[966] in cryptography@c2.net mail archive
Re: encryption by the wind in an open field
daemon@ATHENA.MIT.EDU (Alan)
Fri Jun 6 20:08:45 1997
Date: Fri, 6 Jun 1997 14:49:45 -0700 (PDT)
From: Alan <alano@teleport.com>
To: "Mark D. Fisher" <mfisher@us.oracle.com>
cc: trei@process.com, unicorn@schloss.li, cryptography@c2.net,
cme@cybercash.com, trei@c2.net
In-Reply-To: <199706062030.NAA00225@ap401sun.us.oracle.com>
On Fri, 6 Jun 1997, Mark D. Fisher wrote:
> I suspect that this would not be useful in a real life case. It is unlikely
> that the suspect has memorized a 128 byte key. He would likely have it on
> diskette or at least on paper. If so he could be coerced into handing it
> over. I think the destruction of the paper or diskette could be prosecuted
> as destruction of evidence. On the other hand I'm not a lawyer.
I have a couple of passwords that are at least 128 bits. (Actually they
are a bit longer than that.) [And, yes, I am talking 128 bits of real
entropy. At least as much as you can get out of a sentence of 100+
characters.] You just have to have a sentence or long string that is easy
to remember, but not easy to mistype or dyslex.
alano@teleport.com | "Those who are without history are doomed to retype it."