[citation][nom]palladin9479[/nom]Depending on the type of encryption used it could very well prove to be impossible to recover. This isn't some movie, the US Government doesn't have some magic program that will crack any encryption in seconds, or even days. Current AES 256 bit (or hell Blow Fish 256) encryption with 2048 bit key is more then enough to prevent god from getting your data. Honestly the weakest part of encryption is people using super easy passwords to generate the encryption keys. Things like kids names, dates, schools, ect. Using those you can reproduce the encryption key, which lets you decrypt the data... defeating the purpose of high level encryption.[/citation]
Palladin is exactly correct. Encryption really is a military-grade technology, which is why the export of algorithms was treated as exporting arms and why Phil Zimmerman got into so much trouble when he wrote PGP.
As for the government breaking the encryption... they can't. But what they have done is create sophisticated programs that they can feed in every scrap of information about you and everyone you know, everything they can find that you've written down on paper, on your computer, or on blogs and message boards. The program will then combine all of that information along with standard dictionaries to try and guess your password. The program can try thousands of permutations a second and will start with the most probable combinations first. So if you want to be secure, your password should be a long combinations of mixed case letters, and numbers that only means something to you, but is not something that you have ever talked about, written down, or even said out loud.