Caporegime
- Joined
- 12 Mar 2009
- Posts
- 26,779
dmpoole is a journo?! 

Would love to know what it is you're doing to need this though?![]()
That's not the password, that is it's hash key. That's how many systems check your password, they don't store the password directly, they store its hash key. That implies it is possible to unlock the computer using another password, since the hash map is many to one, but it avoids security issues like someone using a tool to scan your drive for the explicit password. After all, you can't put all your passwords in an encrypted folder, how would the computer decrypt the folder to check if the password for decrypting the folder is right?Alternatively - the password has to be stored somewhere on the system, usually in an encrypted folder. If you break that encryption then you have the password. I don't know about Windows or other operating systems but on Linux it's usually either MD5 or SHA1. MD5 can be broken relatively easily, SHA is a lot harder.
Picking a good 'random' 8~10 character password is enough for such purposes I'd imagine. You have to consider what you're encrypting. Yes, in an ideal world we'd all use 50 digit gibberish as our passwords but we're stupid and lazy. Fortunately, at present, the amount of effort needed to break a password people can remember (8~10 characters) is too much bother for most purposes.I need some figures for work.
I work in a Medico Legal department and daily we send out disks to Solicitors containing Medical Records and according to the chart it would take an average computer up to 57 years to find it.
Email passes through a lot of servers, including outside the country and thus our jurisdiction. For something like someone's medical records it might be overly paranoid but anyone working in securities or defence would at the very least use some high level encryption on their emails. In my experience some companies prefer to post by courier encrypted hard drives which then have some weird formatting or file type which needs some addition information to open, even if you decrypt them.I also send out password protected documents in email and for some reason 'the powers that be' think that it's safer sending in the post than in email![]()
Well, best case scenario.
Password protected documents? You mean the password protection that comes with Word for example? That really isn't safe - no-one would bother brute forcing those passwords as there are easier ways around them. Post i.e. recorded delivery is much safer (though even then I'd send encrypted media). If you want to use email to send confidential documents you should really be looking at government approved encryption software - there are probably legal requirements surrounding the level of encryption protection for this type of data.
We always PDF and use the encryption with Adobe Professional.
We use a combination of numbers, uppercase, lowercase & symbols.
The disks automatically encrypt when wrote with a programme called Safeguard.
Neither of the products you mention appears on the CESG approved list: http://www.cesg.gov.uk/products_services/iacs/caps/index.shtml - but then I don't know if it has to for medical records.
I don't understand how people are reaching the conclusions that they're reaching (timewise).
So a file encrypted using adobe professional will take the same amount of time it would to crack a file encrypted with truecrypt (aes/twofish/serpent encryption, ripemd-160 hash alg for instance), assuming they're using the same passphrase/number of chars?.
Surely people need details of the method of encryption used by adobe professional?.
I'm rocking 24 char pw's in truecrypt atm, and now I'm slightly worried lol. Not that I have much to hide, but I would at least like it to work..