TrueCrypt Changelog

What's new in TrueCrypt 5.1

Mar 11, 2008
  • New features:
  • Support for hibernation on computers where the system partition is encrypted (previous versions of TrueCrypt prevented the system from hibernating when the system partition was encrypted). (Windows Vista/XP/2008/2003)
  • Ability to mount a partition that is within the key scope of system encryption without pre-boot authentication (for example, a partition located on the encrypted system drive of another operating system that is not running). (Windows Vista/XP/2008/2003)
  • Note: This can be useful e.g. when there is a need to back up or repair an operating system encrypted by TrueCrypt (from within another operating system).
  • Command line options for creating new volumes. (Linux and Mac OS X)
  • Improvements:
  • Increased speed of AES encryption/decryption (depending on the hardware platform, by 30-90%). (Windows)
  • Faster booting when the system partition is encrypted. (Windows Vista/XP/2008/2003)
  • When the system partition/drive is encrypted, the TrueCrypt Boot Loader is now stored in a compressed form and is, therefore, smaller. If a non-cascade encryption algorithm is used (i.e., AES, Serpent, or Twofish), the TrueCrypt Boot Loader is now small enough so that a backup of the TrueCrypt Boot Loader can be (and is) stored in the first drive cylinder. Whenever the TrueCrypt Boot Loader is damaged, its backup copy is run automatically instead.
  • As a result of this improvement, the following problem will no longer occur: Certain inappropriately designed activation software (used for activation of some third-party software) writes data to the first drive cylinder, thus damaging the TrueCrypt Boot Loader. The affected users had to use the TrueCrypt Rescue Disk to repair the TrueCrypt Boot Loader. This will no longer be necessary after upgrading to this version of TrueCrypt (provided that the system partition/drive is encrypted using a non-cascade encryption algorithm, i.e., AES, Serpent, or Twofish).
  • Note: If your system partition/drive is currently encrypted using a non-cascade encryption algorithm (i.e., AES, Serpent, or Twofish), a backup copy of the TrueCrypt Boot Loader will be automatically stored in the first drive cylinder when you upgrade to this version of TrueCrypt.
  • The minimum memory requirements for the TrueCrypt Boot Loader have been reduced from 42 KB to 27 KB (twenty-seven kilobytes). This allows users to encrypt system partitions/drives on computers where the BIOS reserves a large amount of memory. (Windows Vista/XP/2008/2003)
  • Many other minor improvements. (Windows, Mac OS X, and Linux)
  • Resolved incompatibilities:
  • On some computers, when performing the system encryption pretest, Windows failed to display the log-on screen. This will no longer occur. (Windows Vista/XP/2008/2003)
  • Bug fixes:
  • On some systems, drive letters were not correctly assigned to newly mounted non-system volumes. This will no longer occur. (Windows)
  • Many other minor bug fixes. (Windows, Mac OS X, and Linux)

New in TrueCrypt 5.0a (Feb 13, 2008)

  • Improvements:
  • The memory requirements for the TrueCrypt Boot Loader have been reduced by 18 KB. As a result of this improvement, the following problem will no longer occur on most of the affected computers: The memory requirements of the TrueCrypt Boot Loader 5.0 prevented users of some computers from encrypting system partitions/drives (when performing the system encryption pretest, the TrueCrypt Boot Loader displayed the following error message: Insufficient memory for encryption).
  • Bug fixes:
  • On computers equipped with certain brands of audio cards, when performing the system encryption pretest or when the system partition/drive is encrypted, the sound card drivers failed to load. This will no longer occur.
  • It is possible to access mounted TrueCrypt volumes over a network.
  • TrueCrypt Rescue Disks created by the previous version could not be booted on some computers. This will no longer occur.
  • Note: If your TrueCrypt Rescue Disk created by TrueCrypt 5.0 cannot be booted on your computer, please upgrade to this version of TrueCrypt and then create a new TrueCrypt Rescue Disk (select 'System' > 'Create Rescue Disk').
  • Many other minor bug fixes.

