[18796] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: On Digital Cash-like Payment Systems

daemon@ATHENA.MIT.EDU (cyphrpunk)
Mon Oct 31 09:44:09 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 27 Oct 2005 21:15:15 -0700
From: cyphrpunk <cyphrpunk@gmail.com>
To: "James A. Donald" <jamesd@echeque.com>
Cc: cryptography@metzdowd.com, cypherpunks@jfet.org
In-Reply-To: <435F43EE.21250.A1D6EE9@localhost>

On 10/26/05, James A. Donald <jamesd@echeque.com> wrote:
> How does one inflate a key?

Just make it bigger by adding redundancy and padding, before you
encrypt it and store it on your disk. That way the attacker who wants
to steal your keyring sees a 4 GB encrypted file which actually holds
about a kilobyte of meaningful data. Current trojans can steal files
and log passwords, but they're not smart enough to decrypt and
decompress before uploading. They'll take hours to snatch the keyfile
through the net, and maybe they'll get caught in the act.

CP

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post