Using TrueCrypt (software encryption) with an SSD
Rise to the top 3% as a developer or hire one of them at Toptal: https://topt.al/25cXVn
--------------------------------------------------
Music by Eric Matyas
https://www.soundimage.org
Track title: Puzzle Game Looping
--
Chapters
00:00 Using Truecrypt (Software Encryption) With An Ssd
00:52 Answer 1 Score 1
01:27 Accepted Answer Score 16
02:54 Thank you
--
Full question
https://superuser.com/questions/358122/u...
--
Content licensed under CC BY-SA
https://meta.stackexchange.com/help/lice...
--
Tags
#ssd #encryption #truecrypt
#avk47
ACCEPTED ANSWER
Score 16
There are three main issues here: performance, SSD wear, and level of security.
Performance and SSD Wear
SandForce-based SSDs compress all data on-the-fly, in hardware, leading to some impressive performance improvements, i.e., increased write speeds. This also reduces the write-amplification factor (sometimes to below 1.0) which reduces the wear (the number of program/erase cycles) on the flash memory. If encryption is first done by software, such as TrueCrypt, the resulting data will be much less-compressible. This will reduce performance and increase wear.
Encrypting a non-SandForce SSD (or any SSD that doesn't encrypt in hardware) using TrueCrypt certainly reduces performance, but it's arguable that the SSD is not the bottleneck - the compression will be CPU-bound.
Security
Using TrueCrypt to encrypt an SSD (or any drive that has wear-levelling) can lead to security problems, so it is not recommend (although I'd argue that the risk is small).
SandForce-based SSDs and some other SSDs actually already encrypt all data on-the-fly. For the Intel 320, this can be used for full disk encryption, but it's not possible at the moment for SandForce drives:
SandForce drives, such as the Vertex 2, do encrypt the full drive contents, but do not provide [full disk encryption]. At the moment, the encryption feature is only useful for a quick secure erase of the drive.
ANSWER 2
Score 1
TrueCrypt performs encryption/decryption in RAM, so there should be no speed penalty. See TrueCrypt - Documentation:
Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM.
Edit: I think I misunderstood your question initially. There appears to be some issues with TrueCrypt and wear-leveling: http://www.truecrypt.org/docs/?s=wear-leveling