Page 1:TrueCrypt 6.1--Tried And Tested
Page 2:TrueCrypt 6.1 Features And Testing Considerations
Page 3:Commencing Encryption For A Windows System
Page 4:Encryption Algorithm, Performance, Rescue Disc
Page 5:Wipe Blanks, Pretest, And Encryption
Page 6:First-Start, Limitations, Decrypting
Page 7:Test Setup And Benchmarks
Page 8:PCMark Vantage Benchmarks
Page 9:Application Benchmarks
Page 10:Results: MobileMark 07
Encryption Algorithm, Performance, Rescue Disc
Now things get a little more technical: the fifth window provides you with the option to pick your desired algorithm, to check its performance on your system and drive, and also to select the hash algorithm you want TrueCrypt to use. We tried two different options for our testing: on the first run we chose AES, while the second test used AES-Twofish-Serpent, which offers double encryption at the cost of reduced performance.
The TrueCrypt encryption wizard includes a benchmarking tool, which you can access when selecting the encryption algorithm (see above). The benchmark shows varying performance and highly depends on the processor, followed by the drive you are about to encrypt: AES and Twofish provide highest throughput on our Core 2 Duo notebook Dell Latitude D610. Once you start combining multiple encryption algorithms, e.g. Twofish and Serpent, performance drops considerably. While this isn’t noticeable while working with Windows and popular applications, increasing system load—such as may occur during heavy multi-tasking or when taking on intensive workloads such as video transcoding—will reduce system performance considerably.
Next, you have to select a master password, which the system will use to grant access to the encrypted system.
TrueCrypt prompts you to create random data for the encryption keys by moving your mouse in a random fashion. The more creative you are, the more security you will get.
Done! The header key for the encrypted drive and the master key have been created.
Finally, you need to create a rescue disc. This is mandatory for a TrueCrypt installation, because it is the only way to access your encrypted data should the boot loader be damaged or removed from the encrypted drive. This is not something you would do deliberately, but could occur by accident or due to hard drive failure. Make sure you store the rescue disc in a safe location.
TrueCrypt creates an ISO image, so you can store it on hard drives or create a CD or DVD right away.
- TrueCrypt 6.1--Tried And Tested
- TrueCrypt 6.1 Features And Testing Considerations
- Commencing Encryption For A Windows System
- Encryption Algorithm, Performance, Rescue Disc
- Wipe Blanks, Pretest, And Encryption
- First-Start, Limitations, Decrypting
- Test Setup And Benchmarks
- PCMark Vantage Benchmarks
- Application Benchmarks
- Results: MobileMark 07