But you can't revoke his ability to keep bruteforcing the message.

- Sent from my tablet
Den 19 sep 2012 23:01 skrev "mhey...@gmail.com" <mhey...@gmail.com>:

> Doh, don't know why I brought public-key crypto into this. There isn't
> a need for it. Just pick, say, an AES key and give the trustee some of
> the key's bits so they only have to brute force part of the key.
>
> On Wed, Sep 19, 2012 at 4:48 PM, mhey...@gmail.com <mhey...@gmail.com>
> wrote:
> > On Wed, Sep 5, 2012 at 9:51 AM, StealthMonger
> > <stealthmon...@nym.mixmin.net> wrote:
> >> -----BEGIN PGP SIGNED MESSAGE-----
> >>
> >> Can there be a cryptographic "dead man switch"?  A secret is to be
> >> revealed only if/when signed messages stop appearing.  It is to be
> >> cryptographically strong and not rely on a trusted other party.
> >>
> > Every three months I, the Grantor, encrypt my secret in a new
> > secret-encrypting-key and place that secret in my box. (I keep my box
> > away from others - maybe put it in a safe).
> >
> > I also encrypt that secret-encrypting key in a public key but not too
> > strong a public key, one that can be broken in three months time.
> >
> > I then throw away the private key to that public key (I don't need it,
> > I know my secret).
> >
> > I give the public-key encrypted secret-encrypting key to the trustee,
> > heck I can publish it on the web if I want.
> >
> > If I should die, I will stop re-encrypting the secret and the trustee
> > (that I never really trusted) can break the public key and get to the
> > secret.
> >
> > I know a second scheme that we worked out years ago when one of our
> > group was working on DTN (delay tolerant networking) where we would
> > encrypt something and bounce the encrypting key off a distant node and
> > get a few seconds or minutes of safe time until the something could
> > get decrypted. This scheme has the benefit of not failing if some
> > whiz-bang new crypto breaking system comes along but deals with much
> > shorter time periods. I assume that if I'm using the crypto-only
> > method, then I will keep apprised of whiz-bang new crypto breaking
> > systems and re-encrypt early with a larger key to get back on my three
> > month schedule if such a faster breaking system should appear.
> > ----
> > Michael Heyman
> _______________________________________________
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
>
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to