The point though that Stute and I are trying to make is that systems like these intentionally do not have backdoors. They're very much a "you're screwed" system if you lose your credentials. That's their entire purpose. I've yet to see a single encryption system or method that comes with any sort of backdoor. Some may have weakenesses that make it easy to crack, but they're not backdoors.
There is a basic assumption when a user goes to encrypt any data. That assumption is that the user has or will take the necessary precautions to protect their ability to access the data. Encrypting is an expert-level task, not something that should be done if you're not sure on how all the parts work or how you need to safeguard your credentials.
EFS as a security system is laughable in that it's only as strong as the Windows authentication methods. Crack a user account and you have access to their personal encryption key and you have free reign over their files.
However, if you have wiped out that key and do not have access to a DRA (Data Recovery Agent), which if you encrypted on your own, is you... it's dumb I know, then you're out of luck. The system has to assume a certain degree of prior knowledge on the part of the user who chooses to encrypt. If the user has not done the necessary work to protect themselves, then it's not Windows or Microsoft's fault the files are inaccessable.
As to Stutefish's comment about not trusting you with guarding files. What I think he's getting at is that he doesn't trust you (or anyone for that matter) with the grand master backdoor key to EFS encrypted files. If you were to find a backdoor that got you your files back, it would be a backdoor that worked on ANY files encrypted by Windows EFS. A backdoor is not a one-off deal in something like this. If it were to exist it would work in all instances. And that's the best reason as to why it can not exist. Given how eager everyone is to post Windows exploits, the second EFS got cracked it would be all over the net and tech news.
Your options are to try and brute force the files to decrypt them... which may be tough if you picked any of the stronger encryption algorithms.
It's not only a "you're screwed" system it's a "if you don't know what you're doing with this, it's not our responsibility to bail you out" deal too. EFS is actually not meant to be used in a one-off environment like yours. It's meant to be run in a managed environment with a PKI or and Active Directory server to escrow the certificates. At the very least it's meant to be used on systems that had DRA's specified.
Software making skills have very little to do with decryption either at this point. The best software in the world can only try and churn numbers through the RSA algorithm and then do an inspection of the results applied to an encrypted file. The RSA algorithm, while not the absolute best there is, is suffeciently good that unless you have a massive amount of computing power behind you. Some software is more intelligent at which exceptionally large prime numbers to try factoring, but you're still dealing with bruteforcing massive files to try and find the key.
EFS can be cracked given various windows system files such as the Private and Master Key Containers. THose are typically protected with a pretty standard hash of the user's login credentials. But without any of the files associated with EFS, or any encryption system you only have blocks of garbled data.
Garbled data, without any of the "clues" from those above mentioned filed, can only be brute forced. A brute force attack on an encrypted file is to try pumping in randomized (but valid) keys. In this case 1024-bit RSA keys. An RSA key can be generated using the math on this page:
http://www.di-mgt.com.au/rsa_alg.html
Really, it's in guessing the right prime number, and then guessing the right seed for the equation. But there are a lot of prime numbers out there, and the really really large ones which are used in encryption algorithms take a long time to push through any formula. But on top of trying every combination, some inspection of the results of each attempt is needed. Which is why decrypting large files (anything longer than a few lines) is extremely difficult and takes a massive amount of computing power.
To give you an idea of the time involved for mortal machines in brute-force cracking, distributed.net runs projects where thousands of PCs around the world work together trying every potential key combination on a simple one sentence text file. They are currently working on a 72-bit RSA encrypted file. They've been working on it for 1,345 days now at a total rate of 139,000,305,844 keys attempted per second. Roughly 7,013 computers were working the problem yesterday and they managed were able to crunch 11,297,795,508,011,007 keys, or roughly 0.000239% of the total number of potential keys. It will take an estimated 416,560 days or 1,141 years to check the entire keyspace.
Now, imagine a key many million times stronger than a 72-bit key. (1024 is 7 million times stronger than a 512-bit key for example). How long would it take to brute force that given the 7,013 machines globally that were working on a single line of text yesterday?
WinEFS is actually certified for government use (though they use the stronger 3DES algorithm). It wouldn't be if there was a privately held backdoor, or even a master key. EFS uses the publicly tested and time proven RSA algorithm, which has no found vulnerabilities to date. EFS encrypted files stand up to encryption standards scrutiny, so as a raw file they're virtually impossible to decode.
Your only hope is that there are some files that survived your windows wipe through some miracle. Otherwise you're dealing with an honest-to-god mathematical impossibility.
EFS is weak so long as you still have the original Windows setup of the machine that encrypted the file. Without that, it's as strong as any 1024-bit RSA encrypted file out there.
The simple answer is no, there is NO back door.
And..
Yes, you are screwed.
If, however you have sufficient time AND funds you might 'see' your grandchildren's grandchildren get it sorted.
Actually, with leaps and bounds in processor power and speed you 'might' even see a solution in your twilight of life....provided you're currently still in your brash, hasty teens...