Creating An Encrypted Container Using Truecrypt
Creating An Encrypted Container Using Truecrypt
TrueCrypt
Introduction
This document describes how users may encrypt their data using TrueCrypt, in order to
protect the content from unauthorised access and use.
What is Encryption?
Encryption is a process through which data – digital or otherwise – is encoded in a form
that makes it difficult to read unless you possess an appropriate decoding method. It
may be compared to the process of storing an object in a locked box that possesses
only one key. To gain access to the object, the recipient must possess a key capable of
opening the box or the necessary tools to break it open.
What is TrueCrypt?
TrueCrypt is a free, open source encryption tool for use in encrypting a set of files, disk
partition, or entire drive. It applies a technique called On-the-fly encryption, which
transparently encrypts/decrypts data being accessed, without the need for user
intervention. The software is available for several operating systems, including
Microsoft Windows, Mac OS X and Linux.
A message should appear stating "TrueCrypt has been successfully installed" should
appear. Click the FINISH button to close the installer.
TrueCrypt supports the ability to protect a storage device from unauthorised access at
three levels. It may be used to:
The third category represents the simplest and most flexible approach to creating an
encrypted storage area, without the need to change the rest of the disk. When viewed
through Windows Explorer, the encrypted container appears as a normal file. However,
when mounted using TrueCrypt, it becomes a virtual drive that may be used to save
and load data files, similar to any other drive.
Figure 1: A Container file becomes a virtual drive when mounted using TrueCrypt
This tutorial will describe the steps necessary to create an encrypted container. If you
have previously created a TrueCrypt file container, or are using one that has been
created by someone else, you should move to Stage 3 for information on mounting the
virtual drive.
1. When initiated, TrueCrypt will display the Volume Window. Click the CREATE
VOLUME button (labelled with a red rectangle in Figure 2) to initiate the A
‘TrueCrypt Volume Creation Wizard’.
2. The first screen of the ‘TrueCrypt Volume Creation Wizard’ requests the user to
specify the type of encrypted drive they wish to create. Three options are available,
each of which is described below.
3. Select the ‘Standard TrueCrypt Volume’ option in the Volume Type window and
press NEXT.
5. Choose an appropriate encryption algorithm to use (see Figure 3). For most
purposes, AES is sufficient, balancing security with access speed.
Many security experts believe that a ‘cascaded ciphers’ involving the use of 2-3
levels of encryption offers greater security, e.g. ‘AES-Twofish-Serpent’ or ‘Serpent-
Twofish-AES’. This works by encrypting data using algorithm A (e.g. AES), the
output of which is encrypted using algorithm B (e.g. TwoFish), followed by algorithm
C (e.g. Serpent). If an unauthorised user is able to decode the algorithm C layer,
they will need to decode algorithm B and A to gain access.
9. The Volume Creation Wizard will ask for information on the maximum file size that
you intend to store, in order to determine the most appropriate file system to use.
• Select YES if you are likely to create or store a file that is 4GB or more in size
(roughly equivalent to the capacity of a DVD). This will necessitate the use of
‘NTFS’.
• Select NO if you are unlikely to reach the 4GB limit.
10. The Volume Creation Wizard will ask you to choose the file system to use:
• ‘NTFS’ is the best option to use for most purposes;
• ‘FAT’ may be useful if you are working with colleagues who use older or non-
Microsoft operating systems,
The ‘Cluster’ drop-down menu and ‘Dynamic’ checkbox may be left in their default
position. Press the ‘FORMAT’ button.
11. Once the virtual disk has been formatted, a ‘Volume Created’ message will appear.
From this menu, you have the option to:
1. Select a drive letter from the available list through which you intend to access the
virtual drive (see A. in Figure 4).
• It may be helpful to choose ‘T:’ in the first instance, to help you to identify it
as a TrueCrypt virtual drive.
2. Click SELECT FILE and locate the relevant file on your hard disk. Once chosen, the
path and filename should appear in the Volume menu (B in Figure 4).
The ‘Mount Options’ menu contains various settings related to drive access. If you
do not wish to accidentally change files held in the encrypted drive, for example, it is
advisable to mount the volume as read-only.
Press OK when you have entered the correct password and configured relevant
settings.
To share the TrueCrypt file container with a colleague, you should follow the following
two-stage process:
a. Send a copy of the encrypted file container to the intended recipient using an
appropriate method, e.g. memory stick, SFX Secure File eXchange, cloud
storage service.