From: zane@genesis.mcs.com (Sameer)
To: “George A. Gleason” <gg@well.sf.ca.us>
Message Hash: 95a21aa48757c28726456abf4bd884b6d1508ff99660b119bca4c8372f78fcf8
Message ID: <m0o7YT2-000MVnC@genesis.mcs.com>
Reply To: <93Jun18.024542pdt.13995-1@well.sf.ca.us>
UTC Datetime: 1993-06-20 23:20:43 UTC
Raw Date: Sun, 20 Jun 93 16:20:43 PDT
From: zane@genesis.mcs.com (Sameer)
Date: Sun, 20 Jun 93 16:20:43 PDT
To: "George A. Gleason" <gg@well.sf.ca.us>
Subject: Re: OTP dual decryption
In-Reply-To: <93Jun18.024542pdt.13995-1@well.sf.ca.us>
Message-ID: <m0o7YT2-000MVnC@genesis.mcs.com>
MIME-Version: 1.0
Content-Type: text/plain
In message <93Jun18.024542pdt.13995-1@well.sf.ca.us>, "George A. Gleason" writes:
>
>
> Yeah, the advantage is, if they think they've found it, they might just
> stop looking much further. It's a chance that might save your ass.
>
> -gg
Wouldn't it be possible to encrypt the plaintext with DES and
then when some TLA tells you to hand over they key tell them that it's
an OTP and give them an OTP which produces an innocuous plaintext?
Then you don't have to worry about key storage, right? (Because
DES-keys are hashed from strings [right?] which can be kept in human
memory.)
--
| Sameer Parekh-zane@genesis.MCS.COM-PFA related mail to pfa@genesis.MCS.COM |
| Apprentice Philosopher, Writer, Physicist, Healer, Programmer, Lover, more |
| "Symbiosis is Good" - Me_"Specialization is for Insects" - R. A. Heinlein_/
\_______________________/ \______________________________________________/
Return to June 1993
Return to “zane@genesis.mcs.com (Sameer)”