Cannot decrypt my backed up encrypted files

Page 3 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Thoreau

Golden Member
Jan 11, 2003
1,441
0
76
Originally posted by: computer
Originally posted by: STaSh
There has GOT to be a way, a program, some trick to be able to view these files. I could KILL M$ for not giving any kind of warning about this!! Those bastards drive you INSANE with "are you sure......." "are you sure......." "are you sure......." "are you sure......." blah blah for every friggin' thing you try to do on a Windows OS of which none of IT is even necessary!!!!! Something as serious as this, and these ass-wipes don't give one comment about it when encrypting a folder!!! THAT is just TOTALLY SENSELESS!!!!!!! Backwards A$$holes

I don't know who or what M$ is, but lets assume you are ranting about Microsoft. There are volumes of documentation on our website and on your PC about this very topic. This is the reason why we have recovery agents. There are numerous documents, help files, even forums like this that tell you that you must backup the private key.

Why would you expect encryption to have some kind of back door "some trick to be able to view these files"? Then why did you encrypt it? Please tell me what the point of a encryption scheme with a backdoor would be?

Encryption comes down to some pretty basic math. At a very basic level, you have two keys. Your data is encrypted with one key and can decrpyted only by the other key. You cannot discover what one key is by using the other. Bottom line, if you do not have the key that can decrypt the data that was encrypted by the other key, you aren't getting that data. Unless you want to brute force it. Any encryption can be brute forced. But the idea behind encryption is how long would it take to brute force a key, and would it would be worth it to someone to devote that much time to it?

But dont blame us for your mistake. Sorry, but this one's on you. Time to stop ranting, take responsibility for your data, and move on.
What the hell is your problem??? Who the hell is blaming YOU?????? If you have nothing to add regarding help, then your post is waste of bandwidth. I posted this here asking for HELP, NOT for wise ass comments.
Why would you expect encryption to have some kind of back door "some trick to be able to view these files"? Then why did you encrypt it? Please tell me what the point of a encryption scheme with a back door would be?
FYI, what makes you think nothing can be cracked and everything is secure????? There is a crack to EVERYTHING, it's just a matter of finding it! EVERYTHING has a back door. All the "volumes of information" you speak of are meaningless AFTER THE FACT. Not many make a habit of visiting forums regarding "privacy keys". ONCE AGAIN; IF THERE IS DANGER OF THIS HAPPENING, AND IT OBVIOUSLY DID, then WHY DOESN'T M$ put yet another one of their PopUp comments THAT IS ACTUALLY USEFUL for a change, stating: "WARNING, YOU WILL NOT BE ABLE TO DECRYPT THESE FILES ON ANOTHER PC WITHOUT SAVING THE ENCRYPTION KEY". NOTHING is said about that. There is no warning info on encryption before you try to encrypt something the way there is before you run just about everything else on Windows. For example: when you dump the damn Recycle Bin there is warning that the data will be deleted. DUUUUHHHHHHHHHH. It's the friggin' Recycle Bin, if you dump it, it's GONE. Yet they place another one of their warnings there for something as obvious as that, yet leave anything regarding encryption WIDE OPEN.

I really appreciate the replies of those that have tried to HELP. If anyone has nothing to add regarding HELP on how to decrypt my "My Documents" files, then kindly refrain from condescending comments. Thank you. "Woulda, shoulda, coulda, why," etc., is irrelevant. What's done IS DONE. I ask for help/info on getting back "My Documents".
Thank you again.

I'm not gonna respond to 90% of what's in that post, but would you like to know why there aren't warnings on advanced settings like EFS? Because they're *ADVANCED* settings. If you start screwing around with those things MS assumes you have some clue about what you're doing. You don't see 'warnings' when modifying the IP address of a machine, or adding a user account to the administration group do you? Use some common sense, stop whining to everyone that you lost your data, because you did. Emphasis on you, and emphasis on did because there is zero way you are going to get that data back. Next time, don't use settings that you aren't familiar with and you can probably avoid messes like this altogether.
 

computer

Platinum Member
Nov 5, 2000
2,735
2
0
I'm going to try this again......

I just read this at that thread: "If you backup your Private Key (or perform a backup of your system state), then you can still get access to your files the next time you forget to decrypt them before formatting/reinstalling." I DID run the XP "Files and settings transfer wizard" during the backup. So, is that decryption key within it somewhere?
 

computer

Platinum Member
Nov 5, 2000
2,735
2
0
I'm not gonna respond to 90% of what's in that post, but would you like to know why there aren't warnings on advanced settings like EFS? Because they're *ADVANCED* settings. If you start screwing around with those things MS assumes you have some clue about what you're doing. You don't see 'warnings' when modifying the IP address of a machine, or adding a user account to the administration group do you? Use some common sense, stop whining to everyone that you lost your data, because you did. Emphasis on you, and emphasis on did because there is zero way you are going to get that data back. Next time, don't use settings that you aren't familiar with and you can probably avoid messes like this altogether.
If you don't like it, then LEAVE the thread. Obviously the only reason you came here was to be a jerk. Next time you post something asking for info or help, I'll go that thread and tell YOU to "stop YOUR whining".
 

stash

Diamond Member
Jun 22, 2000
5,468
0
0
What the hell is your problem??? Who the hell is blaming YOU?????? If you have nothing to add regarding help, then your post is waste of bandwidth. I posted this here asking for HELP, NOT for wise ass comments.

These were not wise ass comments. They were comments that were an attempt to inform you of your situation. Your private key is gone, therefore your data will not be decrypted unless you brute force it. As far as who is blaming me, its not me personally. Look at my sig.

FYI, what makes you think nothing can be cracked and everything is secure????? There is a crack to EVERYTHING, it's just a matter of finding it! EVERYTHING has a back door

Please re-read the section of my post where I said "Any encryption can be brute forced" I am agreeing with you here. It will however, take time. This not a back door per se. It's simply a process to try every possible mathematical possibility.

There is no warning info on encryption before you try to encrypt something the way there is before you run just about everything else on Windows

There is also no warning when you change the permissions on a file. EFS is implemented as a function of NTFS, so it follows the same logic. When you encrypt a file with EFS you are changing some NTFS attributes on that file, just like when you change permissions on file you are changing some different attributes.

EFS was designed to be seamless to the user, just as permissions. If you have the correct key, the file is decrypted, and you have access. If you have a user account that is on the ACL of a file with the correct permissions, you get access. Maybe there should be some kind of warning when you encrypt a file, but that goes against Microsoft's goal of a seamless user experience.

So I'm sorry you lost your data, I really am. I see this happen all the time, and I wish I could help. I did not intend to come across as condescending, but I am trying to tell you the reality of your situation. Yes, you can break the encryption absolutely. But by the time you do, the data may not have as much value to you as it does not.

Backing up your My Documents folder was a great idea. Unfortunately the key is stored in the profile, not the directory that you encrypt. As you mentioned, you may be able to recover the data from the formatted hard drive in the old machine. This is your best and really your only option. If the data is really valuable to you, you may want to spend the money to have a professional data recovery team try to get the key off the old drive.

I wish you (sincerely) the best of luck.
 

computer

Platinum Member
Nov 5, 2000
2,735
2
0
Maybe there should be some kind of warning when you encrypt a file, but that goes against Microsoft's goal of a seamless user experience.
"Seamless user experience"? Like I said, they give warnings for every other thing you do and even the obvious, so why not encryption.
So I'm sorry you lost your data, I really am. I see this happen all the time, and I wish I could help. I did not intend to come across as condescending, but I am trying to tell you the reality of your situation. Yes, you can break the encryption absolutely. But by the time you do, the data may not have as much value to you as it does not.

Backing up your My Documents folder was a great idea. Unfortunately the key is stored in the profile, not the directory that you encrypt. As you mentioned, you may be able to recover the data from the formatted hard drive in the old machine. This is your best and really your only option. If the data is really valuable to you, you may want to spend the money to have a professional data recovery team try to get the key off the old drive.

I wish you (sincerely) the best of luck.
Thank you. I don't need to be told of my situation, I'm FULLY aware of that. I simply want to know how to decrypt My Documents and if it cannot be done, then that's all that needs to be stated. ;)
 

stash

Diamond Member
Jun 22, 2000
5,468
0
0
Simply stated, without the private key you will not be able to decrypt the files, short of brute force.

If the old drive is hooked up to anything, I would immediately disconnect it and get it to a professional data recovery firm. That is your only chance to get the private key.
 

