World Library  
Flag as Inappropriate
Email this Article


Article Id: WHEBN0000466854
Reproduction Date:

Title: FileVault  
Author: World Heritage Encyclopedia
Language: English
Subject: Comparison of disk encryption software, OS X, Cryptographic software, Mac OS X Lion, Keychain (software)
Collection: Cryptographic Software, Disk Encryption, Os X
Publisher: World Heritage Encyclopedia


FileVault in the System Preferences under Security.
Developer(s) Apple Inc.
Initial release October 24, 2003
Operating system OS X
Type Disk encryption software
License Proprietary

FileVault is a method of using encryption with volumes on Mac computers. Encryption and decryption are performed on the fly.


  • Versions and key features 1
  • FileVault 2
    • Master passwords and recovery keys 2.1
    • Migration 2.2
    • Manual encryption 2.3
    • Limitations and issues 2.4
      • Backups 2.4.1
      • Issues 2.4.2
  • FileVault 2 3
    • Security 3.1
    • Performance 3.2
    • Master passwords and recovery keys 3.3
    • Validation 3.4
  • Starting the OS with FileVault 2 without a user account 4
  • See also 5
  • References 6

Versions and key features

FileVault was introduced with Mac OS X Panther (10.3),[1] and could only be applied to a user's home directory, not the startup volume. The operating system uses an encrypted sparse disk image (a large single file) to present a volume for the home directory. Mac OS X Leopard and Mac OS X Snow Leopard use more modern sparse bundle disk images[2] which spread the data over 8 MB files (called bands) within a bundle.

OS X Lion and newer offer FileVault 2,[3] which is a significant redesign. This encrypts the entire OS X startup volume and typically includes the home directory, abandoning the disk image approach. For this approach to disk encryption, authorised users' information is loaded from a separate non-encrypted boot volume[4] (partition/slice type Apple_Boot).

Apple refers to the original iteration of FileVault as legacy FileVault.[3]


The original version of FileVault was added in OS X Panther to encrypt a user's home directory.

Master passwords and recovery keys

When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.


Migration of FileVault home directories is subject to two limitations:[5]

  • there must be no prior migration to the target computer
  • the target must have no existing user accounts.

If Migration Assistant has already been used or if there are user accounts on the target:

  • before migration, FileVault must be disabled at the source.

If transferring FileVault data from a previous Mac that uses 10.4 using the built-in utility to move data to a new machine, the data continues to be stored in the old sparse image format, and the user must turn FileVault off and then on again to re-encrypt in the new sparse bundle format.

Manual encryption

Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory, but is under the user's maintenance.

Encrypting only a part of a user's home directory might be problematic when applications need access to the encrypted files, which will not be available until the user mounts the encrypted image. This can be mitigated to a certain extent by making symbolic links for these specific files.

Limitations and issues


These limitations apply to versions of Mac OS X prior to v10.7 only.

Without Mac OS X Server, Time Machine will back up a FileVault home directory only while the user is logged out. In such cases, Time Machine is limited to backing up the home directory in its entirety. Using Mac OS X Server as a Time Machine destination, backups of FileVault home directories occur while users are logged in.

Because FileVault restricts the ways in which other users' processes can access the user's content, some third party backup solutions can back up the contents of a user's FileVault home directory only if other parts of the computer (including other users' home directories) are excluded.[6][7]


Several shortcomings were identified in Legacy FileVault. Its security can be broken by cracking either 1024-bit RSA or 3DES-EDE.

Legacy FileVault used the CBC mode of operation (see disk encryption theory); FileVault 2 uses stronger XTS-AESW mode. Another issue is storage of keys in the Mac OS X "safe sleep" mode.[8] A study published in 2008 found data remanence in dynamic random access memory (DRAM), with data retention of seconds to minutes at room temperature and much longer times when memory chips were cooled to low temperature. The study authors were able to use a cold boot attack to recover cryptographic keys for several popular disk encryption systems, including FileVault, by taking advantage of redundancy in the way keys are stored after they have been expanded for efficient use, such as in key scheduling. The authors recommend that computers be powered down, rather than be left in a "sleep" state, when not in physical control by the owner.[9]

Early versions of FileVault automatically stored the user's passphrase in the system keychain, requiring the user to notice and manually disable this security hole.

