Verifying the TrueCrypt hashes

We read in a TrueCrypt link to verifying the TrueCrypt v7.1a Files hash to make sure that if we downloaded the correct or legit version of the apps.  The link states, and the purpose of our question, that  “Many sites attempt to assert the authenticity of the files they offer by posting their cryptographic hash values”.  We’ve read the link and its reference links within, but can’t quite grasp the process of verifying TrueCrypt hash.  So, as always, turning to EE; how do we do this process of “verifying”?
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

btanExec ConsultantCommented:
It is just saying as long as the download package hashes matches the hashes listed in below trusted site, then the files are indeed as-is and not malicious. There are sites that spoof the actual package and may be malicious when downloaded.

You can easily use a hash calculator to compute the hash and compare against the trusted list. The hash can be either SHA256, or SHA1. I suggest you fixed with using SHA256 in your hash calculator to compute and check the hash strings. See tool

Also you can have the exe or hash of the exe or package uploaded in the Virustotal to check if there is any AV reporting their scan has once detected it malicious - see past scan below
rayluvsAuthor Commented:
Ok, will check your links.
rayluvsAuthor Commented:
We download and installed calculator but how can we use it? I created a fiddler folder, but what's next?
10 Tips to Protect Your Business from Ransomware

Did you know that ransomware is the most widespread, destructive malware in the world today? It accounts for 39% of all security breaches, with ransomware gangsters projected to make $11.5B in profits from online extortion by 2019.

btanExec ConsultantCommented:
The next thing is to use tool to compute the hash. But look like to make it easier for you, can consider online to upload the file or another tool to specified the file dest. See

Once this alright also need some pgp tool to verify TC its .sig file or for windowa verify ita digital signature. See
rayluvsAuthor Commented:
Don't understand.  You gave us a link to view trucrypt hash which we assume it will be used with the link to download a calculator which created a fiddler folder but what do we have to do?  We went thru your last links and can't relate or to the previous links.  Are we to use the resultas of the previous links with the latest links?
btanExec ConsultantCommented:
You download the Truecrypt file.

As the fiddler plugin hash calculator does not allow file (except only string) to be hashed, it will not used in your case.

You then need to download quickhash or just use the online hash.convert to upload the file to generate SHA256.

You can then compare the generated SHA256 string with the stated hash string in If the string matches, it means the package is not tamper or corrupted.

You can then proceed to verify the .sig which I shared in below

Hopes this helps.
rayluvsAuthor Commented:
When you say "just use the online hash.convert to upload the file to generate SHA256", you mean the link you have previously (
btanExec ConsultantCommented:
Yes, pl. Pardon me.
rayluvsAuthor Commented:
Thanx.  Lastly when you say "You can then proceed to verify the .sig which I shared in below", where do find the .sig?
btanExec ConsultantCommented:
Pls see which also has even earlier version as well
rayluvsAuthor Commented:
Checked it but where it says how to verify the .sig? (tell where to look we can't located it)
btanExec ConsultantCommented:
There is mention on how to verify the signature - see
How to Verify X.509 Signatures
How to Verify PGP Signatures
rayluvsAuthor Commented:
There is a lot of read there (sorry we are in a bit of emergency), but do you know the exact steps?
(If you its ok we find a way)
btanExec ConsultantCommented:
Since it is urgent, suggest we check the below.

1. Check X.509 signatures which are currently available only for the TrueCrypt self-extracting installation packages for Windows.

2. Download the TrueCrypt self-extracting installation package (‘TrueCrypt Setup.exe’)

3. On the EXE file, click right mouse button and select ‘Properties’ from the context menu.

4. In the Properties dialog window, select the ‘Digital Signatures’ tab.

5. On the ‘Digital Signatures’ tab, in the ‘Signature list’, double click the line saying “TrueCrypt Foundation“.

6. The ‘Digital Signature Details’ dialog window should appear now.

> If you see the following sentence at the top of the dialog window, then the integrity and authenticity of the package have been successfully verified:”This digital signature is OK.”

> If you do not see the above sentence, the file is very likely corrupted.

Note: On some obsolete versions of Windows, some of the necessary certificates are missing, which causes the signature verification to fail.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
rayluvsAuthor Commented:
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.