RE: IT Department having the secure key.

2009-07-27 Thread Jim Hendrick
Although it is controversial, look into key escrow. One possibility is to allow (require via policy?) users to encrypt data to a single central escrow key (that you store offline) in addition to any other keys they use. Then if recovery is required, the escrow key can be used to decrypt the data.

RE: cloudy understanding of asymmetric cryptography

2009-03-26 Thread Jim Hendrick
Yup - you got it. Symmetric encryption is *way* faster (that's a technical term :-) than asymmetric. Hence the slower version is used to exchange a random key that is then used to handle the encryption/decryption of the data. Algorithms are implementation dependent but it is common to use 3DES for

RE: storing password lists in mails to myself on IMAP?

2007-02-13 Thread Jim Hendrick
What you are doing works. But take a look at password safe (Bruce Schneier & Counterpane labs). Also Password Gorilla (compatible w/ password safe) If you are truly paranoid, you could encrypt and email the safe back and forth w/ gpg, or carry it on a USB stick. > -Original Message- > F