Adul

Elite Member
Oct 9, 1999
32,999
44
91
danny.tangtam.com
Originally posted by: Thoreau
Originally posted by: computer
Originally posted by: STaSh
There has GOT to be a way, a program, some trick to be able to view these files. I could KILL M$ for not giving any kind of warning about this!! Those bastards drive you INSANE with "are you sure......." "are you sure......." "are you sure......." "are you sure......." blah blah for every friggin' thing you try to do on a Windows OS of which none of IT is even necessary!!!!! Something as serious as this, and these ass-wipes don't give one comment about it when encrypting a folder!!! THAT is just TOTALLY SENSELESS!!!!!!! Backwards A$$holes

I don't know who or what M$ is, but lets assume you are ranting about Microsoft. There are volumes of documentation on our website and on your PC about this very topic. This is the reason why we have recovery agents. There are numerous documents, help files, even forums like this that tell you that you must backup the private key.

Why would you expect encryption to have some kind of back door "some trick to be able to view these files"? Then why did you encrypt it? Please tell me what the point of a encryption scheme with a backdoor would be?

Encryption comes down to some pretty basic math. At a very basic level, you have two keys. Your data is encrypted with one key and can decrpyted only by the other key. You cannot discover what one key is by using the other. Bottom line, if you do not have the key that can decrypt the data that was encrypted by the other key, you aren't getting that data. Unless you want to brute force it. Any encryption can be brute forced. But the idea behind encryption is how long would it take to brute force a key, and would it would be worth it to someone to devote that much time to it?

But dont blame us for your mistake. Sorry, but this one's on you. Time to stop ranting, take responsibility for your data, and move on.
What the hell is your problem??? Who the hell is blaming YOU?????? If you have nothing to add regarding help, then your post is waste of bandwidth. I posted this here asking for HELP, NOT for wise ass comments.
Why would you expect encryption to have some kind of back door "some trick to be able to view these files"? Then why did you encrypt it? Please tell me what the point of a encryption scheme with a back door would be?
FYI, what makes you think nothing can be cracked and everything is secure????? There is a crack to EVERYTHING, it's just a matter of finding it! EVERYTHING has a back door. All the "volumes of information" you speak of are meaningless AFTER THE FACT. Not many make a habit of visiting forums regarding "privacy keys". ONCE AGAIN; IF THERE IS DANGER OF THIS HAPPENING, AND IT OBVIOUSLY DID, then WHY DOESN'T M$ put yet another one of their PopUp comments THAT IS ACTUALLY USEFUL for a change, stating: "WARNING, YOU WILL NOT BE ABLE TO DECRYPT THESE FILES ON ANOTHER PC WITHOUT SAVING THE ENCRYPTION KEY". NOTHING is said about that. There is no warning info on encryption before you try to encrypt something the way there is before you run just about everything else on Windows. For example: when you dump the damn Recycle Bin there is warning that the data will be deleted. DUUUUHHHHHHHHHH. It's the friggin' Recycle Bin, if you dump it, it's GONE. Yet they place another one of their warnings there for something as obvious as that, yet leave anything regarding encryption WIDE OPEN.

I really appreciate the replies of those that have tried to HELP. If anyone has nothing to add regarding HELP on how to decrypt my "My Documents" files, then kindly refrain from condescending comments. Thank you. "Woulda, shoulda, coulda, why," etc., is irrelevant. What's done IS DONE. I ask for help/info on getting back "My Documents".
Thank you again.

I'm not gonna respond to 90% of what's in that post, but would you like to know why there aren't warnings on advanced settings like EFS? Because they're *ADVANCED* settings. If you start screwing around with those things MS assumes you have some clue about what you're doing. You don't see 'warnings' when modifying the IP address of a machine, or adding a user account to the administration group do you? Use some common sense, stop whining to everyone that you lost your data, because you did. Emphasis on you, and emphasis on did because there is zero way you are going to get that data back. Next time, don't use settings that you aren't familiar with and you can probably avoid messes like this altogether.

Just do some research on settings that could be detrimental to your data.
 

NightCrawler

Diamond Member
Oct 15, 2003
3,179
0
0
EFS should come disabled and when you enable it should force you to create a recovery agent if your using it as a standalone workstation. On a Domain it creates a recovery agent automatically.
 

computer

Platinum Member
Nov 5, 2000
2,735
2
0
Originally posted by: NightCrawler
Found this:

http://www.lostpassword.com/efs.htm
That looked promising, but you MUST have a password with it. I don't know what they expect you to do if a password was NEVER USED in the first place to encrypt! What do you use then? I entered no pass and it did not accept it. Yet, apparently that's all it needs to get the files back.
 

Mark R

Diamond Member
Oct 9, 1999
8,513
16
81
Originally posted by: drag
G94tgsd=@;l1UG£

Oh, they will definately have a chance of getting that. A very good chance.


The keys are stored on the HD, in an encrypted form. The keys to the keys are based on a variety of information which windows has to hand, including the user's log-on password.

