"Nick Steinmetz" <[email protected]> wrote in message
news:[email protected]
> Are there plans in place to support a strong form of encryption for
> document files, such as RC4? Currently the only type supported is the
> MS Office 97 format which has known vulnerabilities.

May I ask specifically what "vulnerabilities" you are referring to?  I 
am genuinely interested and would like to follow up on them for my own 
edification.  I've found myself with misplaced loyalties before, so ... 
<g>.

I don't know the answer to your question and am not in a position to 
know the answer but there are some vagueries in your query that bear 
either confirmation or clarification.

--  I wasn't aware that Office97 provided any protection method that 
wasn't also a part of the windows operating system.  Windows has come a 
long, long ways since the days of Office 97 and whatever version of 
windows it happened to run on starting with windows 3.1 IIRC all the way 
up to at least XP and possibly Vista with compatability modes.

RC4, or ARC4 is definitely NOT a fully validated, strong security method 
of encryption.  In some cases, it is not much more secure than say ROT13 
is.  RC4 is used for things like Secure Socket Layer, the SSL used on 
web sites and so on.
   It's also non-random, so for instance, although this is a slight 
exaggeration,  discovering which codes might be vowels is relatively 
easy.  Once you've found and verfieid a letter or two, the 
non-randomness means the rest of the patterns become quickly clear. 
Obviously it's not quite that simple, but in comparison to XP's 
capability or Blowfish, it's almost a trivial encryption method.

--  XP's encryption algos are actually pretty tight, though AFAIK still 
at 128 bits, not 256 as some are.  I have heard 256 might show up in 
win7 and I don't know if it did in Vista or not.
   That said however, EFS (XP encryption) is extremely secure and 
reliable.  Without posession of the cert keys in fact, simply 
reformatting a hard drive will make the data unavailable to anyone until 
the original keys it was encrypted under are provided to it.  Your 
account password is a lot more likely to be compromised than the 
encrypted data in fact and becomes the weak link in on-machine theft 
because the data is unencrypted as it's moved almost anywhere.
    In their infinite wisdom, MS botched providing sufficient collateral 
information in the right places for EFS key/cert protection, and thus 
some people believe it loses data on them, but it does not.  Its 
reliability is stellar, and especially more so when coupled with a 
properly entrenched and competent backup strategy.  But if you didn't 
export and keep those keys, it's highly unlikely the data will ever be 
restored again.  Period.  All in all, it's very good protection as long 
as it's also covered with a very strong password.

Open Office, IIRC, uses Blowfish algorithms, does it not?  128 bit, I 
think.  Those aren't too shabby at all, actually.  Between OOo's algos 
and adding XP's algos to that, would remove easy access to the raw data 
in XP, but it should create a pretty darned strong protection.  There 
are also some decent 3rd party apps for encryption, but they all have 
their cons, especially in that you can simply copy an encrypted file to 
another drive or machine anywhere and unencrypt it with just a password.

Anyway ... your post caught my eye and I'm interested in why you think 
the way you do.  I'm quite interested in hearing back from you as other 
may be also.

HTH,

Twayne`







---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to