Hello all. I'm doing a little experiment. I used the princeton cold boot attack and a few other tools to extract aes keys being used by truecrypt. I've been reading about how you can backup the truecrypt volume header (which is backing up a key) and things of that sort, but i can't seem to find out how i can input the key and decrypt a truecrypt volume with just the aes key. With the attack i obtained more than one key, so i'm assuming that i have both the private and public keys. Anyone with any knowledge about how i would decrypt this truecrypt file container using the keys, please let me know.