Questions tagged [truecrypt]

A famous program that was the de-facto standard for open-source disk encryption for many years. It was discontinued on 28 may 2014. TrueCrypt has undergone some security audits which haven't found severe security issues within the source code.

14 questions
17
votes
1 answer

Is TrueCrypt's multiple/cascading encryption safe?

Is TrueCrypt use of cascading encryption safe? Is it useful? TrueCrypt is arguably one of the most popular and widely used encryption applications in use today, yet it seems to use a very unconventional scheme. The software offers cascading…
hunter
  • 4,051
  • 6
  • 29
  • 42
6
votes
1 answer

How can XTS be used to detect the presence of TrueCrypt hidden volumes?

According to a thread on the VeraCrypt discussion forum, and a single-post followup, it is possible to detect the presence of a hidden volume in certain conditions due to a flaw in the cryptography or the way it is used, rather than a flaw in the…
forest
  • 15,626
  • 2
  • 49
  • 103
5
votes
1 answer

Order of multiple encryption algorithms

as you can see on image above, in VeraCrypt you can select either Serpent -> Twofish -> AES or AES -> Twofish -> Serpent what's the point of those permutations? is there any difference if I use A -> B -> C or C -> B -> A combination of…
3
votes
1 answer

What's the safest TrueCrypt algorithm and hash?

I have an encrypted file container inside my NTFS pendrive. The root folder Write permission is blocked for everyone. A folder inside it has all permissions unblocked. The dummy file of TrueCrypt is inside the "full access" folder. It has a 64…
user32977
2
votes
2 answers

Just how insecure are VeraCrypt containers encrypted with short passwords?

When I create a VeraCrypt file container using the GUI, it displays a warning whenever I type in a password under a given number of characters. I was wondering just how insecure, in practical terms, such a method of encryption really is. To give a…
2
votes
1 answer

Long Term Security of Truecrypt's hash function?

Does Truecrypt's hash function weaken the security of a chosen cipher cascade? Considering I want to choose a cipher cascade of 3 ciphers for long term security (50+ years) for my archived data on blu-ray disk. Truecrypt allows me to choose only 1…
user3200534
  • 175
  • 4
2
votes
0 answers

Why was TrueCrypt Discontinued

I know this happened a long time ago, but I always wanted to ask this to a professional: Why was TrueCrypt Discontinued? Is it related to this: FBI hackers fail to crack TrueCrypt? And what is the best option, without backdoors, currently available?
Dmyan
  • 121
  • 3
2
votes
2 answers

How do disk encryption programs solve the "IV problem"?

I was reading a paper on the "elephant diffuser" used in BitLocker and it got me wondering how other systems (e.g. TrueCrypt before it shutdown) solved the problem the elephant diffuser was meant to solve; namely that there isn't enough space on a…
Jeff
  • 263
  • 2
  • 8
1
vote
1 answer

Long term storage of encrypted data

Say that I have 16-32 GB of data, and I want to devise a system for storing this data in an encrypted form. This system needs to meet two core objectives: The data needs to remain as pristine as possible for a very long time, which in this case…
1
vote
2 answers

HMAC-Ripemd-160 in TrueCrypt

I'm wondering if it is still secure. I know TrueCrypt closed its doors but I continue using it because the cryptoaudit didn't find any huge bugs or security issues in TrueCrypt. But I have a bad feeling about Brute Force and Ripemd-160. I've read…
user284148
  • 121
  • 1
1
vote
1 answer

How does the plausible deniability used by TrueCrypt work mathematically?

I have been unable to find any mathematical explanations on how TrueCrypt's plausible deniability encryption works, when using TC containers. Would someone be able to provide a mathematical walkthrough of how it works? Other encryption systems…
0
votes
1 answer

Why mounting/dismounting an encrypted file container takes only a few seconds?

When the encrypted file container contains 100000 files and 500 GB of data, all of them must be decrypted/encrypted when the container is mounted/dismounted. How can Truecrypt/Veracrypt perform this within a few seconds?
treppenlift
  • 103
  • 2
0
votes
1 answer

Why is password recovery so slow for Whirlpool hash, when compared with others?

I'm just curious about why brute force takes so much longer on the Whirlpool hash than it does on the others, as you will see below: Passcovery Suite Version 3.50 build 3653 x64 Benchmark CPU [Intel(R) Core(TM) i3-5020U CPU @ 2.20GHz] Type:…
bobby
  • 1
  • 1
0
votes
0 answers

Cryptanalysis and Copying encrypted volumes

I just recently concerned myself with cryptography due to Snowden's revelations and there are a few things I cannot really wrap my head around but maybe you can help me with that. I am not a mathematican or a programmer and most of the stuff I know…