Re: How do I know if its encrypted?
At 10:52 AM 1/13/95, Eric Hughes wrote:
From: Ben.Goren@asu.edu
Here's a solution:
What problem, pray tell, does this solve?
That of the data haven operator being able to deny knowledge of the contents of files people send him. He'll only return files that, when operated on by a strong cryptographic algorithm, make sense. He therefore can't look inside the files until the owner asks for them back. If he operates a timely (and automated) service, he can't know the contents until after he's already sent the file back. If the server automatically deletes the file upon return, he can't even tell what's in it then. Further, an "authority" won't gain anything by seizing the data.
It seems far more complicated than it need be.
As best I can tell, none of the previous suggestions guarantees that the file is unreadable. How would you accomplish that in a simpler manner? Or would you, as the operator of a data haven, not mind the risk of somebody designing an illegal file that passes all your filters and tipping off the police that you've got such a file on your computer, available to all--for sale, even? If there were a weakness in your filter, somebody could easily exploit that weakness and get the use of your haven. With my system, they could send you anything they liked, but it'd be little more than a cash donation, as they'd never get it back. Your liability would be the same as if the person had just emailed you the file and blew the whistle.
Alice sends a file to Dave's DataHaven. When Alice wants her file back, she sends to Dave a secure hash of the file, a key with which to decrypt it, and a handful of plaintext at the beginning of the file. Dave decrypts the file that matches the hash with the key Alice gave him; if the file begins as Alice says it should, Dave returns the file to Alice.
Eric
b& -- Ben.Goren@asu.edu, Arizona State University School of Music Finger ben@tux.music.asu.edu for PGP public key ID 0xCFF23BD5.
From: Ben.Goren@asu.edu That of the data haven operator being able to deny knowledge of the contents of files people send him. He'll only return files that, when operated on by a strong cryptographic algorithm, make sense. This idea doesn't work for the purpose intended. I'll upload straight ASCII. When you ask for an decryption key, I'll make one up randomly, apply the decryption algorithm to the flat text, and send that back to you as a confirmation. The real question is "Makes sense to whom?". You can't enforce a requirement of encryption, but you can make sure that you can't make sense of most of it. As best I can tell, none of the previous suggestions guarantees that the file is unreadable. You don't need a guarantee of unreadability. What is needed is a presumption that files were not read. If they are unreadable, then they weren't read, but there are other ways of creating that assurance. Eric
participants (2)
-
Ben.Goren@asu.edu -
eric@remailer.net