[1590] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Crypto Keys as Spam

daemon@ATHENA.MIT.EDU (tzeruch@ceddec.com)
Tue Sep 23 13:43:09 1997

Date: Tue, 23 Sep 1997 11:39:29 -0400
From: tzeruch@ceddec.com
To: Charles Platt <cp@panix.com>
cc: cryptography@c2.net
In-Reply-To: <Pine.SUN.3.91.970923003017.13452A-100000@panix.com>

On Tue, 23 Sep 1997, Charles Platt wrote:

> If we do suffer a federal law that mandates key escrow and survives
> constitutional tests, would it be possible to screw the system by
> generating huge numbers of crypto keys for federal storage? Imagine,
> say, 100,000 people each contributing a million different keys to the
> federal registry. 

I suggested specifically this on cypherpunks - I may be required to do
something like this since one of the tests I do is to simply create a loop
that generates a new keypair each time and verifies that my programs work
(and most of them take only a few seconds).

But the problem is that they simply say "immediate access to plaintext
without the user's knowledge" and nothing about what will be required to
insure compliance. 



home help back first fref pref prev next nref lref last post