The TL;DR is that based on this audit, Truecrypt appears to be a relatively well-designed piece of crypto software. The NCC audit found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances.
That doesn't mean Truecrypt is perfect. The auditors did find a few glitches and some incautious programming -- leading to a couple of issues that could, in the right circumstances, cause Truecrypt to give less assurance than we'd like it to.
The most significant issue found involved TrueCrypt continuing to generate keys in a rare instance where the Windows Crypto API fails to initialize. This is not necessarily insecure because TrueCrypt "still collects entropy from sources such as system pointers and mouse movements."
In addition to the RNG issues, the NCC auditors also noted some concerns about the resilience of Truecrypt's AES code to cache timing attacks. This is probably not a concern unless you're [performing] encryption and decryption on a shared machine, or in an environment where the attacker can run code on your system (e.g., in a sandbox, or potentially in the browser). Still, this points the way to future hardening of any projects that use Truecrypt as a base.
One project that could benefit from the audit's findings is VeraCrypt, a freeware fork of TrueCrypt licensed under the Microsoft Public License and also subject to the TrueCrypt License, which uses a substantial amount of TrueCrypt code. Matthew Green has speculated that the intent of the TrueCrypt developers' licensing and shutdown decisions was to stir uncertainty over the project and force new disk encryption projects to start from scratch.
For additional analysis of the audit, see the articles by ArsTechnica's Dan Goodin, the Register and Threatpost.
(Score: 3, Interesting) by FatPhil on Friday April 03 2015, @10:45PM
I wonder what could cause the Crypto API to fail to initialise?
If it's something untoward, something malicious, could it also not subvert the Windows Crypto API after it's been initialised?
Which leads me to the question - how well does TrueCrypt behave if the Windows Crypto API *has* been subverted?
It's paranoia all the way down...
Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
(Score: 0) by Anonymous Coward on Saturday April 04 2015, @12:57AM
I wonder what could cause the Crypto API to fail to initialise?
Space background radiation hitting your RAM at an inopportune time. No, I'm not kidding, it's astronomically unlikely but RAM bits can rarely get flipped like that.
More likely potential points of failure include messed up system libraries (usually by user incompetence or filesystem corruption), bugs in a future release of the library and broken third-party software.
(Score: 2) by takyon on Saturday April 04 2015, @01:04AM
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: 2) by FatPhil on Sunday April 05 2015, @09:43AM
Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves