How would you change a Truecrypt password back to the original after it has changed?

BirdDad

Golden Member
Nov 25, 2004
1,131
0
71
When the original password is known?
How would I do this?
I know most of the new one but not all there are like 6 digits/characters giving me trouble-everything else is known.
Thanks
 

BirdDad

Golden Member
Nov 25, 2004
1,131
0
71
then why is there a warning when you change the password that if an enemy has the old password then it makes it useless to change the password when you change the password in TC?
 

BirdDad

Golden Member
Nov 25, 2004
1,131
0
71
From the TC manual :
Otherwise, an attacker could decrypt your system partition/drive using the old password
 

Essence_of_War

Platinum Member
Feb 21, 2013
2,650
4
81
When TrueCrypt creates an encrypted volume, it does so by creating a master-key to encrypt the volume, and then encrypting the master-key with the user-key (password).

In this way, it's really fast to change passwords. You don't have to re-encrypt the whole volume when the user's key changes, you only have to re-encrypt the master-key.

What TrueCrypt is warning you about in that message, is if an adversary has stolen your user-key and compromised the master-key, then simply changing your user-key will not protect your encrypted volume. One way to compromise the master-key might be to dump ram from your laptop while the truecrypt volume is "open", allowing the adversary to sniff through RAM contents looking things that look like AES keys (presumably they could do this also with Serpent or Twofish or what have you, but it may be harder).

The situation you're in is different. You haven't compromised your master-key. You HAVE changed from user-key-01 to user-key-02. You've forgotten user-key-02, but you recall user-key-01. If TrueCrypt is implemented correctly, knowing user-key-01 at this point is uselss, since the master-key is presently encrypted with user-key-02, and the master key is uncompromised.

Unless you can guess user-key-02, either by trying to figure it out by luck or trying to bruteforce it with something like hashcat, or you know of a good side-channel attack on truecrypt, or you know of a backdoor to AES, the data is gone.
 
Last edited:

Essence_of_War

Platinum Member
Feb 21, 2013
2,650
4
81
I thought I gave you an example above?

If someone knows your user-key, they could extract your master-key from your volume.

Alternatively, if they have access to a machine where you have an "open" encrypted volume, they can dump RAM contents and find the master-key, which is unencrypted in RAM when you're working with a volume.
 

BirdDad

Golden Member
Nov 25, 2004
1,131
0
71
I thought I gave you an example above?

If someone knows your user-key, they could extract your master-key from your volume.

Alternatively, if they have access to a machine where you have an "open" encrypted volume, they can dump RAM contents and find the master-key, which is unencrypted in RAM when you're working with a volume.

Then how would I go about extracting the master key from my own volume?
Not talking about the pointer in RAM.
 

Essence_of_War

Platinum Member
Feb 21, 2013
2,650
4
81
It sounds like you're not following what I'm saying.

IF you know the user-key AND you have access to the encrypted volume you can compromise the master-key.

IF you have access to the machine while the encrypted volume is open, then you can dump RAM to get the master-key.

You neither know the current user-key, nor do you have the encrypted volume open, so you cannot compromise the master-key.
 

John Connor

Lifer
Nov 30, 2012
22,757
618
121
If you know a password before the password was changed and have the boot loader recovery disk you could use that. That's why they say that when you change your password that you make a new boot loader recovery disk and destroy the old one because that old password with the boot loader disk can be used to decrypt the drive.