TrueCrypt User Guide.pdf
(
675 KB
)
Pobierz
TrueCrypt User Guide
TRUECRYPT
F R E E O P E N - S O U R C E O N - T H E - F L Y E N C R Y P T I O N
USER’S GUIDE
www.truecrypt.org
Version Information
TrueCrypt User’s Guide, version 4.3a. Released May 3, 2007.
Licensing Information
By installing and/or running and/or using TrueCrypt you agree to the license contained in the file
License.txt
,
which is included in TrueCrypt binary and source code distribution packages.
Copyright Information
Portions of this software are:
Copyright © 2003-2007 TrueCrypt Foundation. All rights reserved.
Copyright © 1998-2000 Paul Le Roux. All rights reserved.
Copyright © 1999-2005 Dr. Brian Gladman, Worcester, UK. All rights reserved.
Copyright © 1995-1997 Eric Young. All rights reserved.
Copyright © 2001 Markus Friedl. All rights reserved.
For more information, please see the legal notices attached to parts of the source code.
Graphics (logos, icons, etc.) are copyright © 2003-2007 TrueCrypt Foundation.
A TrueCrypt Foundation Release
Trademark Information
TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation.
Note: The goal is not to monetize the name or the product, but to protect the reputation of TrueCrypt, and to
prevent support issues and other kinds of issues that might arise from the existence of similar products with
the same or similar name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain open-source
and free software.
All other trademarks are the sole property of their respective owners.
Limitations
The TrueCrypt Foundation does not warrant that the information contained in this document meets your
requirements or that the information is free of errors. The information may include technical inaccuracies or
typographical errors.
CONTENTS
INTRODUCTION.............................................................................................................................. 5
BEGINNER’S TUTORIAL .............................................................................................................. 6
How to Create and Use a TrueCrypt Container ....................................................................... 6
How to Create and Use a TrueCrypt Partition/Device........................................................... 23
PLAUSIBLE DENIABILITY ......................................................................................................... 24
H
IDDEN
V
OLUME
............................................................................................................................ 25
Protection of Hidden Volumes Against Damage ................................................................... 27
Security Precautions Pertaining to Hidden Volumes ............................................................. 30
TRUECRYPT VOLUME................................................................................................................31
C
REATING A
N
EW
T
RUE
C
RYPT
V
OLUME
........................................................................................ 31
Hash Algorithm...................................................................................................................... 31
Encryption Algorithm ............................................................................................................ 31
Quick Format ......................................................................................................................... 32
Dynamic................................................................................................................................. 32
Cluster Size ............................................................................................................................ 32
TrueCrypt Volumes on CDs and DVDs ................................................................................ 32
Hardware/Software RAID, Windows Dynamic Volumes ..................................................... 33
Additional Notes on Volume Creation .................................................................................. 33
MAIN PROGRAM WINDOW ....................................................................................................... 34
Select File .............................................................................................................................. 34
Select Device ......................................................................................................................... 34
Mount..................................................................................................................................... 34
Auto-Mount Devices.............................................................................................................. 34
Dismount................................................................................................................................ 35
Dismount All.......................................................................................................................... 35
Wipe Cache............................................................................................................................ 35
Never Save History ................................................................................................................ 35
Exit......................................................................................................................................... 35
Volume Tools ........................................................................................................................ 36
P
ROGRAM
M
ENU
............................................................................................................................. 37
File -> Exit ............................................................................................................................. 37
Volumes -> Auto-Mount All Device-Hosted Volumes ......................................................... 37
Volumes -> Save Currently Mounted Volumes as Favorite .................................................. 37
Volumes -> Mount Favorite Volumes ................................................................................... 37
Volumes -> Set Header Key Derivation Algorithm .............................................................. 38
Volumes -> Change Volume Password ................................................................................. 38
Tools -> Clear Volume History ............................................................................................. 38
Tools -> Traveller Disk Setup................................................................................................ 38
Tools -> Keyfile Generator .................................................................................................... 39
Tools -> Backup Volume Header .......................................................................................... 39
Tools -> Restore Volume Header .......................................................................................... 39
Settings -> Preferences .......................................................................................................... 40
TrueCrypt User’s Guide
. Copyright © 2003-2007 TrueCrypt Foundation. All rights reserved.
