Posted 26 September 2008 - 12:16 AM
This topic is very near violating board rules. It may get closed.
The two keys you have are the TrueCrypt key and the XTS tweak key.
The implementation of this attack does not require the keys to be "cracked".
Merely fed back to the TC process that was running on a mounted encrypted
drive when the power was cut.
For TC 4 you also need the LRW tweak key.
If you manage to get a password it may only be the password for
the outer container. You still need a password for the inner container.
And if you mange to get both of those, TC can be configured to use
a "key file". Without access to the keyfile you still will not be able
to open the encrypted file. (container)
FYI - on a simple single desktop machine, trying to crack a 7 letter
password would take about 37 years.
So far AES has not been cracked.
Current systems: WHAT OS, BackTrack-raw, PCLinuxOS, Peppermint OS 6, Kali Linux
and a custom Linux From Scratch server hosting a bunch of top secret stuff.