TrueCrypt is a software application used for on-the-fly
It can create a "file-hosted container" or write a partition
which consists of an encrypted volume with its own file system,
contained within a regular file, which can then be mounted as if it
were a real disk.
Files can be copied to and from a mounted TrueCrypt volume
they are copied to/from any normal disk (for example, by simple
drag-and-drop operations). Files are automatically being decrypted
on-the-fly (in memory/RAM) while they are being read or copied from an
encrypted TrueCrypt volume.
- Automatic, realt-time and transparent encryption
- Creates a virtual encrypted disk within a file and mounts
it as a real disk
- Encrypts an entire partition or storage device such as USB
flash drive or hard drive
- Encrypts a partition or drive where Windows is installed
- Encryption is automatic, real-time (on-the-fly) and
- Provides two levels of plausible deniability, in case an
adversary forces you to reveal the password:
- Hidden volume
- No TrueCrypt volume can be identified (volumes cannot be
distinguished from random data)
- Encryption algorithms: AES-256, Serpent, and Twofish.
Mode of operation: XTS.
to Security Home Page | Return
to Disk Encryption Home Page
Last Updated Monday, May 25 2015 @ 08:37 AM EDT