New in TrueCrypt 5.0 (Feb 6, 2008)

  • New features:
  • Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts). For more information, see the chapter System Encryption in the documentation. (Windows Vista/XP/2003)
  • Pipelined operations increasing read/write speed by up to 100% (Windows)
  • Mac OS X version
  • Graphical user interface for the Linux version of TrueCrypt
  • XTS mode of operation, which was designed by Phillip Rogaway in 2003 and which was recently approved as the IEEE 1619 standard for cryptographic protection of data on block-oriented storage devices. XTS is faster and more secure than LRW mode (for more information on XTS mode, see the section Modes of Operation in the documentation).
  • Note: New volumes created by this version of TrueCrypt can be encrypted only in XTS mode. However, volumes created by previous versions of TrueCrypt can still be mounted using this version of TrueCrypt.
  • SHA-512 hash algorithm (replacing SHA-1, which is no longer available when creating new volumes).
  • Note: To re-encrypt the header of an existing volume with a header key derived using HMAC-SHA-512 (PRF), select 'Volumes' > 'Set Header Key Derivation Algorithm'.
  • Improvements, bug fixes, and security enhancements:
  • The Linux version of TrueCrypt has been redesigned so that it will no longer be affected by changes to the Linux kernel (kernel upgrades/updates).
  • Many other minor improvements, bug fixes, and security enhancements. (Windows and Linux)
  • If you are using an older version of TrueCrypt, it is strongly recommended that you upgrade to this version.

New in TrueCrypt 4.3a (May 5, 2007)

  • New features:
  • Full compatibility with 32-bit and 64-bit Windows Vista:
  • Support for User Account Control (UAC).
  • All .sys and .exe files of TrueCrypt are now digitally signed with the digital certificate of the TrueCrypt Foundation, which was issued by the certification authority GlobalSign.
  • When moving the mouse on a single-CPU computer while reading or writing data to a TrueCrypt volume, the mouse pointer stopped moving for a second every few seconds. This will no longer occur. (Windows Vista issue)
  • Other minor compatibility-related changes.
  • TrueCrypt volume is automatically dismounted if its host device is inadvertently removed.
  • Important: Before you physically remove a device (such as a USB flash drive) where a mounted TrueCrypt volume resides, you should always dismount the volume in TrueCrypt first, and then perform the 'Eject' operation (right-click the host device in the 'Computer' or 'My Computer' list) or use the 'Safely Remove Hardware' function (built in Windows, accessible via the taskbar notification area).
  • Ability to write data to file-hosted volumes located on devices that use a sector size other than 512 bytes (e.g., new hard drives, DVD-RAM, some MP3 players and USB flash drives, etc.)
  • Support for devices with a GPT partition table (GUID partitions). (Windows Vista/2003/XP)
  • After a partition is successfully encrypted, the drive letter assigned to it (if any) is automatically removed. (Windows)
  • Volume name (label) is displayed in device/partition selector. (Windows)
  • New hotkey: 'Wipe Cache'. (Windows)
  • New command line switch '/q background' for launching the TrueCrypt Background Task. (Windows)
  • Improvements:
  • Portions of the TrueCrypt device driver redesigned.
  • Maximum allowed size of FAT32 volumes increased to 2 TB (note that NTFS volumes can be larger than 2 TB).
  • Traveller Disk Setup improved. (Windows)
  • Volumes hosted on read-only media will always be mounted in read-only mode. (Windows Vista/2003/XP)
  • Improved support for big-endian platforms.
  • Other minor improvements (Windows and Linux)
  • Bug fixes:
  • The built-in FAT format facility now functions correctly on big-endian platforms.
  • Improved handling of partitions and devices during volume creation. (Windows)
  • Improved handling of low-memory conditions. (Windows)
  • Fixed bug that rarely caused system errors when dismounting all volumes. (Windows)
  • Tray icon is recreated when Windows Explorer is restarted (e.g. after a system crash).
  • Other minor bug fixes. (Windows and Linux)
  • Security improvements:
  • Improved security of set-euid root mode of execution. Volume can be dismounted only by the user who mounted it or by an administrator (root). (Linux)
  • Miscellaneous:
  • The option 'Cache passwords and keyfiles in memory' in the password prompt dialog window no longer sets the default setting (to set the default setting, select Settings > Preferences and enable or disable the option 'Cache passwords in driver memory'). (Windows)
  • Removed features:
  • 64-bit block ciphers are being phased out. It is no longer possible to create new volumes encrypted with 64-bit-block encryption algorithms (Blowfish, CAST-128, and Triple DES). Note that it is still possible to mount such volumes.

