synthetikal.com Forum Index


2x Free On-The-Fly Encryption system for MS Windows.
Page 1 of 1
Post new topic   Reply to topic    synthetikal.com Forum Index -> Computer Security
Author Message
nubee
Master Archiver
Joined: 18 Feb 2005
Posts: 213
Location: homeless
18579.78 Points

Mon Apr 04, 2005 2:09 pm
Reply with quote

Idea one of the neatest feature both of these have is:

Quote:

H i d d e n V o l u m e

It may happen that you are forced by somebody to reveal the password to an encrypted volume. There are many situations where you cannot refuse to reveal the password (for example, when the adversary uses violence). Using a so-called hidden volume allows you to solve such situations in a diplomatic manner without revealing the password to your volume.

The principle is that a TrueCrypt volume is created within another TrueCrypt volume (within the free space on the volume). Even when the outer volume is mounted, it is impossible to tell whether there is a hidden volume within it or not, because free space on any TrueCrypt volume is always filled with random data when the volume is created* (if Quick Format is disabled) and no part of the hidden volume can be distinguished from random data.







Quote:

T r u e C r y p t

http://truecrypt.sourceforge.net/

Features:

It can create a virtual encrypted disk within a file and mount it as a real disk.

It can encrypt an entire hard disk partition or a device, such as USB memory stick, floppy disk, etc.

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:

1) Hidden volume (more information may be found here).

2) No TrueCrypt volume can be identified (TrueCrypt volumes cannot be distinguished from random data).

Encryption algorithms: AES-256, Blowfish (448-bit key), CAST5, Serpent (256-bit key), Triple DES, and Twofish (256-bit key). Supports cascading (e.g., AES-Twofish-Serpent).

Based on Encryption for the Masses (E4M) 2.02a, which was conceived in 1997.


the next one is not as simple to setup, "This version of FreeOTFE is very much a test version, released for compatibility testing"

but still very much working and possibly a better program...

Quote:


FreeOTFE is the latest OTFE (On-The-Fly Encryption) system for MS Windows.

http://www.freeotfe.org/

Features
Source code freely available
Linux losetup compatibility
Hash algorithms include: MD5, SHA-512, RIPEMD-160, and more (with others under development...)
Cyphers include AES (up to 256 bit), Twofish (up to 256 bit) and more (again, with others under development...)
"Hidden" volumes may be concealed within other FreeOTFE volumes, providing "plausible deniability"
FreeOTFE volumes have no "signature" to allow them to be identified as such
Easy to use; full wizard included for creating new volumes
Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems
Fully supported by SecureTrayUtil.

Modular design allowing 3rd party drivers to be created, incorporating new hash/cypher algorithms
Decryption software available to improve transparency, and allow even the most junior software engineer to prove data is being encrypted correctly
Supports password salting (up to 512 bits) to reduce the risks presented by dictionary attacks.
Uses per-sector IVs
Supports volumes files up to 2^64 bytes (16777216 TB)
Plus more...!

Back to top
Ionium

Joined: 09 Feb 2005
Posts: 20
544.40 Points

Tue Apr 05, 2005 8:07 pm
Reply with quote

First: I mentioned truecrypt in this thread, which would have been the correct place for your post.

Second: The hidden volume feature is not going to enhance security in any way. If an attacker, for example the police, finds a program on your computer than can make hidden volumes, they will of course suspekt that this feature has been used, even if it hasn't, and if you have nothing to hide and willingly gives out your password, you may be suspected of hiding something anyway, if you use a formatting that makes these hidden volumes possible.
Back to top
nubee
Master Archiver
Joined: 18 Feb 2005
Posts: 213
Location: homeless
18579.78 Points

Wed Apr 06, 2005 6:04 am
Reply with quote

Quote:
First: I mentioned truecrypt in this thread, which would have been the correct place for your post.


-i knew that, i did it anyway

Quote:

Second: The hidden volume feature is not going to enhance security in any way.


not so

[quote]
If an attacker, for example the police, finds a program on your computer than can make hidden volumes, they will of course suspekt that this feature has been used, even if it hasn't, and if you have nothing to hide and willingly gives out your password, you may be suspected of hiding something anyway, if you use a formatting that makes these hidden volumes possible.[/quote

firstly if you had nothing to hide/protect you wouldnt be using encryption...

secondly the key to the hidden volume is that if they find your encrypted container file you can give them a password that opens it and there will be files in there,

BUT THERE IS KNOW WAY OF KNOWING OR PROVING THAT A HIDDEN VOLUME EXISTS, and therefore the existence of a password to access it.

you can give out your passwords willingly and still keep your data hidden.