The keys to the keys? What keys your talking about. You have public keys and private (or master) keys.

Are you telling me that the master key is generated everytime and isn't stored anywere? Because the public keys are accessable by everybody and that's their purpose.

And if the master key is generated everytime it's used, how is it the same everytime? Is it based on hardware stuff combined with passwords and if you move the system harddrive to another computer it then would be different?

Just trying to understand what you mean.

That password I demonstrated above is quite strong - It probably has about 70-80 bits of entropy in it. That'll take a LONG time to brute force. Given enough resources it can be broken, but look how much effort was needed to brute-force 64 bit RC5.

What I meant about the encyrption keys was that the private key in the certificate is kept encyrpted. It would be a major security weakness if the private key was simply left un-encrypted on the hard disk. In order to protect it adequately, it is encrypted with a hash of the user log-on password - so you need to know the hash (and therefore the password) before you can use the private key.
 

Psych

Senior member
Feb 3, 2004
324
0
0
I apologize to Computer for insulting him.

Anyway, please tell me that you have taken back the old hard drive from your dad, otherwise the chance of recovering anything will diminish by the moment. I think file and settings transfer wizard doesn't get the certificates for decryption because that is not its purpose; after all, it doesn't transfer the old account's password or anything. But I really could be wrong. Do you still have the settings file?
 

bsobel

Moderator Emeritus<br>Elite Member
Dec 9, 2001
13,346
0
0
That looked promising, but you MUST have a password with it. I don't know what they expect you to do if a password was NEVER USED in the first place to encrypt! What do you use then? I entered no pass and it did not accept it. Yet, apparently that's all it needs to get the files back.[/quote]

You need the password to get access to the key storage. You do know the password (it's empty), but you (from what I've read) don't have the original key stores. Since those are generated at install they are different on every machine. Best writeup I've seen is here. Any chance you can get enough of your prior backups to get the files needed?

I admit that first reading thru the entire thread I also was in the 'tough you did it yourself camp', but your statement about the files and settings wizard has merit. That tool should include some way of transfering the data you need (or atleast remind you to un-encrypt your files before continuing the migration)

Bill
 

Fiveohhh

Diamond Member
Jan 18, 2002
3,776
0
0
Originally posted by: computer
Thank you. I don't need to be told of my situation, I'm FULLY aware of that. I simply want to know how to decrypt My Documents and if it cannot be done, then that's all that needs to be stated. ;)

Its been said many times you need the key, but you keep insisting theres a backdoor. That being said I'd get the old HD and use something like the r studio on it and hope you can get it back or if its very important, send it off to a professional data recovery service,
 

Southerner

Member
Jun 21, 2001
129
0
0
In a hurry, haven't read the entire thread.

Got this on a mailing list. Might be worth looking at. Apologies if it's already been posted.

About EFS :
-----------

- EFS encryption is 3DES (unless you have a restricted export version of Windows), with a random FEK (File Encryption Key) for each file.
- FEK is encrypted with RSA, using the EFS User Certificate (Public Key).
- Eventually, the user Private Key is encrypted with his Windows Password.

So if you know the user password, you can decipher all EFS encrypted files. See "Advanced EFS Data Recovery" tool from ElcomSoft : http://www.elcomsoft.com/aefsdr.html
 

Woodie

Platinum Member
Mar 27, 2001
2,747
0
0
I'm very skeptical about recovery and decryption of an EFS encrypted file...could you provide more details on the scenario you went through?

I'm anticipating that you deleted an important file that was encrypted, and it wasn't in the Recycle Bin anymore. I'm guessing that you were still on the same machine, on the same install, and were logged in with the same account that you encrypted the file with.

TIA,
 

vcarpio2

Senior member
Feb 10, 2002
243
0
0
Originally posted by: Woodie
I'm very skeptical about recovery and decryption of an EFS encrypted file...could you provide more details on the scenario you went through?

I'm anticipating that you deleted an important file that was encrypted, and it wasn't in the Recycle Bin anymore. I'm guessing that you were still on the same machine, on the same install, and were logged in with the same account that you encrypted the file with.

TIA,

No, I did not delete an encrypted file. I have a "secure", encrypted folder in My Documents where I kept my passwords file (I use Counterpane) and images of my passport, SS card, etc., on my data disk (which is a second physical HD on my PC). I upgraded my motherboard this weekend and reinstalled XP and completely forgot about my encrypted folder. Thanks to the demo Active File Recover program, I was at least able to recover my passwords file.
 

computer

Platinum Member
Nov 5, 2000
2,735
2
0
Originally posted by: vcarpio2
Originally posted by: Woodie
I'm very skeptical about recovery and decryption of an EFS encrypted file...could you provide more details on the scenario you went through?

