-&lt;br /&gt;
| 108 || {{0}}6C&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || uint32_t   || Number of key bytes&lt;br /&gt;
|-&lt;br /&gt;
| 112 || {{0}}70&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || char[20]   || [[PBKDF2]] master key [[checksum]]&lt;br /&gt;
|-&lt;br /&gt;
| 132 || {{0}}84&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || char[32]   || PBKDF2 master key salt parameter&lt;br /&gt;
|-&lt;br /&gt;
| 164 || {{0}}A4&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || uint32_t   || PBKDF2 master key iterations (Default: 10)&lt;br /&gt;
|-&lt;br /&gt;
| 168 || {{0}}A8&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || char[40]   || [[UUID]] of the partition (e.g. &amp;quot;504c9fa7-d080-4acf-a829-73227b48fb89&amp;quot;)&lt;br /&gt;
|-&lt;br /&gt;
| 208 || {{0}}D0&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || (48 Bytes) || Keyslot 1&lt;br /&gt;
|-&lt;br /&gt;
|colspan=&amp;quot;4&amp;quot;| …&lt;br /&gt;
|-&lt;br /&gt;
| 544 || 220&amp;lt;sub&amp;gt;hex&amp;lt;/sub&amp;gt;  || (48 Bytes) || Keyslot 8&lt;br /&gt;
|-&lt;br /&gt;
|colspan=&amp;quot;4&amp;quot;| &amp;#039;&amp;#039;592 Bytes total&amp;#039;&amp;#039;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Format of each keyslot&lt;br /&gt;
|-&lt;br /&gt;
! Offset !! Data type !! Description&lt;br /&gt;
|-&lt;br /&gt;
| {{0}}0 || uint32_t || State of keyslot: Active=0x00AC71F3; Disabled=0x0000DEAD&lt;br /&gt;
|-&lt;br /&gt;
| {{0}}4 || uint32_t || PBKDF2 iteration parameter&lt;br /&gt;
|-&lt;br /&gt;
| {{0}}8 || char[32] || PBKDF2 salt parameter&lt;br /&gt;
|-&lt;br /&gt;
| 40 || uint32_t || Start sector of key&lt;br /&gt;
|-&lt;br /&gt;
| 44 || uint32_t || Number of anti-forensic stripes (Default: 4000)&lt;br /&gt;
|-&lt;br /&gt;
|colspan=&amp;quot;3&amp;quot;| &amp;#039;&amp;#039;48 Bytes total&amp;#039;&amp;#039;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== LUKS2 ===&lt;br /&gt;
&lt;br /&gt;
LUKS2 devices begin with a binary header intended to allow recognition and fast detection by [[blkid]], which also contains information such as [[Checksum|checksums]]. All strings used in a LUKS2 header are [[null-terminated string]]s. Directly after the binary header comes the JSON area, containing the objects &amp;lt;code&amp;gt;config&amp;lt;/code&amp;gt; (configuration), &amp;lt;code&amp;gt;keyslots&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;digests&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;segments&amp;lt;/code&amp;gt; (describes encrypted areas on the disk), and &amp;lt;code&amp;gt;tokens&amp;lt;/code&amp;gt; containing extra metadata.&amp;lt;ref name=&amp;quot;luks2-format&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The binary format for regular &amp;lt;code&amp;gt;luks2&amp;lt;/code&amp;gt; keyslots are mostly similar to their predecessor, with the addition of different per-keyslot algorithms. Another type of key exists to allow redundancy in the case that a re-encryption process is interrupted.&amp;lt;ref name=&amp;quot;luks2-format&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
[[Cryptsetup]] is the reference implementation of the LUKS frontend.&lt;br /&gt;
&lt;br /&gt;
To encrypt a device with the path &amp;lt;code&amp;gt;/dev/sda1&amp;lt;/code&amp;gt;:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;console&amp;quot;&amp;gt;&lt;br /&gt;
# cryptsetup luksFormat /dev/sda1&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To unlock an encrypted device, where &amp;lt;code&amp;gt;name&amp;lt;/code&amp;gt; is the [[dm-crypt|mapped]] device name:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;console&amp;quot;&amp;gt;&lt;br /&gt;
# cryptsetup open /dev/sda1 name&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Re-encrypting ===&lt;br /&gt;
&lt;br /&gt;
Re-encrypting a LUKS container can be done either with the &amp;lt;code&amp;gt;cryptsetup&amp;lt;/code&amp;gt; tool itself, or with a legacy tool called &amp;lt;code&amp;gt;cryptsetup-reencrypt&amp;lt;/code&amp;gt;. These tools can also be used to add encryption to an existing unencrypted filesystem, or remove encryption from a block device.&amp;lt;ref name=&amp;quot;man8cryptsetup&amp;quot; /&amp;gt;&amp;lt;ref&amp;gt;{{Cite web|url=https://man7.org/linux/man-pages/man8/cryptsetup-reencrypt.8.html|title=CRYPTSETUP-REENCRYPT(8) Man page|website=man7.org}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Both methods have similar syntax:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;console&amp;quot;&amp;gt;&lt;br /&gt;
# cryptsetup reencrypt /dev/sda1&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;console&amp;quot;&amp;gt;&lt;br /&gt;
# cryptsetup-reencrypt /dev/sda1&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[Comparison of disk encryption software]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*{{Official website|https://gitlab.com/cryptsetup/cryptsetup/blob/master/README.md}}&lt;br /&gt;
*[https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions Frequently Asked Questions (FAQ)]&lt;br /&gt;
*[https://github.com/t-d-k/librecrypt LibreCrypt: Implementation for Windows]&lt;br /&gt;
*[https://gitlab.com/cryptsetup/cryptsetup/wikis/Specification LUKS1 Specification]&lt;br /&gt;
*[https://gitlab.com/cryptsetup/cryptsetup/blob/master/docs/on-disk-format-luks2.pdf LUKS2 Specification]&lt;br /&gt;
&lt;br /&gt;
{{Linux}}&lt;br /&gt;
{{Cryptographic software}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptographic software]]&lt;br /&gt;
[[Category:Disk encryption]]&lt;br /&gt;
[[Category:Linux security software]]&lt;br /&gt;
&lt;br /&gt;
[[de:Dm-crypt#Erweiterung mit LUKS]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Citation bot</name></author>
	</entry>
</feed>