Truecrypt User Guide
Total Page:16
File Type:pdf, Size:1020Kb
TRUECRYPT F R E E O P E N - S O U R C E O N - T H E - F L Y E N C R Y P T I O N USER’S GUIDE www.truecrypt.org Version Information TrueCrypt User’s Guide, version 5.1a. Released March 17, 2008. Licensing Information By installing, running, using, copying, (re)distributing, and/or modifying TrueCrypt or a portion thereof you accept all terms, responsibilities and obligations contained in the TrueCrypt License the full text of which is contained in the file License.txt included in TrueCrypt binary and source code distribution packages. Copyright Information This software as a whole: Copyright © 2008 TrueCrypt Foundation. All rights reserved. Portions of this software: Copyright © 2003-2008 TrueCrypt Foundation. All rights reserved. Copyright © 1998-2000 Paul Le Roux. All rights reserved. Copyright © 1998-2008 Brian Gladman, Worcester, UK. All rights reserved. Copyright © 1995-1997 Eric Young. All rights reserved. Copyright © 2001 Markus Friedl. All rights reserved. Copyright © 2002-2004 Mark Adler. All rights reserved. For more information, please see the legal notices attached to parts of the source code. Trademark Information TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation. Note: The goal is not to monetize the name or the product, but to protect the reputation of TrueCrypt, and to prevent support issues and other kinds of issues that might arise from the existence of similar products with the same or similar name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain open-source and free software. All other trademarks are the sole property of their respective owners. Limitations The TrueCrypt Foundation does not warrant that the information contained in this document meets your requirements or that it is free of errors. CONTENTS INTRODUCTION..............................................................................................................................5 BEGINNER’S TUTORIAL ..............................................................................................................6 How to Create and Use a TrueCrypt Container .......................................................................6 How to Create and Use a TrueCrypt Partition/Device...........................................................24 PLAUSIBLE DENIABILITY .........................................................................................................25 HIDDEN VOLUME ............................................................................................................................26 Protection of Hidden Volumes Against Damage...................................................................28 Security Precautions Pertaining to Hidden Volumes.............................................................31 SYSTEM ENCRYPTION ...............................................................................................................33 Operating Systems Supported for System Encryption...........................................................33 TrueCrypt Rescue Disk..........................................................................................................34 TRUECRYPT VOLUME................................................................................................................36 CREATING A NEW TRUECRYPT VOLUME ........................................................................................36 Hash Algorithm...................................................................................................................... 36 Encryption Algorithm............................................................................................................36 Quick Format ......................................................................................................................... 37 Dynamic................................................................................................................................. 37 Cluster Size............................................................................................................................ 37 TrueCrypt Volumes on CDs and DVDs ................................................................................ 37 Hardware/Software RAID, Windows Dynamic Volumes..................................................... 38 Additional Notes on Volume Creation .................................................................................. 38 MAIN PROGRAM WINDOW.......................................................................................................39 Select File .............................................................................................................................. 39 Select Device ......................................................................................................................... 39 Mount..................................................................................................................................... 39 Auto-Mount Devices..............................................................................................................39 Dismount................................................................................................................................ 40 Dismount All.......................................................................................................................... 40 Wipe Cache............................................................................................................................ 40 Never Save History................................................................................................................ 40 Exit......................................................................................................................................... 40 Volume Tools ........................................................................................................................ 41 PROGRAM MENU.............................................................................................................................42 Volumes -> Auto-Mount All Device-Hosted Volumes .........................................................42 Volumes -> Save Currently Mounted Volumes as Favorite..................................................42 Volumes -> Mount Favorite Volumes ...................................................................................42 Volumes -> Set Header Key Derivation Algorithm ..............................................................42 Volumes -> Change Volume Password .................................................................................43 System -> Change Password..................................................................................................45 System -> Mount Without Pre-Boot Authentication .............................................................46 Tools -> Clear Volume History .............................................................................................46 TrueCrypt User’s Guide. Copyright © 2003-2008 TrueCrypt Foundation. All rights reserved. 2 Tools -> Traveler Disk Setup.................................................................................................46 Tools -> Keyfile Generator....................................................................................................46 Tools -> Backup Volume Header ..........................................................................................46 Tools -> Restore Volume Header ..........................................................................................47 Settings -> Preferences ..........................................................................................................47 MOUNTING TRUECRYPT VOLUMES.................................................................................................50 Cache Password in Driver Memory.......................................................................................50 Mount Options .......................................................................................................................50 HOT KEYS.......................................................................................................................................52 KEYFILES .......................................................................................................................................52 Keyfiles Dialog Window .......................................................................................................53 Keyfile Search Path................................................................................................................53 Empty Password & Keyfile....................................................................................................54 Keyfiles -> Add/Remove Keyfiles to/from Volume..............................................................54 Keyfiles -> Remove All Keyfiles from Volume....................................................................55 Keyfiles -> Generate Random Keyfile ..................................................................................56 Keyfiles -> Set Default Keyfile/Paths....................................................................................56 TRAVELER MODE........................................................................................................................57 Tools -> Traveler Disk Setup.................................................................................................57 USING TRUECRYPT WITHOUT ADMINISTRATOR