Overclock.net › Forums › Software, Programming and Coding › Networking & Security › How safe is TrueCrypt? Is it worth it to use it?
New Posts  All Forums:Forum Nav:

How safe is TrueCrypt? Is it worth it to use it? - Page 4

post #31 of 37
TrueCrypt is basically uncrackable if implemented correctly. There have been cases where laptops have been confiscated by a court and forensics teams can't decrypt it. With enough skill (I don't know how), it's possible to use TrueCrypt to not only encrypt the drive, but also to completely hide partitions so you can't even tell there is encrypted data to begin with.

I would just use BitLocker though.
zippy
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7 920 d0 @ 3.6GHz asus p6t deluxe v2 gtx480 @ 800/1600/3700 6gb g.skill ddr3 1600 
Hard DriveOSPower
western digital 1tb win7 64-bit 850w 
  hide details  
Reply
zippy
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7 920 d0 @ 3.6GHz asus p6t deluxe v2 gtx480 @ 800/1600/3700 6gb g.skill ddr3 1600 
Hard DriveOSPower
western digital 1tb win7 64-bit 850w 
  hide details  
Reply
post #32 of 37
aes-twofish-serpent or something like that with whirlpool is basically uncrackable
post #33 of 37
Quote:
Originally Posted by PhaedraCorruption View Post
TrueCrypt is pretty good but you have to understand that ANYTHING can and always will be crackable. It just depends on how determined the person is at getting at the data and how much time he is willing to pour into it.


There is no "uncrackable"

There never will be.
i disagree...theres plenty of software and solutions that are redundant and havent been "cracked" after tampered with..

you CAN create perfect solutions
post #34 of 37
Quote:
Originally Posted by Clipze View Post
i disagree...theres plenty of software and solutions that are redundant and havent been "cracked" after tampered with..

you CAN create perfect solutions
That doesn't mean that they will NEVER be cracked though.
Space Heater
(13 items)
 
  
CPUMotherboardGraphicsRAM
Xeon W3520 Foxconn Bloodrage Sapphire 4890 Toxic 12GB Corsair DDR3 1333mhz 
Hard DriveOptical DriveOSMonitor
Vertex 2 60GB|4.5TB Storage A POS LG one.. Windows 7 Ultimate x64 Samsung Syncmaster 2443BWX 
KeyboardPowerCaseMouse
Logitech G15 v2 PC Power & Cooling 750w Antec 1200 Logitech G5 
Mouse Pad
A POS BestBuy one.. 
  hide details  
Reply
Space Heater
(13 items)
 
  
CPUMotherboardGraphicsRAM
Xeon W3520 Foxconn Bloodrage Sapphire 4890 Toxic 12GB Corsair DDR3 1333mhz 
Hard DriveOptical DriveOSMonitor
Vertex 2 60GB|4.5TB Storage A POS LG one.. Windows 7 Ultimate x64 Samsung Syncmaster 2443BWX 
KeyboardPowerCaseMouse
Logitech G15 v2 PC Power & Cooling 750w Antec 1200 Logitech G5 
Mouse Pad
A POS BestBuy one.. 
  hide details  
Reply
post #35 of 37
Quote:
Originally Posted by Clipze View Post
i disagree...theres plenty of software and solutions that are redundant and havent been "cracked" after tampered with..

you CAN create perfect solutions
A perfect solution would require quantum mechanics.


All other solutions is a matter of how long.


As for AES.... what is preventing someone to save files contain Social Security information and attempting to crack it via brute-force in 20-30 years using a quantum computer?
Once again...
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7 920 [4.28GHz, HT] Asus P6T + Broadcom NetXtreme II VisionTek HD5850 [900/1200] + Galaxy GT240 2x4GB G.Skill Ripjaw X [1632 MHz] 
Hard DriveOSMonitorKeyboard
Intel X25-M 160GB + 3xRAID0 500GB 7200.12 Window 7 Pro 64 Acer H243H + Samsung 226BW XARMOR-U9BL  
PowerCaseMouseMouse Pad
Antec Truepower New 750W Li Lian PC-V2100 [10x120mm fans] Logitech G9 X-Trac Pro 
  hide details  
Reply
Once again...
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7 920 [4.28GHz, HT] Asus P6T + Broadcom NetXtreme II VisionTek HD5850 [900/1200] + Galaxy GT240 2x4GB G.Skill Ripjaw X [1632 MHz] 
Hard DriveOSMonitorKeyboard
Intel X25-M 160GB + 3xRAID0 500GB 7200.12 Window 7 Pro 64 Acer H243H + Samsung 226BW XARMOR-U9BL  
PowerCaseMouseMouse Pad
Antec Truepower New 750W Li Lian PC-V2100 [10x120mm fans] Logitech G9 X-Trac Pro 
  hide details  
Reply
post #36 of 37
Hi,

how do you then open a message XOR'd with full length random key. Of course the key must be delivered with safe methods and be kept safe.

--
minaVain
post #37 of 37
Quote:
Originally Posted by vainMina View Post

Hi,

how do you then open a message XOR'd with full length random key. Of course the key must be delivered with safe methods and be kept safe.

--
minaVain

You XOR it again with the same key. That's called a One-Time Pad and is 100% secure if the original key is not known.

If we're using ^ as the XOR operator, the property that allows you to encrypt and decrypt by XOR-ing with the key is:

x ^ k = y
(plaintext x XOR-ed with the key k gives the ciphertext y)

y ^ k = (x ^ k) ^ k = x ^ (k ^ k) = x ^ 0 = x
(the ciphertext is really just the XOR between the plaintext and the key; if we XOR with the key again, that's like XOR-ing the key with itself which gives 0, and anything XOR-ed with 0 is just itself.)

y ^ k = x
(ciphertext y XOR-ed with the key k gives the plaintext x)

I'm sure this is still relevant 3 years later smile.gif
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Networking & Security
Overclock.net › Forums › Software, Programming and Coding › Networking & Security › How safe is TrueCrypt? Is it worth it to use it?