TrueCrypt

From Wikipedia, the free encyclopedia

TrueCrypt
Image:TrueCrypt Logo.gif

TrueCrypt on Windows Vista
Developed by TrueCrypt Foundation
Latest release 5.1a / March 17, 2008 (2008-03-17); 87 days ago
Written in C, C++, Assembly
OS Cross-platform
Available in 29 languages
Genre Disk encryption software
License TrueCrypt Collective License
Website www.truecrypt.org

TrueCrypt is a software application used for on-the-fly encryption. It can create a virtual encrypted disk in a file (container), which can be mounted as if it were a real disk. TrueCrypt also supports device-hosted volumes, which can be created on either an individual partition or an entire disk. As of version 5.0, it can encrypt the Windows boot partition or entire boot drive. It is distributed under the TrueCrypt Collective License. TrueCrypt is available for Microsoft Windows, Mac OS X, and Linux.

Contents

[edit] Encryption algorithms

The ciphers supported by TrueCrypt are AES, Serpent and Twofish. It also allows different combinations of cascaded ciphers (ie AES+Twofish, Serpent+AES, or AES+Twofish+Serpent). Since version 5.1, TrueCrypt has been using an Assembly implementation of the AES-encryption, which almost doubles performance compared to the previously used C-implementation..[1]


The cryptographic hash functions used by TrueCrypt are RIPEMD-160, SHA-512, and Whirlpool.

[edit] Modes of operation

Since version 5.0 all encryption algorithms use the XTS mode of operation. Prior to this TrueCrypt used LRW which is less secure, though more secure than CBC mode (when used with predictable initialization vectors),[2] which v4.0 used. From version 5.0, newly created volumes can only be encrypted in XTS mode; however, CBC and LRW mode volumes created by previous versions of TrueCrypt can still be mounted.[3]

[edit] Performance

Example Performance
Example Performance

Using TrueCrypt on a drive may decrease performance. Depending on factors including processor speed, this may be readily noticeable. TrueCrypt comes with a benchmark utility that will tell you encryption speed (in memory, not factoring hard drive speed).

To the right is an example of performance attained using TrueCrypt 5.1a on a laptop. The red line is the control, disk performance before encryption. The blue line is disk performance after full system disk encryption using AES and RIPEMD-160. The test system was running a 1400 MHz Pentium M and the disk was a 7200 rpm ATA6 drive.[citation needed]

[edit] Planned features

According to the TrueCrypt website[4] the following features are planned for future releases:

  • Parallelized encryption/decryption
  • Plausible deniability for system encryption
  • Ability to create hidden volumes on Mac OS X and Linux
  • Support for external authentication modules (cryptographic tokens)
  • 'Raw' CD/DVD volumes.

[edit] History

[edit] Encryption for the Masses

TrueCrypt is based on Encryption for the Masses (E4M), a popular open source OTFE program first released in 1997. However, it was discontinued in 2000 as the author, Paul Le Roux, began working on commercial On-the-fly encryption (OTFE) software (DriveCrypt).

[edit] Release history

Version Release date Significant changes
1.0 February 2, 2004 Initial release. Featured support for Windows 98, ME, 2000 and XP.
1.0a February 3, 2004 New release due to licensing issues; support for Windows 98 and ME removed because the author of the Windows 9x driver for E4M (the ScramDisk driver) gave no permission that would allow his code to be used in projects derived from E4M.[5]
2.0 June 7, 2004 Release made under the GNU General Public License, and signed as the TrueCrypt Foundation – previous versions were signed by TrueCrypt Team.
2.1 June 21, 2004 New release due to licencing issues relating to the GNU General Public License. This release was made under original E4M license.[6]
2.1a October 1, 2004 Version released on SourceForge.net, which became the official TrueCrypt domain. The official TrueCrypt domain moved back to truecrypt.org again at the beginning of May 2005, and the SourceForge website redirects to there.
3.0 December 10, 2004
3.0a December 11, 2004 Bugfixes
3.1 January 22, 2005
3.1a February 7, 2005 Bugfixes
4.0 January 22, 2005 Addition of support for Linux, x86-64, Big Endian machines, Keyfiles (two-factor authentication), the Whirlpool hash algorithm and language packs.
4.1 November 25, 2005 Addition LRW mode, which is more secure than CBC mode for on-the-fly storage encryption.[2] LRW mode also neutralized an exploit that could (under certain circumstances) be used to compromise the plausible deniability of a TrueCrypt volume by allowing it to be distinguished from random data.[3]
4.2 April 17, 2006 Addition of various features to the Linux version, such as the ability to create volumes, change passwords and keyfiles, generate keyfiles and backup/restore volume headers. In the Windows version, it introduced support for dynamic (sparse file) volumes.
4.2a July 3, 2006 Bugfixes
4.3 March 19, 2007 Addition of support for Windows Vista, support for file systems using sector sizes other than 512 bytes, and several other feature improvements and bugfixes. Note: Vista's defragmentation utility, as well as third party defragmenters like Diskeeper, are unable to defragment TrueCrypt volumes with this release.
4.3a May 3, 2007 Bugfixes
5.0 February 5, 2008 Addition of Mac OS X support, GNU/Linux graphical interface and Windows system disk encryption with pre-boot authentication, ability of creation of hidden volumes within NTFS volumes, but removed the ability to create hidden volumes on Linux, use the tool on a non-gui console and the ability to create encrypted partitions from the text mode. Encrypting the system volume for Windows 2000 is no longer supported.[7] Encrypting containers and non-system volumes is still supported, however.[8]
5.0a February 12, 2008 Bugfixes
5.1 March 10, 2008 Addition of support for hibernation on Windows computers where the system partition is encrypted, the ability to mount a partition in Windows that is within the key scope of system encryption without pre-boot authentication, and added command line options for creating new volumes in Linux & Mac OS X. This version also reduced the minimum memory requirements for the TrueCrypt Boot Loader (AES) from 42 KB to 27 KB in Windows and included significant improvements in AES encryption/decryption performance.
5.1a March 17, 2008 Bugfixes

[edit] References

  1. ^ Version History Part 1. TrueCrypt Documentation. TrueCrypt Foundation. Retrieved on 2008-06-04.
  2. ^ a b Fruhwirth, Clemens (2005-07-18). New Methods in Hard Disk Encryption (PDF). Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology. Retrieved on 2007-03-10.
  3. ^ a b Version History. TrueCrypt Documentation. TrueCrypt Foundation. Retrieved on 2007-03-10.
  4. ^ Features to be implemented in future versions
  5. ^ The authors of Scramdisk and E4M exchanged some code – the author of Scramdisk provided a driver for Windows 9x, and the author of E4M provided a driver for Windows NT, enabling cross-platform versions of both programs.
  6. ^ TrueCrypt User's Guide (PDF). TrueCrypt Version 3.1a. TrueCrypt Foundation (2005-02-07). Retrieved on 2007-05-01.
  7. ^ http://www.truecrypt.org/docs/sys-encryption-supported-os.php
  8. ^ http://www.truecrypt.org/docs/supported-operating-systems.php

[edit] See also

[edit] External links