Back

 

Guibord Technical Writing Services, Inc.

 

 

 

Secure Data Transmission

2016 © Guibord Technical Writing Services, Inc. 

 

 

Two excellent choices for transmitting confidential data over the Internet:

 

VeraCrypt; a freeware product

In our opinion, the best encryption software ever to this date of writing (October 4, 2016)

Open Source Software and Cyber Defense — A White Paper provided to the National Security Council and Homeland Security Council as input to the White House Review of Communications and Information Infrastructure.

 

PKWARE (PKZIP); a commercial product

 

 

______________________________________________

 

 

 

Password strength is a function of password length, complexity and the sets of symbols that make up the password.

 

The best approach for lengthy passwords is the use of a paraphrase. Here is an example of a paraphrase. It contains 43 symbols (characters) and makes use of 4 sets of symbols, yet it is fairly easy to remember:

 

My_5-star_(*****)_hotel_is_worth_$7,777,777

 

43 symbols out of 4 sets of symbols totalling 94 different symbols (lower-case and upper-case Latin letters, digits and special symbols); in other words, 9443 possible combinations. The time required to decode this password is 2.22 X 1071 years — at a rate of 1 million passwords per second.  

 

 

______________________________________________

 

 

 

"While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks" —Post-quantum cryptography.

 

Current advances on password cracking: Project RC5