search online

Monday, June 2, 2014

Word of the Day: TrueCrypt

Word of the Day WhatIs.com
Daily updates on the latest technology terms |June 2, 2014
TrueCrypt

TrueCrypt is an open source cross-platform program for file and full disk encryption.

Initially released in February 2004, the software gained notoriety when it was revealed that Edward Snowden, the former United States government contractor best known for leaking secret documents, recommended TrueCrypt for encryption.

In May 2014, the TrueCrypt website posted an announcement that the program had been retired. The announcement warned that TrueCrypt may contain unfixed security issues and was no longer safe to use following the end of support for Windows XP. The website recommends that users migrate from TrueCrypt to BitLocker and provides step-by-step directions for how to do so.

The last full release of TrueCrypt was in 2012. This release, version 7.1a, allows users to choose from a variety of algorithms including Serpent, AES and Twofish. It also supports hash functions, including Whirlpool, and cascaded algorithms. The encryption itself is handled in real time by a file-system driver so the encryption process remains completely transparent to the end user.

The latest release of TrueCrypt, version 7.2, was issued at the same time the website announced TrueCrypt's retirement. Version 7.2 only provides users with the ability to decrypt previously encrypted volumes; it does not include encryption capabilities.

As of this writing, a new group of developers is attempting to fork the software under a new domain and product name.

Quote of the Day

"Because of the abrupt announcement... no one is completely sure yet whether or not the venerable staple of file and disk encryption is really finished for good." -- Ken Harthun

Related Terms
Related Terms

encryption

full disk encryption

BitLocker

Advanced Encryption Standard (AES)

Twofish

hashing

crypto

forking

Related Tags

Disk Encryption and File Encryption

 
Required Reading

TrueCrypt shutdown: Little warning, explanation given by developers
The sudden TrueCrypt shutdown has left many in the security community wondering just what happened and whether the NSA played a part.

Detecting the use of TrueCrypt
Learn about the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.

Data encryption, notification and the NIST Cybersecurity Framework
The NIST Cybersecurity Framework comes at an awkward time for a U.S. government struggling to counter negative reports about its record on data privacy and encryption standards.

Stay In Touch
FOLLOW WHATIS.COM
TwitterRSS
 

 

CONTACT US

For feedback about any of our definitions or to send us ideas for new definitions, please contact us at: editor@techtarget.com

About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2013 TechTarget. All rights reserved.

No comments :

Post a Comment