2
M
OUNTING
T
RUE
C
RYPT
V
OLUMES
................................................................................................. 41
Cache Password in Driver Memory ....................................................................................... 41
Mount Options ....................................................................................................................... 41
HOT KEYS....................................................................................................................................... 42
KEYFILES ....................................................................................................................................... 42
Keyfiles Dialog Window ....................................................................................................... 43
Keyfile Search Path................................................................................................................ 43
Empty Password & Keyfile.................................................................................................... 44
Keyfiles -> Add/Remove Keyfiles to/from Volume.............................................................. 44
Keyfiles -> Remove All Keyfiles from Volume.................................................................... 44
Keyfiles -> Generate Random Keyfile .................................................................................. 44
Keyfiles -> Set Default Keyfile/Paths.................................................................................... 45
TRAVELLER MODE ..................................................................................................................... 46
Tools -> Traveller Disk Setup................................................................................................ 46
USING TRUECRYPT WITHOUT ADMINISTRATOR PRIVILEGES .................................. 47
TRUECRYPT BACKGROUND TASK ........................................................................................ 47
LANGUAGE PACKS ...................................................................................................................... 48
Installation ............................................................................................................................. 48
ENCRYPTION ALGORITHMS.................................................................................................... 49
AES ........................................................................................................................................ 49
Serpent ................................................................................................................................... 50
Twofish .................................................................................................................................. 50
AES-Twofish ......................................................................................................................... 50
AES-Twofish-Serpent............................................................................................................ 51
Serpent-AES .......................................................................................................................... 51
Serpent-Twofish-AES............................................................................................................ 51
Twofish-Serpent..................................................................................................................... 51
HASH ALGORITHMS ................................................................................................................... 52
Whirlpool ............................................................................................................................... 52
SHA-1 .................................................................................................................................... 52
RIPEMD-160 ......................................................................................................................... 52
SUPPORTED OPERATING SYSTEMS....................................................................................... 53
COMMAND LINE USAGE............................................................................................................ 54
Syntax .................................................................................................................................... 55
Examples................................................................................................................................ 56
SECURITY PRECAUTIONS ......................................................................................................... 57
Paging File ............................................................................................................................. 57
Hibernation Mode .................................................................................................................. 57
Memory Dump Files .............................................................................................................. 57
Multi-User Environment........................................................................................................ 58
Unencrypted Data in RAM .................................................................................................... 58
TrueCrypt User’s Guide
. Copyright © 2003-2007 TrueCrypt Foundation. All rights reserved.