New in TrueCrypt 4.3 (Mar 20, 2007)

  • Full compatibility with 32-bit and 64-bit Windows Vista
  • Support for User Account Control (UAC).
  • All .sys and .exe files of TrueCrypt are now digitally signed with the digital certificate of the TrueCrypt Foundation, which was issued by the certification authority GlobalSign.
  • When moving the mouse on a single-CPU computer while reading or writing data to a TrueCrypt volume, the mouse pointer stopped moving for a second every few seconds. This will no longer occur. (Windows Vista issue)
  • TrueCrypt volume is automatically dismounted if its host device is inadvertently removed.
  • Important: You should always dismount the volume in TrueCrypt and then use the "Safely Remove Hardware" function (built in Windows) before you physically remove the host device (e.g. a USB flash drive).
  • Support for devices and file systems that use a sector size other than 512 bytes (e.g., new hard drives, USB flash drives, DVD-RAM, MP3 players, etc.)
  • Support for devices with a GPT partition table (GUID partitions).
  • After a partition is successfully encrypted, the drive letter assigned to it (if any) is automatically removed.
  • Volume name (label) is displayed in device/partition selector.
  • New hotkey: 'Wipe Cache'.
  • New command line switch '/q background' for launching the TrueCrypt Background Task.
  • Portions of the TrueCrypt device driver redesigned.
  • Maximum allowed size of FAT32 volumes increased to 2 TB (note that NTFS volumes can be larger than 2 TB).
  • Traveller Disk Setup improved.
  • Volumes hosted on read-only media will always be mounted in read-only mode.
  • Improved support for big-endian platforms.
  • The built-in FAT format facility now functions correctly on big-endian platforms.
  • Improved handling of partitions and devices during volume creation.
  • Improved handling of low-memory conditions.
  • Fixed bug that rarely caused system errors when dismounting all volumes.
  • Fix: Tray icon is recreated when Windows Explorer is restarted (e.g. after a system crash).
  • Other minor bug fixes

New in TrueCrypt 4.2a (Jul 4, 2006)

  • Writing to a TrueCrypt volume under Linux no longer causes the system to stop responding under certain conditions.
  • Occasional application errors no longer occur when selecting a file (Windows XP SP2 issue).
  • Fixed bug that caused installation of the TrueCrypt driver to fail under certain configurations of 64-bit Windows.
  • TrueCrypt volumes mounted in a remote session under Windows 2000 can now be accessed.
  • TrueCrypt Volume Creation Wizard no longer blocks hot keys of certain applications. (Windows)
  • Other minor bug fixes (Windows and Linux)
  • It will not be required to reinstall the TrueCrypt kernel module after every minor Linux kernel update.
  • Support for latest Linux kernel (2.6.17)
  • Other minor improvements (Windows and Linux)
  • The Linux version of TrueCrypt now uses the TrueCrypt Random Number Generator (ported from the Windows version of TrueCrypt) instead of using only the Linux built-in random number generator. (This change was necessary due to a flaw in the Linux built-in random number generator: Data from the mouse and keyboard, which are the most important sources of random data, are not read by the Linux built-in random number generator when the user has only a USB mouse/keyboard.)
  • Note: The Linux version of TrueCrypt still uses the Linux built-in random number generator. However, it is now merely one of the data sources used by the TrueCrypt random number generator.
  • When the �Never Save History� option is enabled, TrueCrypt sets its �current directory� to the user�s home directory (in traveller mode, to the directory from which TrueCrypt was launched) after a container or keyfile is selected via the Windows file selector. Therefore, the Windows file selector will not �remember� the path of the last selected container or keyfile. (Windows)