Delayed self-encrypting messages

Eric Hughes hughes at ah.com
Fri Jun 10 17:01:50 PDT 1994


   I have a need to distribute some information fairly widely, but it's 
   critical that it not be openly revealed before a certain date.  

The problem is underspecified.  What is the threat model?  That is,
what are to trying to prevent from happening, and what are you trying
to ensure will happen?

If you're just worried that the information will get suppressed if it
sits in one place, encrypting with symmetric cipher and a random key
and publishing the ciphertext does quite well.  You can then give
trusted parties the key.  This has been suggested.

If you want to make sure the message can be decrypted without further
intervention on your part, you need to farm that job out to someone
else.  Use another person, or a public key beacon, but some
other party will be involved.  If you can make that party a public
service (like a beacon), then you've depersonalized the problem.

The simplest public key beacon works as follows.  The operators of the
beacon publish a list of public keys, one per time period--let's say
days here.  The beacon is programmed to give out any particulare
private key at the beginning of its day.  To use this, simply encrypt
with the public key of the date you want the message to be revealed.
The message will be decryptable on that date, when the beacon's key is
revealed.

An interesting research project would be to construct one of these to
sit in orbit.

Eric







More information about the cypherpunks-legacy mailing list