Rolling Eyes
Back to top
Guest

0.00 Points

Wed Apr 06, 2005 6:17 am
Reply with quote

Nubee,
So even if there was a hidden volume,
They still can't open it?

Quote:
Encryption algorithms: AES-256, Blowfish (448-bit key), CAST5, Serpent (256-bit key), Triple DES, and Twofish (256-bit key). Supports cascading (e.g., AES-Twofish-Serpent).

Based on Encryption for the Masses (E4M) 2.02a, which was conceived in 1997.



I might give this a try,
Is there anything further I need to know
When i am using it,
Do I have to log out- to activate the security?

Syn
Back to top
nubee
Master Archiver
Joined: 18 Feb 2005
Posts: 213
Location: homeless
18579.78 Points

Wed Apr 06, 2005 9:45 am
Reply with quote

they cant open anything without the password.

but for example someone was like : hey youve got a 600mb file on here that we think is an encrypted container, give us the password or else...

you can give them the password to the primary space, and they can look in there, there may be some files that seem sensitive, but the real goodies are hidden in what appears to be free space of that primary allocation.

which can only be accessed by a second password, which there is no proof exists compared with the primary password being implied to exist due to the existance of an encrypted file.

you do have to un mount your container file to close acces to it from the computer it is mounted in.

i think blowfish is the best algorithm from my measly look over the benchmarking results, if anyone feels any different id like to know...

the container can be named to look like any file, or actually a whole device.

its a vary easy program to use.
Back to top
MargaretThatcher

Joined: 16 Feb 2005
Posts: 142
4420.96 Points

Fri Apr 08, 2005 5:06 am
Reply with quote

nubee wrote:
which can only be accessed by a second password, which there is no proof exists compared with the primary password being implied to exist due to the existance of an encrypted file.

i think blowfish is the best algorithm from my measly look over the benchmarking results, if anyone feels any different id like to know...


It not just proof: there is no evidence at all that another encrypted compartment exists (well, not within the encryption application itself). Other things on the system could point to there being another compartment though.

Blowfish is fast but fairly new. It is gaining credibility though.
Back to top
Chaoslord

Joined: 17 Jun 2005
Posts: 10
Location: Oslo, Norway
328.14 Points

Mon Jun 20, 2005 9:22 pm
Reply with quote

I can post here two TRUE full disk (including boot sector) encryption programs
(both with Rinjdael 256/AES)

If someone wants them, of course

Names:

Ultimaco Safeguard Easy v4.10

http://www.utimaco.com/createframes.html?http://www.utimaco.com/content_products/sg_easy.html

DriveCrypt Plus

http://www.securstar.com/products_drivecryptpp.php


Let me know if anyone needs 'em

-Chaos
Back to top
Ionium

Joined: 09 Feb 2005
Posts: 20
544.40 Points

Thu Jun 23, 2005 4:39 pm
Reply with quote

In TrueCrypt, you can only have hidden volumes when using the FAT filesystem, it is not possible on NTFS. I'm sure the police would suspect that anyone using TrueCrypt and formatting their encrypted partition with FAT, also is having a hidden partition. Of course there is no proof, but why else would anyone use FAT formatting?

IMO, you're still in a situation where security relies upon how good you are at not telling your password. That's why I say that the hidden partition feature doesn't really enhance security.
Back to top
Chaoslord

Joined: 17 Jun 2005
Posts: 10
Location: Oslo, Norway
328.14 Points

Thu Jun 23, 2005 5:46 pm
Reply with quote

That is not suspicious

There are time when a FAT partition is best
(example - in some old DOS games, or old DOS programs)
Back to top
Display posts from previous:   
Post new topic   Reply to topic    synthetikal.com Forum Index -> Computer Security All times are GMT + 5.5 Hours
Page 1 of 1

 



Powered by phpBB 2.0.11 © 2001, 2002 phpBB Group

Igloo Theme Version 1.0 :: Created By: Andrew Charron