Encrypt and Secure Your Data with TrueCrypt

May 15, 2011 at 11:25 am by

4,548 Total Views

Having my computer secure and protected is a big thing for me as it gives me peace of mind just in case it is stolen and my personal details are compromised, like passwords, login details, bank statements, photos etc.

I have used Truecrypt for just over 4 years now and is also on all our machines at work and my machines at home. The reason I have used this program is mainly for it’s simple use when it comes to full disk/ system encryption and knowing that should my computer be stolen that the contents of the hard drive will be next to impossible to access, as the encryption key has to be entered before you can access the operating system (when Windows or your OS starts). This is also the reason I would never leave my computer on whilst being away for too long, as the password has to be entered every time the system is started.

The following Platforms are supported:

Windows 2000
Windows XP (32 and 64bit)
Windows Vista (32 and 64bit)
Windows 7 (32 and 64bit)
Windows Server 2003 (32 and 64bit)
Windows Server 2008 (32 and 64bit)
Mac OS X 10.6 Snow Leopard (32bit)
Mac OS X 10.5 Leopard
Mac OS X 10.4 Tiger
Linux (32 and 64bit versions, kernel 2.4, 2.6 or compatible)

Before you use start this tutorial & use this program, make sure you have backed up first. I have written a tutorial on how to back up here using GFI Home Backup (it’s free for Home use, not commercial)if you need it. You should also create a system restore point as well.

I have used Windows 7 Ultimate x64 for this tutorial and Truecrypt version 7.0.1 (latest version). You will also need a blank CD or DVD ready, as you will be creating a Rescue Disk during the process. One big thing to remember about this program is, is that there are no back doors to it. This means that if you forget your password, and you don’t back up on a regular basis, then there is not a chance in hell you are going to be able to access your data. So please, make sure you back up first before encrypting your system; make sure that you have a reminder of what your password is for your soon to be encrypted drive and have it somewhere safe. I don’t want to put people off doing this tutorial, but I have to make this clear as I’d hate to see anyone loose their password and then realise that they have lost all their documents. But, on the flip side, if your laptop/ desktop is stolen, there isn’t a chance anyone else will be able to access it either. I include the government in that as well. (as long as your password is good enough of course. More on that in a bit)

Right, you can download Truecrypt here. It’s free and Open Source and can be used for home and commercial use. If you wish to view the licence, you can find it here. Once you have downloaded and run the program, you will see the main window.

Now, as we are going to encrypt the entire computer, go to the top of the window and select System>Encrypt System Partition/ Drive as shown below

This will start the system encryption wizard.

You will now be asked which type of system encryption you want. For most people (like me) the first option ‘Normal’ is the one to check. This is also the default choice. You can choose the second choice if you wish which will create a hidden operating system, which can be used if you find yourself in a situation where you have to decrypt the system either by the police or some form of extortion. I will not be going into that in this tutorial though, so if you chose the ‘Normal’ option and then click Next, you will see the next window where you are asked the ‘Area To Encrypt’.

Select the second option ‘Encrypt The Whole Drive’ and then Next

You are now asked if you want to encrypt the Host Protected Area. Select ‘No’ if you are unsure. I select ‘No’ every time I encrypt a computer, but the choice is yours. If you want further information about what the Host Protected Area is and what programs require it’s use, you can read the Wiki article on it here. Click Next to move on

This is where it will ask you if you have multiple operating systems on your computer. I only have Windows 7 running on mine so I chose the first one. I do have Windows XP Mode enabled on my system, but that is a virtulized environment, so does not classify as an Operating System in the true sense of the word here. If you duel/ multi or quad boot, then choose the second option. If you chose the ‘Single Boot’ option and click Next, you will come to the next window

You will now be asked to choose your method of encryption (which algorithm to use) Again, I have always chosen AES as my preferred algorithm. If you are interested in how the other algorithms will perform on your system, you can do a quick benchmark, by clicking the ‘Benchmark’ button to the right of the window. Here is what mine was based on my system specs below:

Processor Intel Core 2 Quad Q6600 @ 2.4GHz (Kentsfield 65nm)
RAM 4GB DDR2 @339MHz (5-5-5-15)
HDD 1.5TB (SATA)
Encryption Algorithm used: AES (Best method)

