

Secure Data Transmission 2016 © Guibord Technical Writing Services, Inc.
Two excellent choices for transmitting confidential data over the Internet:
VeraCrypt; a freeware product In our opinion, the best encryption software ever to this date of writing (October 4, 2016)
PKWARE (PKZIP); a commercial product
______________________________________________
Password strength is a function of password length, complexity and the sets of symbols that make up the password.
The best approach for long passwords is the use of a paraphrase. Here is an example of a paraphrase. It contains 43 symbols (characters) and makes use of 4 sets of symbols, yet it is fairly easy to remember:
My_5star_(*****)_hotel_is_worth_$7,777,777
43 symbols out of 4 sets of symbols totalling 94 different symbols (lowercase and uppercase Latin letters, digits and special symbols); in other words, 94^{43} possible combinations. The time required to decode this password is 2.22 X 10^{71} years — at a rate of 1 million passwords per second.
______________________________________________
"While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks" —Postquantum cryptography.
Current advances in password cracking: Project RC5
