A BestCrypt original container file consists of three parts:
When mounting the original container, BestCrypt verifies its integrity using part 1 of the container. Then it calculates a hash according to the password and uses the hash for decrypting the encryption key from the Key Data Block. BestCrypt uses the key for providing transparent encryption of the data in part 3 of the container.
If you create a hidden part inside the container, BestCrypt creates a new encryption key for the hidden part and stores it in the Key Data Block of the original container. The place where the key for the hidden part is stored appears to be marked as unused, to make it impossible to determine whether any key for a hidden part exists or not. Remember, spare disk space within the container is itself encrypted as random data, so replacing some random data with a new randomly generated key does not compromise the hidden part, because an examination will reveal only apparently random data.
The hidden part is stored inside part 3 of the original container without its own Key Data Block, so that it is impossible to define the borders of the hidden part inside the original container.
The mounting procedure for the container with the hidden part included is the same as for mounting a normal container.
When mounting the container, after having received a password, BestCrypt executes the following actions:
NOTE:Pay attention to this message: if it does not appear, the hidden part is not mounted!