Home
Documentation
FAQ
Downloads
News
Future
History
Screenshots
Statistics
Forum
Contact
Introduction
Beginner's Tutorial
System Encryption
Supported Systems
Hidden Operating System
Rescue Disk
Plausible Deniability
Hidden Volume
Protection of Hidden Vol.
Security Requirements
Hidden Operating System
Parallelization
Pipelining
Hardware Acceleration
Encryption Algorithms
AES
Serpent
Twofish
Cascades
Hash Algorithms
RIPEMD-160
SHA-512
Whirlpool
Technical Details
Notation
Encryption Scheme
Modes of Operation
Header Key Derivation
Random Number Gen.
Keyfiles
Volume Format Spec.
Standards Compliance
Source Code
TrueCrypt Volume
Creating New Volumes
Favorite Volumes
System Favorite Volumes
Main Program Window
Program Menu
Mounting Volumes
Supported Systems
Portable Mode
Keyfiles
Tokens & Smart Cards
Language Packs
Hot Keys
Security Model
Security Requirements
Data Leaks
Paging File
Hibernation File
Memory Dump Files
Unencrypted Data in RAM
Physical Security
Malware
Multi-User Environment
Authenticity and Integrity
New Passwords & Keyfiles
Password/Keyfile Change
Trim Operation
Wear-Leveling
Reallocated Sectors
Defragmenting
Journaling File Systems
Volume Clones
Additional Requirements
Command Line Usage
Backing Up Securely
Miscellaneous
Use Without Admin Rights
Sharing over Network
Background Task
Removable Medium Vol.
TrueCrypt System Files
Removing Encryption
Uninstalling TrueCrypt
Digital Signatures
Troubleshooting
Incompatibilities
Issues and Limitations
License
Future Development
Acknowledgements
Version History
References
Technical Details
Search
Disclaimers
Please consider making a donation.
Donate Now >>
Technical Details
Notation
Encryption Scheme
Modes of Operation
Header Key Derivation, Salt, and Iteration Count
Random Number Generator
Keyfiles
TrueCrypt Volume Format Specification
Compliance with Standards and Specifications
Source Code
Next Section >>
Legal Notices
www.truecrypt.org