Encryption

DECRYPTION SOFTWARE & TUTORIALS

EncryptionIn cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

The purpose of encryption is to ensure that only somebody who is authorized to access data (e.g. a text message or a file), will be able to read it, using the decryption key. Somebody who is not authorized can be excluded and this could include system server administrators, because he or she does not have the required key, without which it is impossible to read the encrypted information.

TEXAS HOME BASE MAIL SCANNING ACCOUNT SECURITY

2048All mail scanning accounts provide a 256 bit SSL connection between your browser and our web server. When you sign up for an online account you can log in and simply click your document and open it as a .pdf file. A standard mail scanning account only encrypts mail documents between the client and server and does NOT store documents encrypted.

You can opt into a fully encrypted 2048 bit RSA key mail scanning service which will add additional security for your documents. A fully encrypted mail scanning account will require several extra steps such as downloading your mail first in order to decrypt your mail. For this method you will also need to keep your decryption key nearby and expect a little more time to read a document. This option is recommended for computer savvy clients, highly sensitive mail documents and clients who want to be absolutely sure no one can read their documents.

Texas Home Base does not have a copy of the decryption key so after the document is encrypted it is completely virtual and only the client will be able to decrypt the document(s). If the client looses his or her decryption key a new key will be issued and old documents will remain encrypted and unrecoverable. It is absolutely essential to backup your decryption key.

ENCRYPTED SCANNING PROCESS

The Encrypted Scanning process will include - 

bulletpoint1 Logging into your THB Account

bulletpoint1 Downloading your scanned and encrypted files 

bulletpoint1 Opening the Decryption Program on the USB provided by Texas Home Base 

bulletpoint1 Using the Decryption Program to decrypt your encrypted files 

bulletpoint1 Reading your decrypted documents 

bulletpoint1 Instructing Texas Home Base to Hold, Shred or Forward your documents 

Below is an example of how our decryption process will look: 

 

IMPORTANT THINGS TO KNOW ABOUT THE FULLY ENCRYPTED SCANNING SERVICE: 

bulletpoint1 You will need to use a PC to decrypt your documents

At this time our decryption program cannot be used on Mac computers or tablets of any kind

bulletpoint1 If you need a replacement key a charge of $10.00 will be required

bulletpoint1 This option is recommended for computer savvy clients

bulletpoint1 You will need to use an updated version of Microsoft Edge, Google Chrome or Firefox as your browser to use the Texas Home Base Account website