The Outermost Encryption Scheme 
 
To encrypt data with maximum security, follow all recommendations below. Note that many, if not all, may be violated for standard security, which will do for most cases. 
 
  • Use only files, not text messages. If the data is on text form, make it a file by copying it into an editor, such as Notepad, or a word processor, such as Word, and save the message on disk. 
  •  
  • Create an initial key using the Key Generator and choose the length of the key as long as possible (around 16.000 characters is the limit). Then move around your mouse for quite a while, until necessary mouse movements have been collected. Give it a nickname, for example "Key_1". 
  •  
  • Deliver this key "in a safe way", which means that you should follow these instructions
  •  
  • Choose full diffusion for files, under the Options meny. 
  •  
  • Choose dynamic permutations with 100% randomness, under the Options meny. 
  •  
  • Protect your keys on your computer with a long and complicated password; preferably only stored in your mind, or on a couple of floppies, well locked up. NB! Floppies may become unreadable, so the password might be unaccessible. Therefore, if using floppies, use more than one, for backup purpose. 
  •  
  • The receivers only have to get your first initial key delivered "in a safe way". Further keys are sent securely encrypted by the previous key. However, if any doubts exist whether any of the previous keys has been "lost", make another "safe delivering" of the next key, to break the possibilities that someone can get your new keys from the old ones. 
  •  
    Some of the recommendations above may be eased a bit without compromising the security much. Using the following recommendations will still keep you at a very high security level. 
     
  • Change keys on a regular basis, but it is not necessary to do it after every encryption. 
  •  
  • The Key length may be reduced to 1/10 of the value above. 
  •  
  • For permutations, static 25-50% randomness will do. 
  •