3
Changing Passwords and Keyfiles......................................................................................... 58
Secondary Key ....................................................................................................................... 59
Windows Registry.................................................................................................................. 59
Data Corruption ..................................................................................................................... 59
Wear-Leveling ....................................................................................................................... 59
Defragmenting ....................................................................................................................... 60
Journaling File Systems ......................................................................................................... 60
TROUBLESHOOTING .................................................................................................................. 61
INCOMPATIBILITIES .................................................................................................................. 65
KNOWN ISSUES & LIMITATIONS ............................................................................................ 65
FREQUENTLY ASKED QUESTIONS......................................................................................... 66
HOW TO REMOVE ENCRYPTION............................................................................................ 76
UNINSTALLING TRUECRYPT................................................................................................... 77
TRUECRYPT SYSTEM FILES & APPLICATION DATA ....................................................... 77
TECHNICAL DETAILS ................................................................................................................. 78
N
OTATION
....................................................................................................................................... 78
E
NCRYPTION
S
CHEME
..................................................................................................................... 79
M
ODES OF
O
PERATION
.................................................................................................................... 80
H
EADER
K
EY
D
ERIVATION
, S
ALT
,
AND
I
TERATION
C
OUNT
............................................................ 81
R
ANDOM
N
UMBER
G
ENERATOR
..................................................................................................... 82
K
EYFILES
........................................................................................................................................ 83
T
RUE
C
RYPT
V
OLUME
F
ORMAT
S
PECIFICATION
.............................................................................. 85
C
OMPLIANCE WITH
S
TANDARDS AND
S
PECIFICATIONS
................................................................... 87
S
OURCE
C
ODE
................................................................................................................................. 87
FUTURE DEVELOPMENT........................................................................................................... 88
LICENSE .......................................................................................................................................... 88
CONTACT........................................................................................................................................ 88
VERSION HISTORY ...................................................................................................................... 89
ACKNOWLEDGEMENTS............................................................................................................. 90
REFERENCES................................................................................................................................. 91
TrueCrypt User’s Guide
. Copyright © 2003-2007 TrueCrypt Foundation. All rights reserved.
4
PREFACE
Please note that although many chapters of this document (such as
Technical Details
and
Plausible Deniability
) apply generally to all versions of TrueCrypt, some sections are primarily
aimed at users of the Windows versions of TrueCrypt. Hence, such sections may contain
information that is inappropriate in regards to the Linux versions of TrueCrypt. Linux-specific
features are described in the TrueCrypt man page, which is included in the TrueCrypt binary and
source code distribution packages, which are available at:
http://www.truecrypt.org/downloads.php
.
Introduction
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume
(data storage device). On-the-fly encryption means that data are automatically encrypted or
decrypted right before they are loaded or saved, without any user intervention.
No
data stored on
an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or
correct encryption keys. Entire file system is encrypted (e.g.., file names, folder names, contents of
every file, free space, meta data, etc).
Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any
normal disk (for example, by simple drag-and-drop operations). Files are automatically being
decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted
TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are
automatically being encrypted on-the-fly (right before they are written to the disk) in RAM. Note that
this does
not
mean that the
whole
file that is to be encrypted/decrypted must be stored in RAM
before it can be encrypted/decrypted. The are no extra memory (RAM) requirements for TrueCrypt.
For an illustration of how this is accomplished, see the following paragraph.
Let's suppose that there is an .avi video file stored on a TrueCrypt volume (therefore, the video file
is entirely encrypted). The user provides the correct password (and/or keyfile) and mounts (opens)
the TrueCrypt volume. When the user double clicks the icon of the video file, the operating system
launches the application associated with the file type – typically a media player. The media player
then begins loading a small initial portion of the video file from the TrueCrypt-encrypted volume to
RAM (memory) in order to play it. While the portion is being loaded, TrueCrypt is automatically
decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the
media player. While this portion is being played, the media player begins loading next small portion
of the video file from the TrueCrypt-encrypted volume to RAM (memory) and the process repeats.
This process is called on-the-fly encryption/decryption and it works for all file types, not only for
video files.
Note that TrueCrypt never saves any decrypted data to a disk – it only stores them temporarily in
RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted.
When you restart Windows or turn off your computer, the volume will be dismounted and files
stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted
(without proper system shut down), files stored in the volume are inaccessible (and encrypted). To
make them accessible again, you have to mount the volume (and provide the correct password
and/or keyfile).
TrueCrypt User’s Guide
. Copyright © 2003-2007 TrueCrypt Foundation. All rights reserved.
5
Plik z chomika:
Kot_Maciek
Inne pliki z tego folderu:
License.txt
(24 KB)
TrueCrypt.exe
(814 KB)
TrueCrypt Format.exe
(887 KB)
TrueCrypt User Guide.pdf
(675 KB)
truecrypt-x64.sys
(193 KB)
Inne foldery tego chomika:
Zgłoś jeśli
naruszono regulamin