home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky sci.crypt:5649 alt.society.civil-liberty:6889
- Newsgroups: sci.crypt,alt.society.civil-liberty
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!cis.ohio-state.edu!pacific.mps.ohio-state.edu!linac!uchinews!machine!ddsw1!karl
- From: karl@ddsw1.mcs.com (Karl Denninger)
- Subject: Re: Limits on the Use of Cryptography?
- Message-ID: <Bz886x.Jw5@ddsw1.mcs.com>
- Date: Mon, 14 Dec 1992 01:59:20 GMT
- References: <2229.517.uupcb@grapevine.lrk.ar.us> <11283@baird.cs.strath.ac.uk> <1992Dec10.182022.9173@netcom.com>
- Organization: MCSNet, Chicago, IL
- Lines: 24
-
- In article <1992Dec10.182022.9173@netcom.com> strnlght@netcom.com (David Sternlight) writes:
- >
- >Iain McCord raises the possibiity that the police will "plant" an
- >encrypted file, or worse, plant an incriminating encrypted file of
- >their own design.
- >
- >This is not a cryptographic issue. They could do the same with any
- >other kind of evidence. One's protections against this are also
- >the same, including the ability to challenge the 'chain of evidence'
- >in court, the ability to introduce contrary evidence, etc.
- >
- >David
-
- Oh, but it IS a cryptographic issue.
-
- With a public key system you can be ABSOLUTELY certain that a particular
- ciphertext was created with one key if you can decode it with the other.
- Therefore, if the keys are not compromised you can, with certainty,
- prove whether or not it was written by the individual in question.
-
- --
- Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)
- Data Line: [+1 312 248-0900] Anon. arch. (nuucp) 00:00-06:00 C[SD]T
- Request file: /u/public/sources/DIRECTORY/README for instructions
-