How Data Decryption Works
When you restore data from an encrypted backup file, Veeam Agent performs data decryption automatically in the background or requires you to provide a password.
- If encryption keys required to unlock the backup file are available in the Veeam Agent database, you do not need to enter the password. Veeam Agent uses keys from the database to unlock the backup file. Data decryption is performed in the background, and data restore does not differ from that from an unencrypted one.
Automatic data decryption can be performed when you encrypt and decrypt the backup file on the same Veeam Agent computer using the same Veeam Agent database.
- If encryption keys are not available in the Veeam Agent database, you need to provide a password to unlock the encrypted file.
Data decryption is performed at the source side, after data is transported back from the target side. As a result, encryption keys are not passed to the target side, which helps avoid data interception.
The decryption process includes the following steps. Keep in mind that steps 1 and 2 are required only if you decrypt the file on the Veeam Agent computer other than the computer where the file was encrypted.
- You select the backup from which you want to restore data. Veeam Agent notifies you that one or more files in the backup chain are encrypted and requires a password.
- You specify a password for the imported file. If the password has changed once or several times, you need to specify the latest password. In Veeam Agent, you can use the latest password to restore data form all restore points in the backup chain, including those restore points that were encrypted with an old password.
- Veeam Agent reads the entered password and generates the user key based on this password. With the user key available, Veeam Agent performs decryption in the following way:
- Veeam Agent applies the user key to decrypt the storage key.
- The storage key, in its turn, unlocks underlying session keys and a metakey.
- Session keys decrypt data blocks in the encrypted file.
After the encrypted file is unlocked, you can work with it as usual.