1995-09-27 - Time Keys, Some Secure Ideas (by Alias: Jay Hyden)

Header Data

From: Anonymous Remailing Service <nobody@armadillo.com>
To: N/A
Message Hash: 7d974a16f2f46f9334aef015998741f7ef2a4d2fff5219075949355f97d10f7d
Message ID: <199509270256.VAA09199@monad.armadillo.com>
Reply To: N/A
UTC Datetime: 1995-09-27 04:02:15 UTC
Raw Date: Tue, 26 Sep 95 21:02:15 PDT

Raw message

From: Anonymous Remailing Service <nobody@armadillo.com>
Date: Tue, 26 Sep 95 21:02:15 PDT
Subject: Time Keys, Some Secure Ideas (by Alias: Jay Hyden)
Message-ID: <199509270256.VAA09199@monad.armadillo.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

             >> Time Keys, Some Secure Ideas <<

 The weakest attack on a time key based system is to spoof the
computer that keeps track of time into releasing encryption
keys i.e. change the clock.
 Perhaps this could be avoided by hardware inaccessability,
say a computer system taken to, and setup on the Moon by those
corporation that are already planning to place VR rovers on
the lunar surface.
 Any Earth bound system would be vulnerable to physical attack.

Here are some ideas for such a system:

o 7 clocks with absolutely no way of reseting them. Perhaps a
  system that will only let you tell it which clock is the most
  accurate, and only if you prove you are the proper authority
  and only if 4 other clocks are on the same minute.

o Redundant hardware and power collection and data transmit
  /receive systems, flash ROM hard drives for storing secret
  keys and neccesary programs and files. Built to last
  several centuries if possible.

o Key pairs could be generated on Earth, a time of release
  instruction and perhaps an optional other public key a
  (return at future date encrypted with this key option.)
  The package is then encrypted with one of the lunar
  systems keys, then transmited to the Moon. A verification
  could be encypted and sent back to insure data integrity.

o Other security checks in place would insure that the data
  was transmited to the Moon by the proper authority, i.e.
  the Corp. charging for this service. Additional backup
  logic that would insure that proper power and protocol
  exist for transmitions from the lunar system.

o The key pairs are witness generated, then sent to the lunar
  system, then the secret key is destroyed on Earth. The
  public keys become a one way hash to the future until the
  time designated by the key's owner has elapsed. Then the
  lunar system would transmit the owners secret key to Earth.

o  Upon time released instructions the lunar system would
   transmit the secret key, (encrypted if optioned) upon
   demand by a known packet radio method. So if the Corp.
   authority did not exist in say, 100 years, the data could
   still be retrieved by standard packet radio.

People who want to write to ONLY their great great grand-
children or the future world in general would have a forum.

Jay

  /"""""\    ~~ ,--------------------------------------------,   ~~ /"""""\  
 /__ - _-\  ~~ ( End HEMP Prohibition! This is an open chal- )  ~~ /-_ - __\ 
:@  (*)~(*) ~  ( lenge to Historians. Name examples of where )  ~ (*)~(*)  @:
:%/--~ ))~: ~  (& when the cultivation of legal hemp was harm-) ~ :~(( ~--/%:
 \__"-==-===*  ( ful or destructive to a society in any way! )  *===-==-"__/ 
  (:"\_)_/     (<jay.hyden@alpha.c2.com> PublicKey on Servers)     \_(_/":)  
.//:%:%:\.     '---------------------------------------------'     ./:%:%:\\.
=000o====o000===================================================000o====o000=
   |      |      |      |      |      |      |      |      |      |      |   
- -----------------------------------------------------------------------------
|      |      |      |      |      |      |      |      |      |      |     |
- -----------------------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMGiLha7iRhcfEZiZAQEn0QP6A8cUmI0MHs866Mu/Ao4mFqr89F8tT3oP
KeafNdSWJt8/pOlVZzQxV8P8S8dCkXwBgJJQaQ6tigqtD2+9fK1HEaWi3ZBAVgB+
CwLhqouwds2A5+l9riQfqAT+4yrSbeNR+bH3xyYa8zZSTzp5DB1tJEbWls6Kjr/w
hxmFYrf6oSk=
=oHrR
-----END PGP SIGNATURE-----





Thread