I'm anticipating that you deleted an important file that was encrypted, and it wasn't in the Recycle Bin anymore. I'm guessing that you were still on the same machine, on the same install, and were logged in with the same account that you encrypted the file with.

TIA,

No, I did not delete an encrypted file. I have a "secure", encrypted folder in My Documents where I kept my passwords file (I use Counterpane) and images of my passport, SS card, etc., on my data disk (which is a second physical HD on my PC). I upgraded my motherboard this weekend and reinstalled XP and completely forgot about my encrypted folder. Thanks to the demo Active File Recover program, I was at least able to recover my passwords file.
So where is this "Active File Recover" program?
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: computer
Originally posted by: vcarpio2
Originally posted by: Woodie
I'm very skeptical about recovery and decryption of an EFS encrypted file...could you provide more details on the scenario you went through?

I'm anticipating that you deleted an important file that was encrypted, and it wasn't in the Recycle Bin anymore. I'm guessing that you were still on the same machine, on the same install, and were logged in with the same account that you encrypted the file with.

TIA,

No, I did not delete an encrypted file. I have a "secure", encrypted folder in My Documents where I kept my passwords file (I use Counterpane) and images of my passport, SS card, etc., on my data disk (which is a second physical HD on my PC). I upgraded my motherboard this weekend and reinstalled XP and completely forgot about my encrypted folder. Thanks to the demo Active File Recover program, I was at least able to recover my passwords file.
So where is this "Active File Recover" program?

http://www.file-recovery.net/download.htm

It was in his previous post ;)
 

computer

Platinum Member
Nov 5, 2000
2,735
2
0
Originally posted by: Psych
I apologize to Computer for insulting him.

Anyway, please tell me that you have taken back the old hard drive from your dad, otherwise the chance of recovering anything will diminish by the moment. I think file and settings transfer wizard doesn't get the certificates for decryption because that is not its purpose; after all, it doesn't transfer the old account's password or anything. But I really could be wrong. Do you still have the settings file?
Thanks. My dad hasn't done anything on the new PC. Yes I have the settings file and I'm about to put together another XP PC right now to test that theory, since I need a testbed anyway. In an hour I should know something. The settings may have some "bad settings" in them since the PC was getting a bit odd behaving, so that's why I don't want to run the wizard and restore them on my new build.
 

computer

Platinum Member
Nov 5, 2000
2,735
2
0
You need the password to get access to the key storage. You do know the password (it's empty), but you (from what I've read) don't have the original key stores. Since those are generated at install they are different on every machine. Best writeup I've seen is here. Any chance you can get enough of your prior backups to get the files needed?
Not sure what you mean by "prior backups". If you mean older backups, no, I only save the most recent and at that time I had placed a lot of my backup data in My Documents since I needed to make more CDR's of them due to the CDR media going bad.
 

computer

Platinum Member
Nov 5, 2000
2,735
2
0
Its been said many times you need the key, but you keep insisting theres a backdoor. That being said I'd get the old HD and use something like the r studio on it and hope you can get it back or if its very important, send it off to a professional data recovery service
There is a backdoor, EVERYTHING has a back door, or more accurately a way to circumvent it.
 

computer

Platinum Member
Nov 5, 2000
2,735
2
0
Originally posted by: Southerner
In a hurry, haven't read the entire thread.

Got this on a mailing list. Might be worth looking at. Apologies if it's already been posted.

About EFS :
-----------

- EFS encryption is 3DES (unless you have a restricted export version of Windows), with a random FEK (File Encryption Key) for each file.
- FEK is encrypted with RSA, using the EFS User Certificate (Public Key).
- Eventually, the user Private Key is encrypted with his Windows Password.

So if you know the user password, you can decipher all EFS encrypted files. See "Advanced EFS Data Recovery" tool from ElcomSoft : http://www.elcomsoft.com/aefsdr.html
They haven't replied to my emails yet on why it wasn't working for me, but I did get in touch with Passware that has similar software and ("EFS Key" http://www.lostpassword.com ) the girl seemed to think it would work for my situation. I told her it wasn't since it was asking for a password and she said I should just be able to hit "ok" on the blank password input and get to it. She asked for the log file to see what was going on and sent it to the appropriate persons.