skip navigation

CrimeSolutions.gov

Add your conference to our Justice Events calendar

PUBLICATIONS

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
 
NCJ Number: NCJ 235736     Find in a Library
Title: TrueCrypt Version 7.0a Evaluation Report
Corporate Author: NIJ Criminal Justice Electronic Crime Technology Ctr of Excellence
United States of America
Date Published: 01/2011
Page Count: 21
Sale Source: NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America

National Law Enforcement and Corrections Technology Center (NLECTC)
700 N. Frederick Ave.
Bldg. 181, Room 1L30
Gaithersburg, MD 20879
United States of America
Document: PDF 
Type: Test/Measurement
Language: English
Country: United States of America
Annotation: This report presents the findings and methodology of the National Institute of Justice’s Electronic Crime Technology Center of Excellence’s (ECTCoE’s) evaluation and testing of TrueCrypt Version 7.0a, which is a software system for establishing and maintaining an “on-the fly-encrypted” volume (data storage device).
Abstract: “On-the-fly encryption” means that data are automatically encrypted or decrypted right before it is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfiles or correct encryption keys. The target customers for the TrueCrypt software can be any computer user, including State and local law enforcement organizations, who desire to have data safeguarded by encryption. TrueCrypt can be used by State and local law enforcement agencies in order to protect data confidentiality and information for cases can be encrypted and shipped in a secure manner. The evaluation found that the tested features of the TrueCrypt software performed as advertised. Thus, it would enable law enforcement agencies to protect sensitive data that may be exposed to eavesdropping. Once TrueCrypt encrypts the data, access is all but impossible provided that a strong password is chosen. In a law enforcement application, the software is free. The first of three tests evaluated the advertised feature that TrueCrypt creates a virtual encrypted disk within a file and mounts it as a real disk. It also tested whether a password for a TrueCrypt volume can be recovered from the RAM of a running system. The second test assessed the advertised feature that TrueCrypt encrypts an entire partition or storage device such as a USB flash drive or hard drive. It also tested whether a password for a TrueCrypt volume can be recovered from the RAM of a running system. The third test involved TrueCrypt’s pre-boot authentication. Illustrative computer screen messages
Main Term(s): Police information systems
Index Term(s): Data security ; Computer software ; Encryption
   
  To cite this abstract, use the following link:
https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=257723

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.