Next you will come to one of the most important parts. Choosing a decent password. You are advised to enter a password which at least 20 characters long consisting of upper and lower case letters plus using numbers and symbols such as (*£^!@+_|\) The maximum password length you can use is 64 characters long. I normally use somewhere between 26 and 30 for mine. Don’t use names, places, or simple ones like that, but if you have to, mix them up with upper and lower cases, numbers and symbols interspersed. The most important this to remember though is not to lose this password. You will get a chance to test this in the following steps. If your password is too short, you will be asked to improve it. It is up to you if you choose to ignore this. You can also use Keyfiles as well. For more information on using Keyfiles (images, MP3 etc) go to the Truecrypt FAQ’s. For this tutorial I didn’t, so click Next, to move on

Next, you will come to the ‘Collecting Random Data’ window. Just move your mouse around a bit (20 seconds will do) in different patterns to increase the cryptographic strength of the encryption keys, then when you are ready click Next

This will show you a portion of the keys you have just generated. Next….

The program will now create a Rescue Disk (hopefully you will never need it, but I have on one occasion, but that was down to me playing about in the registry, making windows un-bootable. Meh, you live and learn) Click Next

I personally use ImgBurn (it’s free) when burning ISOs as I trust it more than any other software in it’s category, but I will first show you the Windows 7 default burning software way and then the ImgBurn method. In either way, click OK.

If you are going to use the Windows default burner, which you probably will if you haven’t previously downloaded a similar program before, you will see the following window

Check the ‘Verify disk after burning’ box and hit Burn. It’s a fairly quick process. Once it’s completed you will see the finished window

ImgBurn Method

If you are going to use ImgBurn, (download it and run the program) open it up and choose ‘Write image file to disk’. You may want to use this should you not have a built in burner like in XP etc.

Which will lead to the next window

In ‘Source’ locate your Rescue Disk ISO, the ‘Destination’ will be your CD/DVD tray. Set the Write Speed settings to x4, (always burn disks nice and slow, so as to avoid mis-writes) check the ‘Verify’ box and then click the green arrow (start) at the bottom.

Once it’s finished you will see the success screen

Once you have done this, you will need the Truecrypt program to verify that you have indeed burned the Rescue Disk ISO to disk correctly (This is a good thing as some people may chose to skip this part, and not create one, but believe me if you ever need it, you’ll regret not having it) Click Next

Rescue Disk verified

Click Next to move on to where you will choose your ‘Wipe Mode’. Personally I always just choose the default option of ‘None’ Fastest. Hit Next to move on to the system encryption pretest.

This checks to see if you have done everything correctly thus far. If you do, don’t panic as this is a pretest and you are not actually beginning to encrypt yet. If something does go wrong (forgotten the password etc.) and you can’t boot into Windows, then press ESC which will make Windows start as normal (if you have a multi-boot set-up, choose the OS that you were doing this in) You may want to print the screen below off just in case. Hit ‘Test’ when ready.

Hit ‘OK’ and you will be asked to reboot

Once you reboot, you will see this screen (get used to this, as this is the first screen you will see every time you boot as this is where you need to input the password you created during the previous stages. Simply type it in, and hit Enter/ Return

If everything went well (and you should be fine) you will see the following window

Now, you begin to encrypt. Hit the ‘Encrypt’ button and you will be given printable instructions on how to use the rescue disk, should you need to. Print this off is if you can and keep it somewhere just in case you ever need it. If you loose it, just head over to the FAQ’s on the site or the forums for any advice on using the Rescue Disk

Once you click on ‘OK’ as shown in the image above, Truecrypt will begin to encrypt your computer.

Now, on my computer, the encryption time took about 17hrs. Decrypting (which I had to do to get these images for the tutorial) took longer at nearly 28hrs.It’s a 1.5TB disk which is quite large, so yours may be a lot quicker. Once it has finished encrypting (could take a while) you will see the final window

Just click ‘OK’ and then ‘Finish’ on the main Truecrypt window

Note: If you ever need to create an other copy of your Truecrypt Rescue Disk you can do this in the main Truecrypt menu System>Create Rescue Disk. Also, if you ever change your password for whatever reason, you must create a new Rescue Disk, as the encryption headers will be based on the current password. This also applies if you have to use the rescue disk to repair the MBR, as again the information on the disk will have the current MBR on it, that was originally written to it. More on that below in the tutorial.

That’s it, you’re done!

