The recovery password for Windows BitLocker isn't available when FIPS compliant policy is set in Windows
This article discusses the issues that occur because the recovery password for Windows BitLocker isn't FIPS-compliant in Windows.
Applies to: Windows 7 Service Pack 1, Windows Server 2012 R2
Original KB number: 947249
The key derivation algorithm used with the recovery password for Windows BitLocker Drive Encryption isn't Federal Information Processing Standards (FIPS)-compliant in Windows. Therefore, you may encounter the following issues when the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Group Policy setting is enabled.
When you manually add a recovery password at a command prompt, you receive the following error message:
The numerical password was not added. The FIPS Group Policy setting on the computer prevents recovery password creation.
When you try to encrypt a drive on which BitLocker recovery passwords are required, you can't encrypt the drive as expected. Additionally, you receive the following error message:
Cannot Encrypt Disk. Policy requires a password which is not allowed with the current security policy about use of FIPS algorithms.
When you encrypt a drive, a recovery key is created, but no recovery password is created as a key protector.
A recovery password isn't archived in the Active Directory directory service.
A BitLocker recovery password has 48 digits. This password is used in a key derivation algorithm that isn't FIPS-compliant. Therefore, if you enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Group Policy setting, you can't create or unlock a drive by using a recovery password. In contrast, a BitLocker recovery key is an AES key that doesn't require a key derivation algorithm to be performed upon it and is FIPS-compliant. Therefore, a recovery key isn't affected by this Group Policy setting.
To disable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Group Policy setting, follow these steps:
Click Start, type gpedit.msc in the Start Search box, and then click OK.
If you are prompted for an administrator password or for confirmation, type the password, or provide confirmation.
Expand Computer Configuration, expand Windows Settings, expand Security Settings, expand Local Policies, and then click Security Options.
In the details pane, double-click System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing, click Disable, and then, click OK.
This Group Policy setting may be configured by an administrator to be automatically applied from a domain controller. In this situation, you can't disable this setting locally.