home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!ogicse!uwm.edu!rpi!bu.edu!transfer.stratus.com!ellisun.sw.stratus.com!cme
- From: cme@ellisun.sw.stratus.com (Carl Ellison)
- Newsgroups: sci.crypt
- Subject: Re: Limits on the Use of Cryptography?
- Message-ID: <1drgduINNigc@transfer.stratus.com>
- Date: 11 Nov 92 17:38:06 GMT
- Article-I.D.: transfer.1drgduINNigc
- References: <1992Nov11.061210.9933@cactus.org> <1992Nov11.155632.29487@netcom.com>
- Organization: Stratus Computer, Software Engineering
- Lines: 23
- NNTP-Posting-Host: ellisun.sw.stratus.com
-
- In article <1992Nov11.155632.29487@netcom.com> strnlght@netcom.com (David Sternlight) writes:
- > [(legal) discovery] makes
- >public key systems particularly vulnerable, since once they have your
- >private key [...] they can read everything.
-
- [...]
-
- >Perhaps a smart judge would permit you to furnish plaintext instead of the
- >key, though likely not, since you couldn't "prove" that was the real plaintext
- >without revealing the private key. Maybe there's a way to authenticate the
- >plaintext via signatures, without having to reveal your private key--dunno.
-
-
- This isn't hard. All the judge has to do is encrypt your message with the
- public key and compare encrypted bits, if you've used straight public-key.
- If you've used PK to encrypt a DES key, then all you have to surrender
- is the DES key and the judge can do the body decryption.
-
- --
- -- <<Disclaimer: All opinions expressed are my own, of course.>>
- -- Carl Ellison cme@sw.stratus.com
- -- Stratus Computer Inc. M3-2-BKW TEL: (508)460-2783
- -- 55 Fairbanks Boulevard ; Marlborough MA 01752-1298 FAX: (508)624-7488
-