Truecrypt 4.0 update

Discussion in 'privacy technology' started by devilsadvocate, Nov 3, 2005.

Thread Status:
Not open for further replies.
  1. TrueCrypt

    Free open-source disk encryption software for
    Windows XP/2000/2003 and Linux

    Main Features:
    --It can create a virtual encrypted disk within a file and mount
    it as a real disk.
    --It can encrypt an entire hard disk partition or a device,
    such as USB memory stick, floppy disk, etc.
    --Provides two levels of plausible deniability, in case an adversary
    forces you to reveal the password:
    1) Hidden volume (more information may be found here).
    2) No TrueCrypt volume can be identified (TrueCrypt volumes cannot
    be distinguished from random data).
    --Encryption algorithms: AES-256, Blowfish (448-bit key), CAST5,
    Serpent (256-bit key), Triple DES, and Twofish (256-bit key).
    Supports cascading (e.g., AES-Twofish-Serpent).
    --Based on Encryption for the Masses (E4M) 2.02a,
    which was conceived in 1997.

    Lots of major improvements including addition of whirlpool hash algo as alternative to SHA-1 (plus ability to reencrypt existing header volumes) , using of keyfiles to supplement passwords (plus ability to add these to existing volumes), improved automount and dismount features, backup/replacement of header volumes, protection of hidden volume, improved to speed and RNG.
  2. Joliet Jake

    Joliet Jake Registered Member

    Mar 1, 2005
    Thanks for the info, just d/led it for a try.
  3. HelloGuys

    HelloGuys Guest

    Hi guys,

    I was wondering which algo one should choose as best choice? Twofish? Serpent? Etc.

    Also, are these key lengths all legal, or is it supposed to be limited to 128?

    Thanks for your answers to a newbie.
  4. byeguys

    byeguys Guest

    They are all good. Some are older (CAST,3DES) but older means more well tested against weaknesses. Some are slower, but possibly more secure Serpent versus AES etc. But AES is the standard so maybe more people tried to break it and hence failed.

    Or you could try one of the casades of several different algos.
  5. ronjor

    ronjor Global Moderator

    Jul 21, 2003
  6. squash

    squash Registered Member

    Mar 25, 2005
    Thanks for the heads up ronjor. I think I'm gonna update. ;)

    I suggest everyone to use encryption program like TrueCrypt, you firewall and antivirus are nothing, if people get hold of your sensitive data.
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.