Data Access
Password protection can be used to protect the content of the PST files. However, Microsoft admits that the password adds very little protection, due to the existence of commonly available tools which can remove or simply bypass the password protection. The password to access the table is stored without the first and last XOR CRC-32 integer representation of itself in the PST file. Outlook checks to make sure that it matches the user-specified password and refuses to operate if there is no match. The data is readable by the libpst project code.
Microsoft (MS) offers three values for the encryption setting: none, compressible, and high.
- None the PST data is stored as plain text.
- Compressible the PST data is encrypted with a byte-substitution cipher with a fixed substitution table.
- High (sometimes called "better") encryption is similar to a WWII German Enigma cipher with three fixed rotors.
Note that neither of the two encryption modes uses the user-specified password as any part of the key for the encryption.
Read more about this topic: Personal Storage Table
Famous quotes containing the words data and/or access:
“To write it, it took three months; to conceive it three minutes; to collect the data in itall my life.”
—F. Scott Fitzgerald (18961940)
“Knowledge in the form of an informational commodity indispensable to productive power is already, and will continue to be, a majorperhaps the majorstake in the worldwide competition for power. It is conceivable that the nation-states will one day fight for control of information, just as they battled in the past for control over territory, and afterwards for control over access to and exploitation of raw materials and cheap labor.”
—Jean François Lyotard (b. 1924)