• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 263
  • Last Modified:

Verifying the TrueCrypt hashes

We read in a TrueCrypt link to verifying the TrueCrypt v7.1a Files hash to make sure that if we downloaded the correct or legit version of the apps.  The link states, and the purpose of our question, that  “Many sites attempt to assert the authenticity of the files they offer by posting their cryptographic hash values”.  We’ve read the link and its reference links within, but can’t quite grasp the process of verifying TrueCrypt hash.  So, as always, turning to EE; how do we do this process of “verifying”?
0
rayluvs
Asked:
rayluvs
  • 8
  • 7
1 Solution
 
btanExec ConsultantCommented:
It is just saying as long as the download package hashes matches the hashes listed in below trusted site, then the files are indeed as-is and not malicious. There are sites that spoof the actual package and may be malicious when downloaded.
https://defuse.ca/truecrypt-7.1a-hashes.htm

You can easily use a hash calculator to compute the hash and compare against the trusted list. The hash can be either SHA256, or SHA1. I suggest you fixed with using SHA256 in your hash calculator to compute and check the hash strings. See tool
http://www.mcafee.com/sg/downloads/free-tools/hash-calculator.aspx

Also you can have the exe or hash of the exe or package uploaded in the Virustotal to check if there is any AV reporting their scan has once detected it malicious - see past scan below
https://www.virustotal.com/en/file/e95eca399dfe95500c4de569efc4cc77b75e2b66a864d467df37733ec06a0ff2/analysis/1431421999/
0
 
rayluvsAuthor Commented:
Ok, will check your links.
0
 
rayluvsAuthor Commented:
We download and installed calculator but how can we use it? I created a fiddler folder, but what's next?
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
btanExec ConsultantCommented:
The next thing is to use tool to compute the hash. But look like to make it easier for you, can consider online to upload the file or another tool to specified the file dest. See

http://hash.online-convert.com/sha256-generator
https://sourceforge.net/projects/quickhash/

Once this alright also need some pgp tool to verify TC its .sig file or for windowa verify ita digital signature. See

https://www.truecrypt71a.com/documentation/miscellaneous/digital-signatures/

https://gpgtools.tenderapp.com/discussions/problems/10359-truecrypt-pgp-key-verification#comment_28129801
0
 
rayluvsAuthor Commented:
Don't understand.  You gave us a link to view trucrypt hash which we assume it will be used with the link to download a calculator which created a fiddler folder but what do we have to do?  We went thru your last links and can't relate or to the previous links.  Are we to use the resultas of the previous links with the latest links?
0
 
btanExec ConsultantCommented:
You download the Truecrypt file.

As the fiddler plugin hash calculator does not allow file (except only string) to be hashed, it will not used in your case.

You then need to download quickhash or just use the online hash.convert to upload the file to generate SHA256.

You can then compare the generated SHA256 string with the stated hash string in defuse.ca. If the string matches, it means the package is not tamper or corrupted.

You can then proceed to verify the .sig which I shared in below
https://www.truecrypt71a.com/documentation/miscellaneous/digital-signatures/

Hopes this helps.
0
 
rayluvsAuthor Commented:
When you say "just use the online hash.convert to upload the file to generate SHA256", you mean the link you have previously (http://hash.online-convert.com/sha256-generator)?
0
 
btanExec ConsultantCommented:
Yes, pl. Pardon me.
0
 
rayluvsAuthor Commented:
Thanx.  Lastly when you say "You can then proceed to verify the .sig which I shared in below", where do find the .sig?
0
 
btanExec ConsultantCommented:
Pls see https://github.com/DrWhax/truecrypt-archive which also has even earlier version as well
0
 
rayluvsAuthor Commented:
Checked it but where it says how to verify the .sig? (tell where to look we can't located it)
0
 
btanExec ConsultantCommented:
There is mention on how to verify the signature - see
How to Verify X.509 Signatures
How to Verify PGP Signatures

https://www.truecrypt71a.com/documentation/miscellaneous/digital-signatures/
0
 
rayluvsAuthor Commented:
There is a lot of read there (sorry we are in a bit of emergency), but do you know the exact steps?
(If you its ok we find a way)
0
 
btanExec ConsultantCommented:
Since it is urgent, suggest we check the below.

1. Check X.509 signatures which are currently available only for the TrueCrypt self-extracting installation packages for Windows.

2. Download the TrueCrypt self-extracting installation package (‘TrueCrypt Setup.exe’)

3. On the EXE file, click right mouse button and select ‘Properties’ from the context menu.

4. In the Properties dialog window, select the ‘Digital Signatures’ tab.

5. On the ‘Digital Signatures’ tab, in the ‘Signature list’, double click the line saying “TrueCrypt Foundation“.

6. The ‘Digital Signature Details’ dialog window should appear now.

> If you see the following sentence at the top of the dialog window, then the integrity and authenticity of the package have been successfully verified:”This digital signature is OK.”

> If you do not see the above sentence, the file is very likely corrupted.

Note: On some obsolete versions of Windows, some of the necessary certificates are missing, which causes the signature verification to fail.
0
 
rayluvsAuthor Commented:
Thanx
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

  • 8
  • 7
Tackle projects and never again get stuck behind a technical roadblock.
Join Now