From: hughes@ah.com (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 0cf2c8be0981db10465306eeb2af3031f3a01c4b7089ff84a14c75830ae89d8d
Message ID: <9311192226.AA06623@ah.com>
Reply To: <9311192142.AA04263@newton.apple.com>
UTC Datetime: 1993-11-19 22:26:59 UTC
Raw Date: Fri, 19 Nov 93 14:26:59 PST
From: hughes@ah.com (Eric Hughes)
Date: Fri, 19 Nov 93 14:26:59 PST
To: cypherpunks@toad.com
Subject: Digital futures - the catastrophic edge
In-Reply-To: <9311192142.AA04263@newton.apple.com>
Message-ID: <9311192226.AA06623@ah.com>
MIME-Version: 1.0
Content-Type: text/plain
re: # parties != 1 knowing secrets
The secrets in cryptography are too long to be memorized. Therefore,
some computer hardware will need to be the storage container. Secure
containers for such secrets can be constructed at much less cost than
the value of having the secret escape. Since secrets come in
different levels of value, so will containers.
Since the secrets are data, they can be backed up as well, with a
variety of redundancy mechanisms and social constraints. One can use
encrypted data with human-recallable pass phrase (as PGP secret keys)
or secret sharing to multiple trustees, or a combination.
Eric
Return to November 1993
Return to “hughes@ah.com (Eric Hughes)”