From: szabo@techbook.com (Nick Szabo)
To: uunet!toad.com!cypherpunks@uunet.UU.NET
Message Hash: 5386c6c1bfcdbb385b72e12a8f279f0b553f275f16ad30a7d16159a6c68466e0
Message ID: <m0nfd2y-0006WuC@techbook.techbook.com>
Reply To: N/A
UTC Datetime: 1993-04-04 22:20:37 UTC
Raw Date: Sun, 4 Apr 93 15:20:37 PDT
From: szabo@techbook.com (Nick Szabo)
Date: Sun, 4 Apr 93 15:20:37 PDT
To: uunet!toad.com!cypherpunks@uunet.UU.NET
Subject: Keys on public machines
Message-ID: <m0nfd2y-0006WuC@techbook.techbook.com>
MIME-Version: 1.0
Content-Type: text/plain
[lost attributions, sorry]
>> I could do an ascii upload of my secret key and never expose my
>> key to disk-storage.
>>
> This is even more dangerous than storing it on the disks of a multi-user
> machine. Unless you are running in a kerberos environment it is trivial to
> snoop your upload off the network...
I don't find the risk of a real-time snoop to be as bad as the risk
of a future snoop finding my private key alongside encrypted files that
have been stored forever (backups).
To mitigate either problem, how about having two layers of encryption: a
private key to decrypt files for reading on a public machine, and a second
public/private pair to reencrypt the files for storage and
transmission to the home machine. The public machine knows
the first private key (if snooped) and the second public key; only the
home machine knows the second private key. Snooping the first private
key compromises only unread and future messages until the key is
changed. Messages archived in the reencrypted state are secure, but
messages archived in the unread state with the first private key are
still compromised forever. Is backing up mail directories a common
practice? Are there (probably system-dependent) ways to avoid backups,
such as anticipating or detecting when backups are about to occur,
hidden directories, file permissions, etc?
Also, this system introduces some user hostility, in that
reencrypted files cannot be read again until moved to the
home machine.
Another idea is to implement the relevant features of Kerberos in
a high-level client/server package that can be used to secure personal
network communications of this kind. The package could be distributed
with PGP.
Nick Szabo szabo@techbook.com
Return to April 1993
Return to “szabo@techbook.com (Nick Szabo)”
1993-04-04 (Sun, 4 Apr 93 15:20:37 PDT) - Keys on public machines - szabo@techbook.com (Nick Szabo)