DECRYPTION SOFTWARE & TUTORIALS
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.
The purpose of encryption is to ensure that only somebody who is authorized to access data (e.g. a text message or a file), will be able to read it, using the decryption key. Somebody who is not authorized can be excluded and this could include system server administrators, because he or she does not have the required key, without which it is impossible to read the encrypted information.
TEXAS HOME BASE MAIL SCANNING ACCOUNT SECURITY
All mail scanning accounts provide a 256 bit SSL connection between your browser and our web server. When you sign up for an online account you can log in and simply click your document and open it as a .pdf file. A standard mail scanning account only encrypts mail documents between the client and server and does NOT store documents encrypted.
You can opt into a fully encrypted 2048 bit RSA key mail scanning service which will add additional security for your documents. A fully encrypted mail scanning account will require several extra steps such as downloading your mail first in order to decrypt your mail. For this method you will also need to keep your decryption key nearby and expect a little more time to read a document. This option is recommended for computer savvy clients, highly sensitive mail documents and clients who want to be absolutely sure no one can read their documents.
Texas Home Base does not have a copy of the decryption key so after the document is encrypted it is completely virtual and only the client will be able to decrypt the document(s). If the client looses his or her decryption key a new key will be issued and old documents will remain encrypted and unrecoverable. It is absolutely essential to backup your decryption key.
ENCRYPTED SCANNING PROCESS
The Encrypted Scanning process will include -
Logging into your THB Account
Downloading your scanned and encrypted files
Opening the Decryption Program on the USB provided by Texas Home Base
Using the Decryption Program to decrypt your encrypted files
Reading your decrypted documents
Instructing Texas Home Base to Hold, Shred or Forward your documents
Below is an example of how our decryption process will look:
IMPORTANT THINGS TO KNOW ABOUT THE FULLY ENCRYPTED SCANNING SERVICE:
You will need to use a PC to decrypt your documents
At this time our decryption program cannot be used on Mac computers or tablets of any kind
If you need a replacement key a charge of $10.00 will be required
This option is recommended for computer savvy clients
You will need to use an updated version of Microsoft Edge, Google Chrome or Firefox as your browser to use the Texas Home Base Account website