1993-11-19 - Digital futures - the catastrophic edge

Header Data

From: hughes@ah.com (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 0cf2c8be0981db10465306eeb2af3031f3a01c4b7089ff84a14c75830ae89d8d
Message ID: <9311192226.AA06623@ah.com>
Reply To: <9311192142.AA04263@newton.apple.com>
UTC Datetime: 1993-11-19 22:26:59 UTC
Raw Date: Fri, 19 Nov 93 14:26:59 PST

Raw message

From: hughes@ah.com (Eric Hughes)
Date: Fri, 19 Nov 93 14:26:59 PST
To: cypherpunks@toad.com
Subject: Digital futures - the catastrophic edge
In-Reply-To: <9311192142.AA04263@newton.apple.com>
Message-ID: <9311192226.AA06623@ah.com>
MIME-Version: 1.0
Content-Type: text/plain

re: # parties != 1 knowing secrets

The secrets in cryptography are too long to be memorized.  Therefore,
some computer hardware will need to be the storage container.  Secure
containers for such secrets can be constructed at much less cost than
the value of having the secret escape.  Since secrets come in
different levels of value, so will containers.

Since the secrets are data, they can be backed up as well, with a
variety of redundancy mechanisms and social constraints.  One can use
encrypted data with human-recallable pass phrase (as PGP secret keys)
or secret sharing to multiple trustees, or a combination.