[4062] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: France Allows 128 Bit Crypto

daemon@ATHENA.MIT.EDU (Dan Geer)
Mon Jan 25 13:14:42 1999

To: "P. J. Ponder" <ponder@freenet.tlh.fl.us>
Cc: cryptography@c2.net
In-Reply-To: Your message of "Thu, 21 Jan 1999 17:13:29 EST."
             <Pine.OSF.3.96.990121165320.1897A-100000@fn3.freenet.tlh.fl.us> 
Date: Mon, 25 Jan 1999 12:25:54 -0500
From: Dan Geer <geer@world.std.com>


    There was a US case discussed in a similar thread a year or two ago (and I
    think it was on this list, although it may have been on cypherpunks) where
    the issue was a safe combination, and the power of the court to hold a
    person in contempt until the safe was opened.

Be prepared to destroy the key, then.

See, in spirit, Boneh&Lipton's paper on revocable backups

http://theory.stanford.edu/~dabo/abstracts/backups.html
http://www.usenix.org/publications/library/proceedings/sec96/boneh.html

Froomkin's and Sergienko's analyses, cited here previously,
are compelling, of course.  Unless I missed it in these
two cites, however, there is an open question of whether
deleting a key amounts to destroying evidence as, to this
layman, it ain't evidence until it is admitted.  (Why am
I recalling Geraldo's opening Al Capone's vault?...)

--dan



home help back first fref pref prev next nref lref last post