vv f
Resources  and Information Section logo
Encryption landing page logo

TrueCrypt Volume Encryption

TrueCrypt is an easy to use on-the-fly encryption tool.  It can be used to create an ecrypted volume (think of a volume as a virtual hard drive or virtual USB memory stick).

If trueCrypt is not currently installed, navigate to: http://www.truecrypt.org/downloads and download the appropriate version for your operating system.

Create an Encrypted Volume

Open TrueCrypt from the Start Menu on Windows, the Applications folder on OS X, or your launcher in Linux.

Select the Create Volume button to begin the process of creating a secured area for your files.

First Step TrueCrypt

Select Create an ecrypted file container from the window.

TrueCrypt 2nd Step

In this example, TrueCrypt is creating an encrypted container that will reside on the file system.  Only files placed in this container will be encrypted (unless another form of full-disk encryption, such as BitLocker or FileVault, is to be used).

3rd Step TrueCrypt

In this example, a Standard TrueCrypt volume will be created.  If Hidden Truecrypt volume were selected, it would create a hidden volume within a volume.  This allows for an additional layer of security.  The hidden volume would require an additional password.  More information can be found at: http://www.truecrypt.org/docs/?s=hidden-volume.

4th Step TrueCrypt

Select the area on the file system that the container will reside.  The container acts just like a normal file; it can reside on the C:\ drive or a USB memory stick.

5th Step TrueCrypt

There are different encryption algorithms that can be utilized by TrueCrypt. For the majority of UMS data, the default AES, will be sufficient. Before selecting an algorithm, ensure that there are no regulatory obligations that may require a specific level of encryption.  The Office of Information Security requires all compliant data reside on an AES-256 encrypted volume or disk. If AES-256 cannot be utilized or if it may cause undesirable performance overhead, please fill out an exception form with the CISO.

6th Step TrueCrypt

The volume size will vary per user, but ensure that there is more than enough room to adequately store any sensitive files or data.

7th Step TrueCrypt

Select a strong password to encrypt the container. It is advised to use more than 20 characters and a random mixture of upper and lower case letters, numbers, and special characters. The maximum length is 64 characters. See the password vaults page for more information on securely storing complex passwords.

8th Step TrueCrypt

Select the volume format of the drive. For many users, the default FAT, will be sufficient. Spend a minute moving the mouse and doing normal activity before selecting next as the computer is using the entropy from the computer’s activity to generate the encryption keys that will be used.

9th Step TrueCrypt

Depending on the size and format of the volume, the formatting period will vary.

10th step TrueCrypt

Congratulations!  An encrypted volume has been created on the computer.

11th step TrueCrypt

Select a drive letter (in this example, T:) that Windows will use to mount the encrypted volume.  Press Select File... and navigate to the volume created in the steps above.  Finally, press Mount.

12th Step TrueCrypt

Enter the strong password created above and press OK.

13th Step TrueCrypt

The volume is now mounted. Navigate to My Computer to use the encrypted volume just as if it were a normal drive on the computer.

Last Step TrueCrypt

 


16 Central Street Bangor, Maine 04401
Telephone: (207) 973-3201 | Fax: (207) 973-3296
Express Message: (207) 973-3399 | TTY Phone (24 Hours)(207) 973-3262