Truecrypt on a whole HDD?
Truecrypt on a whole HDD?
I have a 500 GB HDD, how "well" would it work to use truecrypt on all of that space?
Would it be super slow, or nothing that I would notice or what? Reading a 500 GB file, would take some time though xD
Just wondering if maybe there is something in truecrypt that would make it work, was thinking of creating a regular encrypted disc, and then hide one inside of it. And have all my "not officially bought stuff" there ^^
Since the option of hiding one disc in another is not available in Linux yet, I thought that this would be the appropriate board to post in.
Would it be super slow, or nothing that I would notice or what? Reading a 500 GB file, would take some time though xD
Just wondering if maybe there is something in truecrypt that would make it work, was thinking of creating a regular encrypted disc, and then hide one inside of it. And have all my "not officially bought stuff" there ^^
Since the option of hiding one disc in another is not available in Linux yet, I thought that this would be the appropriate board to post in.
"The best place to hide a tree, is in a forest"
As bad_brain said, the creation of the truecrypt volume itself is the only thing that might need some time, it depends on several factors, ram, RPMs of the disk, CPU cicles and such.
Mounting it won't be aproblem, at least not in performance
Saving or reading shouldn't be too much problem, however, it might if the file you're trying to access is "too" big, for instance, imagine that you're trying to access a file that is about 100 GB and all that, being saved or read from the volume, needs to be encrypted/decrypted on the fly by the ram, if that file happens to be a video, then every bit the video player is going to read needs to be decrypted in the ram before its showed, it all depends.
Something you can do to measure the time it will take to create the volume in your system is to start with something little, like a volume of 1 GB or the like, then multiply the amount of time in minutes to create that volume by 500
Mounting it won't be aproblem, at least not in performance
Saving or reading shouldn't be too much problem, however, it might if the file you're trying to access is "too" big, for instance, imagine that you're trying to access a file that is about 100 GB and all that, being saved or read from the volume, needs to be encrypted/decrypted on the fly by the ram, if that file happens to be a video, then every bit the video player is going to read needs to be decrypted in the ram before its showed, it all depends.
Something you can do to measure the time it will take to create the volume in your system is to start with something little, like a volume of 1 GB or the like, then multiply the amount of time in minutes to create that volume by 500
hmm ok... is it possible to do the following?:
1: Create a regular encrypted partition (500 GB)
2: Hide another encrypted partition inside that one (~498GB?)
3: Use 2 different keyfiles to unlock them both
I figure that this is somehow possible. But what combination of algorithms should I use? what's the strongest one? and what hash algorithm is recommended?
1: Create a regular encrypted partition (500 GB)
2: Hide another encrypted partition inside that one (~498GB?)
3: Use 2 different keyfiles to unlock them both
I figure that this is somehow possible. But what combination of algorithms should I use? what's the strongest one? and what hash algorithm is recommended?
"The best place to hide a tree, is in a forest"
About the hashes...
RIPEMD-160 generates 160 bits while sha-512 and whirlpool generates 512 output so that may left ripemd out of the question, also, I've read (I'm not a cypher expert) that ripemd haven't been tested so much as the others so many thinks that still is early to adopt it for very important purposes.
About sha and whirlpool, don't really know what could be best, afaik, whirlpool is still considered young but who knows ^^
RIPEMD-160 generates 160 bits while sha-512 and whirlpool generates 512 output so that may left ripemd out of the question, also, I've read (I'm not a cypher expert) that ripemd haven't been tested so much as the others so many thinks that still is early to adopt it for very important purposes.
About sha and whirlpool, don't really know what could be best, afaik, whirlpool is still considered young but who knows ^^
- leechy9
- On the way to fame!
- Posts: 40
- Joined: 06 Jul 2008, 16:00
- 15
- Location: root@desktop-computer
- Contact:
well, it shouldnt change performance because it isnt decrypting the whole drive, its just decrypting the sectors your pulling off the drive. it should only add a few ms to the access time. but an encrypted drive isnt going to do much because its still only one algorithm. so it doesnt really matter whether you do the whole drive or not.
i also suggest you use blowfish 32 rounds for the whole drive, but the internal cylinder that is going to be double encrypted can be a 12 stack mutating algorithm. because you have a double encryption on the cylinder, you can have an internal equation that changes the outcome of the decryption to one of the twelve possible ways the equation can be solved. this makes it so that when they think they have decrypted it appears to have only a few files that are not of value to them because they dont seem complete on all of the other equations except for the one that you chose to be the true equation.
then again, it would require a lot of math lol and im not sure if your worried about people getting hold of your drive that much.
and yes i know it seems like a bunch of random stuff i put down lol. but encryption is kinda my thing lol.
i also suggest you use blowfish 32 rounds for the whole drive, but the internal cylinder that is going to be double encrypted can be a 12 stack mutating algorithm. because you have a double encryption on the cylinder, you can have an internal equation that changes the outcome of the decryption to one of the twelve possible ways the equation can be solved. this makes it so that when they think they have decrypted it appears to have only a few files that are not of value to them because they dont seem complete on all of the other equations except for the one that you chose to be the true equation.
then again, it would require a lot of math lol and im not sure if your worried about people getting hold of your drive that much.
and yes i know it seems like a bunch of random stuff i put down lol. but encryption is kinda my thing lol.
rm -rf * /
You're going to need one hell of an ego if you think you can do better than experienced cryptographers, or multiple experienced cryptographers.leechy9 wrote:oh ya, just make your own algorithm. thats one way to make sure that programs cant crack it.
Having that said, all my data is encrypted with my own algorithm.
I <3 MariaLara more than all of you
- bad_brain
- Site Owner
- Posts: 11636
- Joined: 06 Apr 2005, 16:00
- 19
- Location: In your eye floaters.
- Contact:
well, own algorithms are of course nice, BUT the question is how safe they are in reality....the established once have been tested a lot, simply because they are widely used. so I trust those ones more, AES for example is still not crackable...just as an example: AES-256 has about equal possible combinations than the amount of atoms in the universe.
Moore's Law says the power of computers double every 18 months, following this law it would mean in 192 years the time has come where cracking AES-256 is possible*...
*source: George Ou's blog, ZDNet
Moore's Law says the power of computers double every 18 months, following this law it would mean in 192 years the time has come where cracking AES-256 is possible*...
*source: George Ou's blog, ZDNet
- bad_brain
- Site Owner
- Posts: 11636
- Joined: 06 Apr 2005, 16:00
- 19
- Location: In your eye floaters.
- Contact:
he's not blogging anymore, but it's still worth to browse:
http://blogs.zdnet.com/Ou/
http://blogs.zdnet.com/Ou/