14.5.1. "Can anything like a "cryptographic time capsule" be built?" - This would be useful for sealing diaries and records in such a way that no legal bodies could gain access, that even the creator/encryptor would be unable to decrypt the records. Call it "time escrow." Ironically, a much more correct use of the term "escrow" than we saw with the government's various "key escrow" schemes. - Making records undecryptable is easy: just use a one-way function and the records are unreachable forever. The trick is to have a way to get them back at some future time. + Approaches: + Legal Repository. A lawyer or set of lawyers has the key or keys and is instructed to release them at some future time. (The key-holding agents need not be lawyers, of course, though that is the way things are now done. - The legal system is a time-honored way of protecting secrets of various kinds, and any system based on cryptography needs to compete strongly with this simple to use, well-established system. - If the lawyer's identity is known, he can be subpoenaed. Depends on jurisdictional issues, future political climate, etc. - But identity-hiding protocols can be used, so that the lawyer cannot be reached. All that is know, for example, is that "somewhere out there" is an agent who is holding the key(s). Reputation-based systems should work well here: the agent gains little and loses a lot by releasing a key early, hence has no economic motivation to do so. (Picture also a lot of "pinging" going to "rate" the various ti<w agents.) - Cryptography with Beacons. A "beacon agent" makes very public a series of messages, somehow. Details fuzzy. [I have a hunch that using digital time-stamping services could be useful here.] + Difficulty of factoring, etc. + The idea here is to-use a function which is presently hard to invert, but which may be easier in the future. This is fraught with problems, including unpredictability of the difficulty, imprecision in the timing of release, and general clumsiness. As Hal Finney notes: - "There was an talk on this topic at either the Crypto 92 or 93 conference, I forget which. It is available in the proceedings....The method used was similar to the idea here of encrypting with a public key and requiring factoring of the modulus to decrypt. But the author had more techniques he used, iterating functions forward which would take longer to iterate backwards. The purpose was to give a more predictable time to decrypt.....One problem with this is that it does not so much put a time floor on the decryption, but rather a cost floor. Someone who is willing to spend enough can decrypt faster than someone who spends less. Another problem is the difficulty of forecasting the growth of computational power per dollar in the future." [Hal Finney, sci.crypt, 1994-8-04] + Tamper-resistant modules. A la the scheme to send the secrets to a satellite in orbit and expect that it will be prohibitively expensive to rendezvous and enter this satellite. - Or to gain access to tamper-resistant modules located in bank vaults, etc. - But court orders and black bag jobs still are factors. 14.5.2. Needs - journalism + time-stamping is a kind of example - though better seen in the conventional analysis - persistent institutions - shell games for moving money around, untraceably 14.5.3. How - beacons - multi-part keys - contracted-for services (like publishing keys) - Wayner, my proposal, Eric Hughes
Next Page: 14.6 Traffic Analysis
Previous Page: 14.4 Voting
By Tim May, see README
HTML by Jonathan Rochkind