
* Hardware-accelerated AES (for more information, see the chapter Hardware Acceleration). Encryption algorithms: AES-256, Serpent, and Twofish. Hidden volume (steganography) and hidden operating system. Provides plausible deniability, in case an adversary forces you to reveal the password: Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. Encryption is automatic, real-time (on-the-fly) and transparent. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encrypts an entire partition or storage device such as USB flash drive or hard drive. Creates a virtual encrypted disk within a file and mounts it as a real disk. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the disk) in RAM. Files are automatically being decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations).


Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc). No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device).
