skip navigation

Add your conference to our Justice Events calendar


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection. To conduct further searches of the collection, visit the NCJRS Abstracts Database. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

  NCJ Number: NCJ 235736     Find in a Library
  Title: TrueCrypt Version 7.0a Evaluation Report
  Document URL: PDF 
  Corporate Author: NIJ Criminal Justice Electronic Crime Technology Ctr of Excellence
United States of America
  Date Published: 01/2011
  Page Count: 21
  Annotation: This report presents the findings and methodology of the National Institute of Justice’s Electronic Crime Technology Center of Excellence’s (ECTCoE’s) evaluation and testing of TrueCrypt Version 7.0a, which is a software system for establishing and maintaining an “on-the fly-encrypted” volume (data storage device).
  Abstract: “On-the-fly encryption” means that data are automatically encrypted or decrypted right before it is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfiles or correct encryption keys. The target customers for the TrueCrypt software can be any computer user, including State and local law enforcement organizations, who desire to have data safeguarded by encryption. TrueCrypt can be used by State and local law enforcement agencies in order to protect data confidentiality and information for cases can be encrypted and shipped in a secure manner. The evaluation found that the tested features of the TrueCrypt software performed as advertised. Thus, it would enable law enforcement agencies to protect sensitive data that may be exposed to eavesdropping. Once TrueCrypt encrypts the data, access is all but impossible provided that a strong password is chosen. In a law enforcement application, the software is free. The first of three tests evaluated the advertised feature that TrueCrypt creates a virtual encrypted disk within a file and mounts it as a real disk. It also tested whether a password for a TrueCrypt volume can be recovered from the RAM of a running system. The second test assessed the advertised feature that TrueCrypt encrypts an entire partition or storage device such as a USB flash drive or hard drive. It also tested whether a password for a TrueCrypt volume can be recovered from the RAM of a running system. The third test involved TrueCrypt’s pre-boot authentication. Illustrative computer screen messages
  Main Term(s): Police information systems
  Index Term(s): Data security ; Computer software ; Encryption
  Sale Source: NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America

National Law Enforcement and Corrections Technology Center (NLECTC)
700 N. Frederick Ave.
Bldg. 181, Room 1L30
Gaithersburg, MD 20879
United States of America
  Type: Test/Measurement
  Country: United States of America
  Language: English
  To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.