Some of the systems I have done have completed in under 3hrs, but that will mainly depend on the size of the HDD. I find that not running too many programs increases the speed of the encryption as it will have less interruptions. If you have a disk de-fragmentation program that runs in the background (like Smart Defragg), you may want to disable it during the initial process, although I can normally get on with working in Excel/ Word plus surfing and not have too much effect on it. One important thing to note is that once the encryption process is complete, and you use you computer as normal, you shouldn’t notice any speed slowdowns of your system, unless it’s really old. It encrypts on the fly, so once it has finished, anything you add to your computer will be encrypted without any input from you which is great. You can pause this at any time, or choose to defer the encryption process (say you need to leave the office or need to turn the machine off for some reason) and simply resume the encryption process from where you left off once you reboot. If you do choose to defer and then reboot, you will see the following window reminding you that you still need to finish the encryption process. Simply click ‘Yes’ and carry on or, in the main Truecrypt menu when you start it up, go System>Resume Interrupted Process

Now, please. Remember to make backups regularly, which you should anyway. If the worst were to happen and you lost complete access to your disk, at least you will have a recent backup of your important data.

How to decrypt your disk

This is a fairly simple procedure. In the main Truecrypt window, go System>Permanently Decrypt System Partition/ Drive

Followed by a confirmation prompt

Click Yes, when you are sure you want to decrypt the drive and let it work. Again, this may take some time; on my 1.5TB HDD it took about 20hrs, but I did pause it quite a few times, but on some of the machines at work with much smaller HDD’s it only took about 4hrs. If you have to do the decryption via the CD in an emergency, the time will be a lot longer as the read/write speeds of CD’s are much slower than your hard drive.

Now, lets have a quick look at the Rescue Disk screens. If you need to use the disk ever, make sure that you place the disk in the tray, and set your computer to boot from CD instead of the hard disk. When you do this you will see Rescue Disk screen instead of the usual ‘Password’ screen

Hit F8 to view the Rescue Disk options, or ESC to cancel this and reboot.

If you have forgotten your password, you are not going to be able to access any information again (hence you need to remember it and keep a reminder of it in a safe place) If you ever have to use the Rescue Disk to decrypt with then it can take a long time indeed (choose Option [1] Permanently Decrypt System Partition/ Drive). I tested it once and it took a fraction over 3 days to do due to it having to do it via the CD and not from the much faster HDD. But hey, if I was forced to go that route due to my OS being beyond repair, at least it’s not a total loss.

One of the reasons that people end up having to use their Rescue Disks can be down to a corrupted MBR which can be caused by many things, one of which includes flashing the firmware of your hdd. Also, using the ‘Compress this drive to save disk space’ utility in Windows will also cause you bootloader issues, but can be corrected by using this disk and restoring the bootloader that you used when encrypting originally. I would also hope that if you are a Windows 7 user, that you have at the very least created a Rescue Disk for your Windows OS. If you haven’t, then I have written a tutorial on how to create one here. Also, if you ever change your password for whatever reason, you must create a new Rescue Disk, as the encryption headers will be based on the current password.

Remove any mention of Truecrypt in the pre-boot screen

If for whatever reason you don’t want people knowing that you have either used encryption or Truecrypt as a method of encryption to be shown in the pre-boot screen, then you can do this by going

Click ‘Settings’

Check the top box ‘Do not show any text in the pre-boot authentication screen (except the below custom message) and type something in there (max 24 characters). Leave the other two at the bottom alone. This will show you a warning window. Read It. It basically tells you that you will only see a flashing cursor in the pre-boot screen, no asterisks will show as you type your password, and if you in-put your password incorrectly, you will not be told about it. It will appear to be frozen instead. So, as long as you can input your password correctly you will be fine.

Well, if you have made it this far, excellent. It’s a bit of a long winded tutorial, but I did want to try and be as thorough as I could be. I will be updating this tutorial from time to time as and when I can think of other things that may help.

If you have any questions or comments, please feel free to add them below & I will try to help, but otherwise, please use the official Truecrypt forums where the experts will guide you.

© 2011 techsupportforum.com

Filed under Security, Windows
Tagged , , , , .
  • Anonymous

     wow I use a mac an looking at all those windows screen grabs makes me feel like I was looking at something 10 years out of date

    • Guest

       Like most Mac users, you are a newb…

  • abhilash ab

    The files are safe as long as they are kept in the encrypted area. TrueCrypt is a free, cross-platform program that works  in Windows, Mac OS X and Linux distributions including Ubuntu, that you can use to encrypt your data.For more details you may please visit: “http://www.ubuntumanual.org/posts/364/secure-your-data-with-truecrypt-in-11-easy-steps”

  • Gm1924

    hey . i lost or i accidentally deleted the file i was using for an encrypted volume.. is there any way to recover the files i had in there?

  • The techniques for recovering the product was very useful and interesting.

  • Bob

    A little off topic, but you might want to try infrarecorder, free and opensource.