Howto: Hidden Truecrypt volume Linux

January 2, 2008

That is  more complicated than just creating a normal volume, especially if you do not know the correct commands, so I will give them to you here:

The first command(we will do all in one step, therefore the &&):

truecrypt –type normal -c volume.tc && truecrypt –type hidden -c volume.tc

As usual, you have to give the path to the volume, so an example could be:

truecrypt –type normal -c /home/usr/volume.tc && truecrypt –type hidden -c voulme.tc

Now a normal truecrypt volume will be created:

If you never did this before, have a look at my other howtos…

Filesystem:
1) FAT
2) None
Select [1]:

Enter volume size (bytes – size/sizeK/sizeM/sizeG): 5M

Hash algorithm:
1) RIPEMD-160
2) SHA-1
3) Whirlpool
Select [1]:

Encryption algorithm:
1) AES
2) Blowfish
3) CAST5
4) Serpent
5) Triple DES
6) Twofish
7) AES-Twofish
8) AES-Twofish-Serpent
9) Serpent-AES
10) Serpent-Twofish-AES
11) Twofish-Serpent
Select [1]:

Enter password for new volume ‘/home/philipp/voulme.tc’:
Re-enter password:

Enter keyfile path [none]:

TrueCrypt will now collect random data.

To enable mouse movements to be used as a source of random data,
please do one of the following:
– Run TrueCrypt under administrator (root) account.
– Add read permission for your user to device /dev/input/mice.

Please type at least 320 randomly chosen characters and then press Enter:
…(use strong random data, so RTzi*ZE$§E§Jghde and not gggggg!!!!)

Done: 5.00 MB  Speed: 2.05 MB/s  Left: 0:00:00
Volume created
.

And after that, a hidden volume, using the same scheme, be aware that the hidden volume has to be smaller than the normal volume!

Filesystem:
1) FAT
2) None
Select [1]:

Enter volume size (bytes – size/sizeK/sizeM/sizeG): 3M

Hash algorithm:
1) RIPEMD-160
2) SHA-1
3) Whirlpool
Select [1]:

Encryption algorithm:
1) AES
2) Blowfish
3) CAST5
4) Serpent
5) Triple DES
6) Twofish
7) AES-Twofish
8) AES-Twofish-Serpent
9) Serpent-AES
10) Serpent-Twofish-AES
11) Twofish-Serpent
Select [1]:

Enter password for new volume ‘/home/philipp/volume.tc’:
Re-enter password:

Enter keyfile path [none]:

TrueCrypt will now collect random data.

To enable mouse movements to be used as a source of random data,
please do one of the following:
– Run TrueCrypt under administrator (root) account.
– Add read permission for your user to device /dev/input/mice.

Please type at least 320 randomly chosen characters and then press Enter:

Done: 3.00 MB  Speed: 2.92 MB/s  Left: 0:00:00

Now you have a hidden volume inside a normal volume and it depends on the password you give, which volume will be mounted:

truecrypt -M “rw,sync,utf8,uid=$UID,umask=0007” /home/usr/volume /home/usr/5MB

Now you will be asked for your volume password (or, at first for your root password and then for your volume password):

Enter password for ‘/home/usr/volume.tc’:

If you now give the password for the normal volume, the normal volume will be mounted, if you give the hidden volume’s password, the hidden one will be mounted

Advertisements