1. Create the key file to be used for encrypting the disk:
truecrypt --create-keyfile \ --random-source=/dev/urandom \ /etc/tc-keyfile
2. Change permissions on the key file:
chmod 600 /etc/tc-keyfile
3. Encrypt the disk with AES/SHA-512 encryption scheme (this may take a long time (hours) for larger disks, especially if chain encryption schemes are used, e.g. AES-Twofish-Serpent):
truecrypt --filesystem=none \ --volume-type=normal \ --encryption=AES \ --hash=SHA-512 \ --random-source=/dev/urandom \ --keyfiles=/etc/tc-keyfile \ --password="" \ --create /dev/disk/by-id/[YOUR_DISK_ID_HERE]
4. Mount the encrypted disk: no defined filesystem, no password, a pre-created key file, slot=2 (maps the disk to /dev/mapper/truecrypt2),
truecrypt \ --mount \ --filesystem=none \ --password="" \ --keyfiles=/etc/tc-keyfile \ --protect-hidden=no \ --slot=2 \ /dev/disk/by-id/[YOUR_DISK_ID_HERE]
5. List encrypted disks
truecrypt --list
This should produce the output similar to the below:
2: /dev/disk/by-id/ABC /dev/mapper/truecrypt2 -