[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Cryptography] Best/simplest document encryption
- From: Henry Baker <hbaker1 AT pipeline.com>
- Subject: [Cryptography] Best/simplest document encryption
- Date: Thu, 21 Mar 2019 13:54:14 -0700
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=dk12062016; d=pipeline.com; b=lmeeFKEOyCmB/iL9ldBUgIkgqhEUaxDNFJ/BJKNYPkLWB5sluD9jyBuCw2PNakmV0nxhE/Xpy5G56FoSLTEepp+L6MIGDQN0ocYA54pfWtAoJ/t+3qMtZG1jNHoj9I+EL2WgNDhgp29lIUXv+AVIROdZoKJpDpYJyYo02Kv7PkRKrZCBtZsJmNSCrk+s5kACnCyDvNk+QyJssDzXiMLIYb7fFB4FT0hTyOCgh8GFYsoC4iTjgMVLhh288Gge7C47fDt1KQs9CJWpPynTgt6mFcmLnJnLEtXQR6FAzNpdQMKdKZy8HqeknCVmtX/XqD82riI8nfnAaDNQ6HFcDCP9zw==; h=Received:X-Mailer:Date:To:From:Subject:Mime-Version:Content-Type:Message-ID:X-ELNK-Trace:X-Originating-IP;
- List-archive: <http://www.metzdowd.com/pipermail/cryptography/>
- Sender: "cryptography" <cryptography-bounces+ben=bentasker.co.uk AT metzdowd.com>
- To: cryptography AT metzdowd.com
Here's the most basic crypto question of all:
What is the best (most secure & easiest to
use) system for *non-crypto* people to use
who have different platforms?
I.e., there are *senders* and *receivers*:
Senders can encrypt & send from a number of
different platforms: Windows, MacOs, Linux,
iPhone, Android. Document can be anything
from a text file to a (small) movie.
Receivers can decrypt & receive on the
I don't trust Chrome or Firefox to do the
encryption/decryption, but I'm happy to let
them do the transmission of the encrypted
I would love to use an open source system
if one exists, and I'd love to be able to
do a *reproducible build* of such a system.
For this purpose, I'm primarily interested
in commercial secrets, but these secrets
could conceivably be worth > $1 million.
Obviously, I can't control what happens if
either the sender's or receiver's platform
is compromised, but I would like to force
the sender & receiver to actually type in
a password/passphrase that they can exchange
via a 2FA (e.g., a phone call).
For this particular application, a symmetric
key system might be adequate.
It might be a good thing if the encryption
program kept a history list of salted hashed
passphrases to make sure that the user never
used any of these again.
The cryptography mailing list
cryptography AT metzdowd.com