RuCore.NET – English Version

LUKS: analog TrueCrypt under Linux





LUKS: analog TrueCrypt under Linux

A little background. TrueCrypt is a free encryption software open source, allowing you to create as a file cryptocotylar and to encrypt entire partitions on your hard disks, removable media, and even the OS. As TrueCrypt no longer supported, but LUKS for Linux a good option for open source code that allows you to encrypt and use the encrypted data.



Data security has become one of the biggest concerns among Internet users. News about the data theft from websites has become very common, but protecting your data is not only the responsibility of the sites, there is much that we, as end users, can do for our own security. For example, only some examples are to use strong passwords, encrypted hard drives, which are located on our computers, and use a secure connection. In particular, hard disk encryption is a good way of ensuring security, it will not only protect you from any Trojans that attempt to steal your data through the network, but also from physical attacks.

LUKS (Linux Unified Key Setup) is able to encrypt the disks themselves and to create cryptocotylar directly in the files. By the way: LUKS supports a huge number of codes and nimble TrueCryptbecause it operates at the kernel level OS. Also supports the use of multiple keys and passphrases. In the framework of such standardization to the encrypted data is added to the LUKS header and this header contains all the information required for setup. When there is such a header data, so users can easily switch to any other distro.

The necessary steps

1) Put the cryptsetup package:

$ sudo apt-get install cryptsetup

2) Create an empty file for future container (e.g. 200MB):

$ fallocate -l 200M /home/user/darkthrone.avi

(weak, but at least some disguise; under music video)

3) give this file cryptomanager:

$ sudo cryptsetup -y luksFormat /home/user/darkthrone.avi

Yes dialing in the big register, YES, repeating twice for a password.

4) Open container:

$ sudo cryptsetup luksOpen /home/user/darkthrone.avi decrypt_data

5) Create a file system on it:

$ sudo mkfs.ext4 /dev/mapper/decrypt_data

6) Create a directory to mount:

$ sudo mkdir /mnt/data

7) Mount the decrypted container:

$ sudo mount /dev/mapper/decrypt_data /mnt/data

8) Recorded the necessary files in /mnt/dataand can unmount:

$ sudo umount /mnt/data

9) the Extractable container:

$ sudo cryptsetup luksClose /dev/mapper/decrypt_data

Copy the file /home/user/darkthrone.avi for example on a USB flash drive and repeat steps 4, 7 and every time when I want to use it and the steps 8, 9 to wipe a trail.

At the end

That’s all now you know how to encrypt the partition in Linux, and understand how it all works. In addition, disk encryption in Linux LUKS algorithm opens up opportunities for full encryption of the installed system.

LUKS encrypts all block device, and is therefore very well suited for protecting the contents of mobile devices such as mobile phones, removable media or hard drives of laptops. Works including section paging, so your laptop can use sleep mode or hibernate mode is completely safe.

Source: https://cryptopunks.org/ and https://ualinux.com/


24 Views



Spelling error report

The following text will be sent to our editors: