From: Kent Crispin <kent@songbird.com>
To: cryptography@c2.net
Message Hash: 4b043cbe43d6b57ef54baadc40e76910ea62e9b8e3156b0f66af6732bcd66f00
Message ID: <19970610112926.04400@bywater.songbird.com>
Reply To: <3.0.1.32.19970610090503.00747630@popd.ix.netcom.com>
UTC Datetime: 1997-06-10 18:49:14 UTC
Raw Date: Wed, 11 Jun 1997 02:49:14 +0800
From: Kent Crispin <kent@songbird.com>
Date: Wed, 11 Jun 1997 02:49:14 +0800
To: cryptography@c2.net
Subject: Re: Access to Storage and Communication Keys
In-Reply-To: <3.0.1.32.19970610090503.00747630@popd.ix.netcom.com>
Message-ID: <19970610112926.04400@bywater.songbird.com>
MIME-Version: 1.0
Content-Type: text/plain
On Tue, Jun 10, 1997 at 12:12:36PM -0700, Phil Helms wrote:
> On Tue, 10 Jun 1997, Bill Stewart wrote:
>
> > and you have potentially decent business reasons for backup
> > of storage keys, but that's only the case if you're not using
> > a sufficiently flexible cryptosystem and are using key backup
> > instead of data backup, which is really the preferred approach anyway.)
>
> I could envision situations where you wouldn't want to backup plaintext,
> but only ciphertext. In those situations, key backup would also be
> necessary. This would require the use of passphrases or some other
> tokens to utilize the backed up keys.
If you have data you wish to guard from disclosure I think that in
most circumstances you want to back up ciphertext. It is a *lot*
cheaper to secure a piece of paper with a passphrase on it (in a safe
deposit box, for example) than it is guard a gigabyte of backup tapes.
--
Kent Crispin "No reason to get excited",
kent@songbird.com the thief he kindly spoke...
PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html
Return to June 1997
Return to “Steve Schear <azur@netcom.com>”