home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky sci.crypt:5673 alt.society.civil-liberty:6898
- Newsgroups: sci.crypt,alt.society.civil-liberty
- Path: sparky!uunet!newsgate.watson.ibm.com!yktnews!admin!aixproj!uri
- From: uri@watson.ibm.com (Uri Blumenthal)
- Subject: Re: Limits on the Use of Cryptography?
- Sender: news@watson.ibm.com (NNTP News Poster)
- Message-ID: <1992Dec14.203614.63816@watson.ibm.com>
- Date: Mon, 14 Dec 1992 20:36:14 GMT
- Reply-To: uri@watson.ibm.com
- Disclaimer: This posting represents the poster's views, not necessarily those of IBM
- References: <2229.517.uupcb@grapevine.lrk.ar.us> <11283@baird.cs.strath.ac.uk> <1992Dec10.182022.9173@netcom.com> <Bz886x.Jw5@ddsw1.mcs.com>
- Nntp-Posting-Host: aixproj.watson.ibm.com
- Organization: You care? Why?
- Lines: 18
-
- In article <Bz886x.Jw5@ddsw1.mcs.com>, karl@ddsw1.mcs.com (Karl Denninger) writes:
- |> >Iain McCord raises the possibiity that the police will "plant" an
- |> >encrypted file, or worse, plant an incriminating encrypted file of
- |> >their own design..
- |>
- |> With a public key system you can be ABSOLUTELY certain that a particular
- |> ciphertext was created with one key if you can decode it with the other.
- |> Therefore, if the keys are not compromised you can, with certainty,
- |> prove whether or not it was written by the individual in question.
-
- Well, but HOW can you know, that your keys are not compromised?
- You certainly HOPE so, but... ['twas written once: "Only
- insurance policy gives you 100% guarantee" :-]
- --
- Regards,
- Uri. uri@watson.ibm.com
- ------------
- <Disclaimer>
-