In 2006, following a talk at the 23rd Chaos Communication Congress titled Unlocking FileVault: An Analysis of Apple's Encrypted Disk Storage System, Jacob Appelbaum & Ralf-Philipp Weinmann released VileFault which decrypts encrypted Mac OS X disk image files.[10]

FileVault 2


FileVault uses the user's login password as the encryption pass phrase. It uses the AES-XTS mode of AES with 128 bit blocks and a 256 bit key to encrypt the disk, as recommended by NIST.[11][12] Only unlock-enabled users can start or unlock the drive. Once unlocked, other users may also use the computer until it is shut down.[3]


The I/O performance penalty for using Filevault 2 was found to be in the order of 20 – 30% when using CPUs with the AES instruction set, such as the Intel Core i.[13][14] Performance deterioration will be larger for CPUs without this instruction set, such as older Core CPUs.

Master passwords and recovery keys

When FileVault 2 is enabled while the system is running, the system creates and displays a recovery key for the computer, and optionally offers the user to store the key with Apple. The 120 bit recovery key is encoded with all letters and numbers 1 through 9, and read from /dev/random, and therefore relies on the security of the PRNG used in OS X. During a cryptanalysis in 2012, this mechanism was found safe.[15]

Changing the recovery key is not possible without re-encrypting the Filevault volume.[3]


Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.[16]

Starting the OS with FileVault 2 without a user account

If a volume to be used for startup is erased and encrypted before clean installation of OS X 10.7.4 or 10.8:

  • there is a password for the volume
  • the clean system will immediately behave as if FileVault was enabled after installation
  • there is no recovery key, no option to store the key with Apple (but the system will behave as if a key was created)
  • when the computer is started, Disk Password will appear at the EfiLoginUI – this may be used to unlock the volume and start the system
  • the running system will present the traditional login window.

Apple describes this type of approach as Disk Password—based DEK.[11]

See also


  1. ^ """Apple Previews Mac OS X "Panther. Apple Press Info. Apple. June 23, 2003. Retrieved January 21, 2013. 
  2. ^ ScottW (November 5, 2007). "Live FileVault and Sparse Bundle Backups in Leopard". Retrieved January 21, 2013. 
  3. ^ a b c d Apple Inc (August 9, 2012). "OS X: About FileVault 2". Apple Inc. Retrieved September 5, 2012. 
  4. ^ Apple Inc (August 17, 2012). "Best Practices for Deploying FileVault 2" (Portable Document Format). Apple Inc. p. 40. Retrieved September 5, 2012. 
  5. ^ "Archived - Mac OS X 10.3, 10.4: Transferring data with Setup Assistant / Migration Assistant FAQ". Apple support. Apple. Retrieved January 21, 2013. 
  6. ^ "Using Encrypted Disks". CrashPlan PROe support. CrashPlan PROe. Retrieved January 21, 2013. 
  7. ^ "Using CrashPlan with FileVault". CrashPlan support. CrashPlan. Retrieved January 21, 2013. 
  8. ^  
  9. ^ J. Alex Halderman; et al. (February 2008). "Lest We Remember: Cold Boot Attacks on Encryption Keys" (PDF). 
  10. ^ "Unlocking FileVault: An analysis of Apple's disk encryption system" (PDF). 
  11. ^ a b Apple, Inc (August 17, 2012). "Best Practices for Deploying FileVault 2" (Portable Document Format). Apple, Inc. p. 28. Retrieved September 5, 2012. 
  12. ^ Dworkin, Morris (January 2010). "Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices" (PDF). NIST Special Publication (800-3E). 
  13. ^ Andrew Cunningham, Kristian Vättö & Anand Lal Shimpi (July 20, 2011). "Back to the Mac: OS X 10.7 Lion Review".  
  14. ^ "FileVault 2 Benchmarks Show Full Disk Encryption is Faster Than Ever in OS X Lion".  
  15. ^ Choudary, Omar; Felix Grobert; Joachim Metz (July 2012). "Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption". Retrieved January 19, 2013. 
  16. ^ "fdesetup(8) Mac OS X Manual Page".  
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.