Home
About
History
Downloads
Documentation
FAQ
For an untouched, partial mirror of TrueCrypt.org:
view
-
download
| Disclaimer: this site is not affiliated with, nor is it the official site of TrueCrypt
Technical Details
Notation
Encryption Scheme
Modes of Operation
Header Key Derivation
Random Number Gen.
Keyfiles
Volume Format Spec.
Standards Compliance
Source Code
Introduction
Beginner's Tutorial
System Encryption
Supported Systems
Hidden Operating System
Rescue Disk
Plausible Deniability
Hidden Volume
Protection of Hidden Vol.
Security Requirements
Hidden Operating System
Parallelization
Pipelining
Hardware Acceleration
Encryption Algorithms
AES
Serpent
Twofish
Cascades
Hash Algorithms
RIPEMD-160
SHA-512
Whirlpool
Technical Details
Notation
Encryption Scheme
Modes of Operation
Header Key Derivation
Random Number Gen.
Keyfiles
Volume Format Spec.
Standards Compliance
Source Code
TrueCrypt Volume
Creating New Volumes
Favorite Volumes
System Favorite Volumes
Main Program Window
Program Menu
Mounting Volumes
Supported Systems
Portable Mode
Keyfiles
Tokens & Smart Cards
Language Packs
Hot Keys
Security Model
Security Requirements
Data Leaks
Paging File
Hibernation File
Memory Dump Files
Unencrypted Data in RAM
Physical Security
Malware
Multi-User Environment
Authenticity and Integrity
New Passwords & Keyfiles
Password/Keyfile Change
Trim Operation
Wear-Leveling
Reallocated Sectors
Defragmenting
Journaling File Systems
Volume Clones
Additional Requirements
Command Line Usage
Backing Up Securely
Miscellaneous
Use Without Admin Rights
Sharing over Network
Background Task
Removable Medium Vol.
TrueCrypt System Files
Removing Encryption
Uninstalling TrueCrypt
Digital Signatures
Troubleshooting
Incompatibilities
Issues and Limitations
License
Future Development
Acknowledgements
Version History
References