Top Banner

Click here to load reader

TrueCrypt User Guide

Nov 21, 2014

ReportDownload

Documents

d3l4croix

TRUECRYPTFREE OPEN-SOURCE ON-THE-FLY ENCRYPTION

USERS GUIDEwww.truecrypt.org

Version Information TrueCrypt Users Guide, version 6.1a. Released December 1, 2008.

Licensing Information By installing, running, using, copying, (re)distributing, and/or modifying TrueCrypt or a portion thereof you accept all terms, responsibilities and obligations contained in the TrueCrypt License the full text of which is contained in the file License.txt included in TrueCrypt binary and source code distribution packages.

Copyright Information This software as a whole: Copyright 2008 TrueCrypt Foundation. All rights reserved. Portions of this software: Copyright 2003-2008 TrueCrypt Foundation. All rights reserved. Copyright 1998-2000 Paul Le Roux. All rights reserved. Copyright 1998-2008 Brian Gladman, Worcester, UK. All rights reserved. Copyright 2002-2004 Mark Adler. All rights reserved. For more information, please see the legal notices attached to parts of the source code.

Trademark Information TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation. Note: The goal is not to monetize the name or the product, but to protect the reputation of TrueCrypt, and to prevent support issues and other kinds of issues that might arise from the existence of similar products with the same or similar name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain open-source and free software. Any other trademarks are the sole property of their respective owners.

Limitations The TrueCrypt Foundation does not warrant that the information contained in this document meets your requirements or that it is free of errors.

CONTENTSINTRODUCTION..............................................................................................................................6 BEGINNERS TUTORIAL ..............................................................................................................7 How to Create and Use a TrueCrypt Container .......................................................................7 How to Create and Use a TrueCrypt Partition/Device...........................................................25 PLAUSIBLE DENIABILITY .........................................................................................................26 HIDDEN VOLUME ............................................................................................................................27 Protection of Hidden Volumes Against Damage...................................................................29 Security Precautions Pertaining to Hidden Volumes.............................................................32 HIDDEN OPERATING SYSTEM ..........................................................................................................35 Process of Creation of Hidden Operating System ................................................................. 36 Plausible Deniability and Data Leak Protection .................................................................... 38 Possible Explanations for Existence of Two TrueCrypt Partitions on Single Drive ............. 38 Safety and Security Precautions Pertaining to Hidden Operating Systems........................... 40 SYSTEM ENCRYPTION ...............................................................................................................41 Operating Systems Supported for System Encryption...........................................................41 TrueCrypt Rescue Disk..........................................................................................................42 Hidden Operating System ......................................................................................................43 TRUECRYPT VOLUME................................................................................................................44 CREATING A NEW TRUECRYPT VOLUME ........................................................................................44 Hash Algorithm...................................................................................................................... 44 Encryption Algorithm ............................................................................................................ 44 Quick Format ......................................................................................................................... 45 Dynamic................................................................................................................................. 45 Cluster Size ............................................................................................................................ 45 TrueCrypt Volumes on CDs and DVDs ................................................................................ 45 Hardware/Software RAID, Windows Dynamic Volumes ..................................................... 46 Additional Notes on Volume Creation .................................................................................. 46 MAIN PROGRAM WINDOW .......................................................................................................47 Select File .............................................................................................................................. 47 Select Device ......................................................................................................................... 47 Mount..................................................................................................................................... 47 Auto-Mount Devices.............................................................................................................. 47 Dismount................................................................................................................................ 48 Dismount All.......................................................................................................................... 48 Wipe Cache............................................................................................................................ 48 Never Save History................................................................................................................ 48 Exit......................................................................................................................................... 48 Volume Tools ........................................................................................................................ 49 PROGRAM MENU.............................................................................................................................50 Volumes -> Auto-Mount All Device-Hosted Volumes .........................................................50 Volumes -> Save Currently Mounted Volumes as Favorite ..................................................50

TrueCrypt Users Guide. Copyright 2003-2008 TrueCrypt Foundation. All rights reserved. 2

Volumes -> Mount Favorite Volumes ...................................................................................50 Volumes -> Set Header Key Derivation Algorithm ..............................................................50 Volumes -> Change Volume Password .................................................................................51 System -> Change Password..................................................................................................51 System -> Mount Without Pre-Boot Authentication .............................................................51 Tools -> Clear Volume History .............................................................................................52 Tools -> Traveler Disk Setup.................................................................................................52 Tools -> Keyfile Generator ....................................................................................................52 Tools -> Backup Volume Header ..........................................................................................52 Tools -> Restore Volume Header ..........................................................................................52 Settings -> Preferences ..........................................................................................................53 MOUNTING TRUECRYPT VOLUMES.................................................................................................55 Cache Password in Driver Memory .......................................................................................55 Mount Options .......................................................................................................................55 HOT KEYS.......................................................................................................................................56 KEYFILES .......................................................................................................................................56 Keyfiles Dialog Window .......................................................................................................57 Security Tokens and Smart Cards..........................................................................................57 Keyfile Search Path................................................................................................................58 Empty Password & Keyfile....................................................................................................58 Quick Selection ......................................................................................................................58 Keyfiles -> Add/Remove Keyfiles to/from Volume..............................................................59 Keyfiles -> Remove All Keyfiles from Volume....................................................................59 Keyfile