1995-11-09 - Re: Timed-release crypto and information economics

Header Data

From: tcmay@got.net (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: d909b93ee55700812e263bf1f19a4168c19663d729dacbd703a8abacaa0f9855
Message ID: <acc7a170020210041a84@[205.199.118.202]>
Reply To: N/A
UTC Datetime: 1995-11-09 21:33:34 UTC
Raw Date: Fri, 10 Nov 1995 05:33:34 +0800

Raw message

From: tcmay@got.net (Timothy C. May)
Date: Fri, 10 Nov 1995 05:33:34 +0800
To: cypherpunks@toad.com
Subject: Re: Timed-release crypto and information economics
Message-ID: <acc7a170020210041a84@[205.199.118.202]>
MIME-Version: 1.0
Content-Type: text/plain


At 6:52 PM 11/9/95, Beavis B. Thoopit wrote:
>> That's a pretty large number of assumptions:
>>
>>       tamper-proof delay line
>>       => tamper-proof crypto box ("transformation function with state")
>>       => tamper-proof delay line
>>
>> Why not just put a tamper-proof clock in the tamper-proof crypto box
>> and not bother with the delay lines?
>
>The tamper proof aspect is really secondary to the math question.
>The idea that if I set up a stream of bits through a transform, that
>the original state of the transform affects the final outcome after
>N iterations.

The tamper-proof (more correctly, "tamper-resistant" or
"tamper-responding") hardware is so that attackers do not alter the clocks,
as one example, to "speed up" the time release. Or grab the key, as another
example.

(Cranking up the clock speed may or may not be possible and still have the
device work, but it's still an attack to consider.)

If the attacker can grab the internal state of the device, he can of course
run the "transform" talked about above on his equipment.

>If the transform exists, it will ease/eliminate the reliance on the
>"economics" of cryptography to build a tamper-proof physical device.

You'll need to more carefully argue your thesis. I cannot imagine a method,
save perhaps for quantum computing techniques, which can avoid the need for
"secure secrets," either via a person keeping a secret or a box keeping a
secret.

If the box is not secure against tampering, and an attacker gets in, he
effectively "knows" all of the secrets.

BTW, the "launch into solar orbit" scheme that has again surfaced here is
just a variant of making the costs of an attack very high.

--Tim May

Views here are not the views of my Internet Service Provider or Government.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay@got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
Corralitos, CA              | knowledge, reputations, information markets,
Higher Power: 2^756839      | black markets, collapse of governments.
"National borders are just speed bumps on the information superhighway."







Thread