Howto: Hidden Truecrypt volume Linux

January 2, 2008

That is  more complicated than just creating a normal volume, especially if you do not know the correct commands, so I will give them to you here:

The first command(we will do all in one step, therefore the &&):

truecrypt –type normal -c volume.tc && truecrypt –type hidden -c volume.tc

As usual, you have to give the path to the volume, so an example could be:

truecrypt –type normal -c /home/usr/volume.tc && truecrypt –type hidden -c voulme.tc

Now a normal truecrypt volume will be created:

If you never did this before, have a look at my other howtos…

Filesystem:
1) FAT
2) None
Select [1]:

Enter volume size (bytes – size/sizeK/sizeM/sizeG): 5M

Hash algorithm:
1) RIPEMD-160
2) SHA-1
3) Whirlpool
Select [1]:

Encryption algorithm:
1) AES
2) Blowfish
3) CAST5
4) Serpent
5) Triple DES
6) Twofish
7) AES-Twofish
8) AES-Twofish-Serpent
9) Serpent-AES
10) Serpent-Twofish-AES
11) Twofish-Serpent
Select [1]:

Enter password for new volume ‘/home/philipp/voulme.tc’:
Re-enter password:

Enter keyfile path [none]:

TrueCrypt will now collect random data.

To enable mouse movements to be used as a source of random data,
please do one of the following:
– Run TrueCrypt under administrator (root) account.
– Add read permission for your user to device /dev/input/mice.

Please type at least 320 randomly chosen characters and then press Enter:
…(use strong random data, so RTzi*ZE$§E§Jghde and not gggggg!!!!)

Done: 5.00 MB  Speed: 2.05 MB/s  Left: 0:00:00
Volume created
.

And after that, a hidden volume, using the same scheme, be aware that the hidden volume has to be smaller than the normal volume!

Filesystem:
1) FAT
2) None
Select [1]:

Enter volume size (bytes – size/sizeK/sizeM/sizeG): 3M

Hash algorithm:
1) RIPEMD-160
2) SHA-1
3) Whirlpool
Select [1]:

Encryption algorithm:
1) AES
2) Blowfish
3) CAST5
4) Serpent
5) Triple DES
6) Twofish
7) AES-Twofish
8) AES-Twofish-Serpent
9) Serpent-AES
10) Serpent-Twofish-AES
11) Twofish-Serpent
Select [1]:

Enter password for new volume ‘/home/philipp/volume.tc’:
Re-enter password:

Enter keyfile path [none]:

TrueCrypt will now collect random data.

To enable mouse movements to be used as a source of random data,
please do one of the following:
– Run TrueCrypt under administrator (root) account.
– Add read permission for your user to device /dev/input/mice.

Please type at least 320 randomly chosen characters and then press Enter:

Done: 3.00 MB  Speed: 2.92 MB/s  Left: 0:00:00

Now you have a hidden volume inside a normal volume and it depends on the password you give, which volume will be mounted:

truecrypt -M “rw,sync,utf8,uid=$UID,umask=0007” /home/usr/volume /home/usr/5MB

Now you will be asked for your volume password (or, at first for your root password and then for your volume password):

Enter password for ‘/home/usr/volume.tc’:

If you now give the password for the normal volume, the normal volume will be mounted, if you give the hidden volume’s password, the hidden one will be mounted

Advertisements

Fully encrypted

December 26, 2007

-The personal computer’s hdd is encrypted by using the alternatecd of Ubuntu, where you can configure encryption during installation (just choose “Guided – use entire disk and set up encrypted LVM”, the whole disk will be encrypted! all data stored at that time will be lost! so make a backup))

-My 500GB and my 250GB  external hard drive are both encrypted with AES using Truecrypt

So all data is encrypted!


How to mount a truecrypt-volume in linux/ubuntu

December 26, 2007

That’s quite easy:

truecrypt -M “rw,sync,utf8,uid=$UID,umask=0007”
This is the command to mount your truecrypt-container/volume giving you the right to read and to write data!

After that follows the path to your truecrypt-container, for example /home/usr/tcvolume

and then the place where you want the truecrypt-container to be mounted. In Linux this can be any ordinary folder, so for example, just create a folder “truecryptvolume”, no you type in the whole path (e.g. /home/usr/truecryptvolume ), so that the whole command looks like that:

truecrypt -M “rw,sync,utf8,uid=$UID,umask=0007 /home/usr/tcvolume

/home/usr/truecryptvolume

(one line!)

Now you will be aksed for your user-or administratorpassword(sudo) and then for the volume password, if both are given correctly truecrypt will now mount your container.

By opening the folder “truecryptvolume” you will now be able to store your data encrypted.