Post-Cryptanalysis, TrueCrypt Alternatives Step Forward (Threat Post)
Threat Post takesa look at two TrueCrypt forks, VeraCrypt and CipherShed. AlthoughTrueCrypt development was discontinued last year, the code underwent a twophase audit and passed with a relatively clean bill of health."VeraCrypt and CipherShed have addressed many of the shortcomingsidentified not only by the audit, but by others who have scrutinized theTrueCrypt code in recent years. VeraCrypt's [Mounir] Idrassi, for example,said he replaced TrueCrypt's lone support of the RIPEMD-160 algorithm withSHA-256 support for system encryption. He said VeraCrypt has also tried tosimplify the build process, especially for Linux and Mac OS X systems, sothat other less common configurations could be used." The results of the audit of TrueCrypt are available in PDF format; phase1 was completed in February 2014, and phase2 was completed March 2015.