Secure Data Transmission
2016 © Guibord Technical Writing Services, Inc.
Two excellent choices for transmitting confidential data over the Internet:
VeraCrypt; a freeware product
In our opinion, the best encryption software ever to this date of writing (October 4, 2016)
Open Source Software and Cyber Defense — A White Paper provided to the National Security Council and Homeland Security Council as input to the White House Review of Communications and Information Infrastructure.
PKWARE (PKZIP); a commercial product
Password strength is a function of password length, complexity and the sets of symbols that make up the password.
The best approach for lengthy passwords is the use of a paraphrase. Here is an example of a paraphrase. It contains 43 symbols (characters) and makes use of 4 sets of symbols, yet it is fairly easy to remember:
43 symbols out of 4 sets of symbols totalling 94 different symbols (lower-case and upper-case Latin letters, digits and special symbols); in other words, 9443 possible combinations. The time required to decode this password is 2.22 X 1071 years — at a rate of 1 million passwords per second.
"While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks" —Post-quantum cryptography.
Current advances on password cracking: Project RC5