TrueCrypt Instruction Sets

Zephyrus's picture

These instruction sets are for using TrueCrypt to create virtual encrypted drives for storing sensitive information. As discussed in my proposal, the novice user that is targeted with the QuickStart guide would be the manager of a small business that doesn't have an IT-person on staff, but still wants to encrypt sensitive business information. The quick start guide I've created is a step by step guide to using TrueCrypt to set up a virtual encrypted drive with the default settings. This user doesn't need the extra functionality of changing encryption algorithms, cascading algorithms, implementing plausible deniability, and using keyfiles. They are only interested in a basic implementation of encryption.

The expert user targeted with the User Manual is an IT-staff person looking for the highest level of encryption schemes available and will need to know about TrueCrypt's advanced functionality discussed above. The User Manual is laid out by concepts and is indexed at the beginning with a table of contents, instead of step-by-step instructions. This allows the expert user who already can use a Windows wizard to create an encrypted drive the flexibility to implement TrueCrypt's advanced features to maximize and meet their companies security needs.

The usability test included has a separate test for each instruction set (one document mark up, and one read-and-locate test), and the feedback should be left as comments on this blog as indicated in that document.

Very Cool! I will try this

JFlitt's picture

Novice:

1.a – After choosing Create an encrypted file container and clicking next a message box popped up informing me that I had administrative privileges and that I may want to rerun the program without administrative privileges. This wasn’t mentioned in your instructions, just thought I would let you know about it!

Also, you may want to start your instructions with 1a rather than 1 then 1a, 1b, etc…!

Other than that popup window these instructions went very well, each step was thoroughly explained and the screenshots made it much easier to identify what you were referring to.

The part 2 section of these instructions is also very easy to read and each step is simple to follow. I’m not sure that it is completely necessary but it might be worth labeling each of your screenshots just to ensure the user is looking at the correct one for each step.

Expert:

1. The usage of multiple encryption algorithms was very easy to find thanks to your table of contents. This allowed me to go directly to the “Encryption Algorithms” section to locate this information.
2. Same as above the table of contents enabled me to find the information on the whirlpool hash with ease.
3. Same as the above two steps the table of contents is where I started looking and it lead me directly to the “Keyfiles” section of your instructions, it where here that I found these steps to create a keyfile.
4. Hidden Volumes and Random Data are the two plausible deniability layers
5. Three advantages are explained in these instructions, including protection from key loggers and improved protection against brute force attacks.

The table of contents really helps to identify each section of your instructions. The sections are also clearly defined and I had no trouble at all locating each one.

Very well done and this is an interesting technology I haven't worked with before!

Thx

JFlitt

Impressive

jstn's picture


Initial thoughts: very impressive, Zeph. I will test these instructions out over spring break.

TrueCrypt Usability Test Results

jstn's picture


Novice Instructions: Document Markup Usability Test

I had no difficulty in following your novice instructions. Each step was clear and precise. The hierarchical format of the instructions promotes readability and understanding. However, one suggestion I would make is to include, where possible, full screenshots. Those that you’ve provided are accurate, but only show a portion of the current screen that a user is at. Whereas this would suffice for expert users, I anticipate that novice users will appreciate and benefit from an exact screenshot. Also, some of your individual steps are a bit lengthy. Although each proves to present enough information to be clear, I think that some of the more wordy steps could benefit by bolding the more important directions so as to further guide the reader’s attention to the correct place.

Expert Instructions: Read and Locate Usability Test

1. The steps to use multiple encryption algorithms on an encrypted drive
Section 2.4 Cascading Multiple Algorithms. The layout of your expert instructions made it easy to find the steps to use multiple encryption algorithms on an encrypted drive.

2. Information on the Whirlpool hashing algorithm
Section 3.3 Whirlpool. It was easy to find information on the Whirlpool hashing algorithm. Section 3 Hash Algorithms is readily found and, from there, the Whirlpool section follows.

3. The steps to generating a random Keyfile
Section 4.1 Using Keyfiles, step 2b. The specific step of generating a random keyfile was the most difficult to locate of the feedback you’ve requested, but still not hard by any means. Traversing through section 4.1 Using Keyfiles quickly returns how to generate a random keyfile.

4. Identify the two layers of plausible deniability TrueCrypt provides
Section 1.1 Hidden Volumes and 1.2 Random Data. It was extremely easy to located the layers of plausible deniability in your expert instructions.

5. Identify two advantages of using Keyfiles
Section 4 Keyfiles (Intro). It was easy to located the 3 advantages of using keyfiles that you’ve outlined in your expert instructions.