[1590] in cryptography@c2.net mail archive
Re: Crypto Keys as Spam
daemon@ATHENA.MIT.EDU (tzeruch@ceddec.com)
Tue Sep 23 13:43:09 1997
Date: Tue, 23 Sep 1997 11:39:29 -0400
From: tzeruch@ceddec.com
To: Charles Platt <cp@panix.com>
cc: cryptography@c2.net
In-Reply-To: <Pine.SUN.3.91.970923003017.13452A-100000@panix.com>
On Tue, 23 Sep 1997, Charles Platt wrote:
> If we do suffer a federal law that mandates key escrow and survives
> constitutional tests, would it be possible to screw the system by
> generating huge numbers of crypto keys for federal storage? Imagine,
> say, 100,000 people each contributing a million different keys to the
> federal registry.
I suggested specifically this on cypherpunks - I may be required to do
something like this since one of the tests I do is to simply create a loop
that generates a new keypair each time and verifies that my programs work
(and most of them take only a few seconds).
But the problem is that they simply say "immediate access to plaintext
without the user's knowledge" and nothing about what will be required to
insure compliance.