![]() # TCRYPT: trying KDF: pbkdf2-ripemd160-2000. ![]() # Reading TCRYPT header of size 512 bytes from device /tmp/testvolume. ![]() # Detected kernel Linux 6.1.25-hardened1-1-hardened x86_64. # Crypto backend (OpenSSL 3.0.8 ) initialized in cryptsetup library version 2.6.1. Enter passphrase for /tmp/testvolume: # Trying to load TCRYPT crypt type from device /tmp/testvolume. # Interactive passphrase entry requested. # Initialising device-mapper backend library. # Trying to open device /tmp/testvolume without direct-io. # Trying to open and read device /tmp/testvolume with direct-io. # Allocating context for crypt device /tmp/testvolume. en/cryptic-disk/whatsnew/5.Output with -debug option: /usr/bin/cryptsetup open -type tcrypt /tmp/testvolume testname -key-file /tmp/testkey -debug # cryptsetup 2.6.1 processing "/usr/bin/cryptsetup open -type tcrypt /tmp/testvolume testname -key-file /tmp/testkey -debug" # Verifying parameters for command open. Generated keyfiles are much more secure than passwords or ordinary files.ĭownload the latest version of Cryptic Disk from:Ĭomplete list of changes in Cryptic Disk 5.0 is available at: It’s not possible to brute force a key of such length (524288 bit). One should move his mouse cursor chaotically to provide the necessary level of randomness for a keyfile contents.Ĭryptic Disk generates keyfiles of 64 Kb size. Keyfiles generatorĬryptic Disk now contains Keyfiles Generator that can be opened with “Tools - Keyfile Generator” menu. Cryptic Disk automatically detects TrueCrypt format, thus no additional actions from a user are required. The described way of using security tokens and smart cards (and ususal keyfiles) is also applicable to the TrueCrypt container format. It can be accessed via menu “Tools - Manage Security Token Keyfiles…“. Managing security token keyfilesĬryptic Disk keyfiles manager lets you control keyfiles on a security token or a smard card. One is also able to close all sessions manually via menu “Tools - Close All Security Token Sessions”. ![]() This behaviour can be changed in the app preferences “Mount Options - Close token session (log out) after a volume is successfully mounted”. If you entered the PIN code correctly Cryptic Disk will not ask it again as the session with the token will be cached. If you already have such device with keyfiles, select menu item “Add Token Keyfile…” when mounting as it’s displayed on the picture:Ĭryptic Disk will ask for a PIN code to the device and let you choose keyfiles that are to be used when mounting. Such devices are protected with a PIN code while keyfiles are protected from loss, stealing or unauthorized copying. Support of hardware security tokens and smart cardsĬryptic Disk 5.0 is able to save and use keyfiles on hardware security tokens and smart cards. The support of TrueCrypt keyfiles was also added as well as the user interface was adapted to help people with disabilities more enjoy the power and simplicity of Cryptic Disk. We have increased the level of security protection by adding the support of hardware security tokens and smart cards. We’re happy to inform you about a new release of Exlade Cryptic Disk 5.0.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |