From: Tom Knight <tk@reagan.ai.mit.edu>
To: cypherpunks@toad.com
Message Hash: b06e062d3c8d3c07eb8dba075445e561528a779fe8f72a1a297c9e4dd7efe9b2
Message ID: <19930617141632.8.TK@ROCKY.AI.MIT.EDU>
Reply To: <930617132906_76630.3577_EHK27-1@CompuServe.COM>
UTC Datetime: 1993-06-17 14:18:41 UTC
Raw Date: Thu, 17 Jun 93 07:18:41 PDT
From: Tom Knight <tk@reagan.ai.mit.edu>
Date: Thu, 17 Jun 93 07:18:41 PDT
To: cypherpunks@toad.com
Subject: Contempt of court
In-Reply-To: <930617132906_76630.3577_EHK27-1@CompuServe.COM>
Message-ID: <19930617141632.8.TK@ROCKY.AI.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain
I wouldn't want to encourage anyone to contempt of court, but, strictly
hypothetically, there is a very simple way to answer the request to hand
over keys to encrypted data. Simply assure that you have a copy of the
encrypted data available, then construct one-time-pad data of the same
length as the encrypted data, such that when the two are XORed, you get
your choice of plaintext. Hand over the "one time pad." This argues
powerfully that one might want such one time pads available and in use
even if you are really using a more convenient encryption technology.
Kids: don't do this at home.
Return to June 1993
Return to “Tom Knight <tk@reagan.ai.mit.edu>”