From: Timothy Newsham <newsham@wiliki.eng.hawaii.edu>
To: ccat@netcom.com (Chris Beaumont)
Message Hash: c40cc80106de41d39677b7a00311592f87142f47a91d7df81605b86104d92706
Message ID: <9309122019.AA06312@toad.com>
Reply To: <9309121608.AA08172@netcom5.netcom.com>
UTC Datetime: 1993-09-12 20:19:35 UTC
Raw Date: Sun, 12 Sep 93 13:19:35 PDT
From: Timothy Newsham <newsham@wiliki.eng.hawaii.edu>
Date: Sun, 12 Sep 93 13:19:35 PDT
To: ccat@netcom.com (Chris Beaumont)
Subject: Re: encryption key switching,would it work?
In-Reply-To: <9309121608.AA08172@netcom5.netcom.com>
Message-ID: <9309122019.AA06312@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
>
> I'm wondering if there is any particular reason why an encrypted message
> might not be encrypted with several different keys,within the same message,
> divided by time.Perhaps synchronized clocks or time stamping might be used
> to toggle the encryption parameters.This technology might be able to defeat
> the brute force decryption technologies described in the paper mentioned
> yesterday.
If you have a system with key exchange you can change the keys on demand
in the middle of a stream (provided the protocol you use allows this).
This may be done as many times and as often as you please up to the
limitations of the (usually) slower key exchange protocol.
> Chris Beaumont nutrient cafe wholesale
> ccat@netcom.com MIME mail graciously accepted
> ccat@casa.stanford.edu public key available via finger
Return to September 1993
Return to “Timothy Newsham <newsham@wiliki.eng.hawaii.edu>”