PASSWORD RECOVERY MECHANISM FOR AN ENCRYPTED DEVICE

What every encryption software requires is an effective password recovery mechanism. Secure and safe recovery mechanisms are essential for large scale deployment of any kind of encryption. The solution must be easy yet secure.

A challenge or Response password recovery mechanism allows the password to be recovered in a secure manner and is offered by a number of disk encryption solutions. When a challenge or response password recovery mechanism is used there is no need for the user to carry a disk with the recovery encryption key, no secret data is exchanged during the recovery process.  More importantly it does not require a network connected and can therefore be used in remote locations without any internet access and no information can be sniffed.

Another method of recovery is the ERI method or the Emergency Recovery of Information file password recovery mechanism.

An Emergency Recovery Information or ERI method provides an alternative if a challenge or response password recovery mechanism is not feasible or has implementation challenges.

ERI or Emergency Password Recovery Mechanisms have their own pros – It is cost efficient so pretty much anyone with the basic technical knowledge to do so can set it up without implementation difficulties. Like challenge recovery mechanism no secret data is exchanged in the recovery process and no information can be sniffed. It can work from a remote location without internet access.

That’s all for now folks!

Thanks for reading!

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s