ABSTRACT

When confidentiality is essential to protecting sensitive information, use encryption-especially when exchanging emails with critical information. Encryption software (like https://www.comodo.com-free for personal use) usually compresses a message and by using an encryption algorithm transforms the message into an incomprehensive assembly of bytes. The whole process requires that we set up a password that only the real sender and receiver knows. This password will be used to decrypt the message at the receiver’s end. What we hope to gain is time to complete our job before those that intercepted our message use various hacking techniques to “break” our message. They would do that by trying different password combinations until they successfully guess our password. Obviously the longer the password and the more variety in terms of characters and digits it contains, the more difficult it will be to break since there will be many more millions of possible combinations that one will need to try before decoding it. The disadvantage though with long passwords is that they are easy to forget. The best approach to remembering a password is to use combinations of upper case and lower case letters with digits. When allowed to do so you can use special symbols that resemble familiar terms. For instance if we needed to use the word “e-negotiations” as the basis of our password, a possible “good” password could be something like “e-ne&0+!@+!0n$.”