Backup To The Web – “Secure, Robust and Reliable”
Secure 128-bit SSL communication
All communications between Backup To The Web and your computer are transported in a 128-bit SSL (Secure Socket Layer) channel. Although all your backup files travel through a public network (internet), eavesdroppers have no knowledge of what has been exchanged.
Backup data securely encrypted
All of your files are first zipped and encrypted with your defined encrypting key before they are sent to Backup To The Web. To all people but you, your files stored on Backup To The Web are no more than some garbage files with random content.
We don’t keep your encrypting key
The encryption key used to encrypt your files resides only on your computer and is known only to you. It is never transmitted anywhere across the network. If this key is lost, all backup files can never be recovered. Therefore, although we have access to all files you stored on our backup server, we have no knowledge of the content of the files you stored.
Reminder: Please make sure you write down your encryption key in a safe place where it will never be forgotten. Otherwise, you will never be able to recover your backup files.
Best encryption algorithm is used
We give you several encryption possibilities, including 128-bit Twofish. It is a block cipher designed by Counterpane Labs. It was also one of the five Advanced Encryption Standard (AES) finalists chosen by National Institute of Standard and Technology (NIST). It subjects to frequent public reviews but no known attack against this algorithm has been reported.
You have a choice of encryption algorithms:
Twofish, Triple DES, or Advanced Encryption Standard (AES). We recommend the use of AES as it has been chosen as the encryption standard for commercial use. Please refer to references on Cryptography for more information about encryption algorithms.
You also have a choice of encryption modes:
Electronic Cook Book (ECB) or Cipher Block Chaining (CBC). We recommend the use of CBC mode as it offers better security. Please refer to references on Cryptography for more information about encryption modes.
A random initializing vector, salt and iteration count will be generated automatically for each file when encrypting your data.
Require 1.99 x 1016 years to crack the 128-bit encryption
A 128-bit key size has 2128 or around 3.4 x 1038 possible combinations. Even if you have the world’s best supercomputer at 54 teraflops*, it would take 8.77 x 10 years to test all combinations. Assuming it just needs one computer operation to test a possible combination, to use brute force attack (checking all combinations) on this encryption algorithm. It would take:
3.4 x 1038
-------------- seconds, or about 6.3 x 1023 seconds.
54 x 1012
That’s about 199,654,245,823,702,952 years to successfully try all combinations. That’s assuming that the supercomputer can test one combination per computer operation, which it can’t. You can be sure that your data stored on our server is 100% secured.
Oak Ridge National Laboratory
Restrict access to data by IP addresses
You can also restrict access to your backup files from the set of IP addresses you define. If someone tries to access your data from an IP address not on your defined list, their access will be denied. This additional security ensures backup files are not open to all locations even if the username and password are known.
For your reference: