[144556] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: What will happen to your crypto keys when you die?

daemon@ATHENA.MIT.EDU (Jack Lloyd)
Fri Jul 3 17:16:58 2009

Date: Thu, 2 Jul 2009 14:37:31 -0400
From: Jack Lloyd <lloyd@randombit.net>
To: cryptography@metzdowd.com
Mail-Followup-To: cryptography@metzdowd.com
In-Reply-To: <5e01c29a0907011629x7b460e4biaf7cb70d775c1202@mail.gmail.com>

On Thu, Jul 02, 2009 at 09:29:30AM +1000, silky wrote:

> A potentially amusing/silly solution would be to have one strong key
> that you change monthly, and then, encrypt *that* key, with a method
> that will be brute-forceable in 2 months and make it public. As long
> as you are constantly changing your key, no-one will decrypt it in
> time, but assuming you do die, they can potentially decrypt it while
> arranging your funeral :)

This method would not work terribly well for data at rest. Copy the
ciphertext, start the brute force process, and two months later you
get out everything, regardless of the fact that in the meantime the
data was reencrypted.

-Jack

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post