A famous program that was the de-facto standard for open-source disk encryption for many years. It was discontinued on 28 may 2014. TrueCrypt has undergone some security audits which haven't found severe security issues within the source code.
Questions tagged [truecrypt]
14 questions
17
votes
1 answer
Is TrueCrypt's multiple/cascading encryption safe?
Is TrueCrypt use of cascading encryption safe? Is it useful? TrueCrypt is arguably one of the most popular and widely used encryption applications in use today, yet it seems to use a very unconventional scheme.
The software offers cascading…
hunter
- 4,051
- 6
- 29
- 42
6
votes
1 answer
How can XTS be used to detect the presence of TrueCrypt hidden volumes?
According to a thread on the VeraCrypt discussion forum, and a single-post followup, it is possible to detect the presence of a hidden volume in certain conditions due to a flaw in the cryptography or the way it is used, rather than a flaw in the…
forest
- 15,626
- 2
- 49
- 103
5
votes
1 answer
Order of multiple encryption algorithms
as you can see on image above, in VeraCrypt you can select either
Serpent -> Twofish -> AES
or
AES -> Twofish -> Serpent
what's the point of those permutations? is there any difference if I use
A -> B -> C
or
C -> B -> A
combination of…
encore leet
- 53
- 2
3
votes
1 answer
What's the safest TrueCrypt algorithm and hash?
I have an encrypted file container inside my NTFS pendrive. The root folder Write permission is blocked for everyone. A folder inside it has all permissions unblocked. The dummy file of TrueCrypt is inside the "full access" folder. It has a 64…
user32977
2
votes
2 answers
Just how insecure are VeraCrypt containers encrypted with short passwords?
When I create a VeraCrypt file container using the GUI, it displays a warning whenever I type in a password under a given number of characters. I was wondering just how insecure, in practical terms, such a method of encryption really is.
To give a…
chancellorofpaphos
- 135
- 1
- 4
2
votes
1 answer
Long Term Security of Truecrypt's hash function?
Does Truecrypt's hash function weaken the security of a chosen cipher cascade?
Considering I want to choose a cipher cascade of 3 ciphers for long term security (50+ years) for my archived data on blu-ray disk. Truecrypt allows me to choose only 1…
user3200534
- 175
- 4
2
votes
0 answers
Why was TrueCrypt Discontinued
I know this happened a long time ago, but I always wanted to ask this to a professional: Why was TrueCrypt Discontinued?
Is it related to this: FBI hackers fail to crack TrueCrypt?
And what is the best option, without backdoors, currently available?
Dmyan
- 121
- 3
2
votes
2 answers
How do disk encryption programs solve the "IV problem"?
I was reading a paper on the "elephant diffuser" used in BitLocker and it got me wondering how other systems (e.g. TrueCrypt before it shutdown) solved the problem the elephant diffuser was meant to solve; namely that there isn't enough space on a…
Jeff
- 263
- 2
- 8
1
vote
1 answer
Long term storage of encrypted data
Say that I have 16-32 GB of data, and I want to devise a system for storing this data in an encrypted form. This system needs to meet two core objectives:
The data needs to remain as pristine as possible for a very long time, which in this case…
chancellorofpaphos
- 135
- 1
- 4
1
vote
2 answers
HMAC-Ripemd-160 in TrueCrypt
I'm wondering if it is still secure.
I know TrueCrypt closed its doors but I continue using it because the cryptoaudit didn't find any huge bugs or security issues in TrueCrypt.
But I have a bad feeling about Brute Force and Ripemd-160. I've read…
user284148
- 121
- 1
1
vote
1 answer
How does the plausible deniability used by TrueCrypt work mathematically?
I have been unable to find any mathematical explanations on how TrueCrypt's plausible deniability encryption works, when using TC containers.
Would someone be able to provide a mathematical walkthrough of how it works?
Other encryption systems…
securityauditor
- 139
- 4
0
votes
1 answer
Why mounting/dismounting an encrypted file container takes only a few seconds?
When the encrypted file container contains 100000 files and 500 GB of data, all of them must be decrypted/encrypted when the container is mounted/dismounted.
How can Truecrypt/Veracrypt perform this within a few seconds?
treppenlift
- 103
- 2
0
votes
1 answer
Why is password recovery so slow for Whirlpool hash, when compared with others?
I'm just curious about why brute force takes so much longer on the Whirlpool hash than it does on the others, as you will see below:
Passcovery Suite Version 3.50 build 3653 x64
Benchmark
CPU [Intel(R) Core(TM) i3-5020U CPU @ 2.20GHz]
Type:…
bobby
- 1
- 1
0
votes
0 answers
Cryptanalysis and Copying encrypted volumes
I just recently concerned myself with cryptography due to Snowden's revelations and there are a few things I cannot really wrap my head around but maybe you can help me with that. I am not a mathematican or a programmer and most of the stuff I know…
RainerW
- 1