1993-03-03 - Poor Man’s Time Release Crypto

Header Data

From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: 3cbbf23756c31fcacfe69c50eae44cb0f3d32febb00a1f60c6888dbda73a5a53
Message ID: <9303030029.AA01349@soda.berkeley.edu>
Reply To: N/A
UTC Datetime: 1993-03-03 00:32:46 UTC
Raw Date: Tue, 2 Mar 93 16:32:46 PST

Raw message

From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Tue, 2 Mar 93 16:32:46 PST
To: cypherpunks@toad.com
Subject: Poor Man's Time Release Crypto
Message-ID: <9303030029.AA01349@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain

An obvious but very important point about any time release protocol
can be observed in the following one:

   1. Publish some non-random encrypted data.
   2. Wait.

Computational increases will eventually make cracking the code
feasible.  Your secret will be revealed, but you just don't know when!

Technological progress puts an upper bound on the amount of time a
secret can remain secret.  Likewise, Diffie-Hellman is forward secure,
but only until taking discrete logs in the chosen ring is feasible.