[966] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: encryption by the wind in an open field

daemon@ATHENA.MIT.EDU (Alan)
Fri Jun 6 20:08:45 1997

Date: Fri, 6 Jun 1997 14:49:45 -0700 (PDT)
From: Alan <alano@teleport.com>
To: "Mark D. Fisher" <mfisher@us.oracle.com>
cc: trei@process.com, unicorn@schloss.li, cryptography@c2.net,
        cme@cybercash.com, trei@c2.net
In-Reply-To: <199706062030.NAA00225@ap401sun.us.oracle.com>

On Fri, 6 Jun 1997, Mark D. Fisher wrote:

> I suspect that this would not be useful in a real life case.  It is unlikely 
> that the suspect has memorized a 128 byte key.  He would likely have it on
> diskette or at least on paper.  If so he could be coerced into handing it 
> over.  I think the destruction of the paper or diskette could be prosecuted 
> as destruction of evidence.  On the other hand I'm not a lawyer.

I have a couple of passwords that are at least 128 bits.  (Actually they
are a bit longer than that.)  [And, yes, I am talking 128 bits of real
entropy.  At least as much as you can get out of a sentence of 100+
characters.]  You just have to have a sentence or long string that is easy
to remember, but not easy to mistype or dyslex.

alano@teleport.com | "Those who are without history are doomed to retype it."


home help back first fref pref prev next nref lref last post