[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Time release crypto



On Tue, 19 Sep 1995, Bill Stewart wrote:

> Technology can't solve the problem, only help a bit; algorithms
> aren't timebound.  In particular, true security depends on only
> being able to decrypt if you have the correct information, and there's
> no way to create decryption information in the future from 
> encryption pieces you have now without being able to create the 
> same information now.

Some of the following is probably idiotically obvious, but to prevent an 
attack on such a time keeper, it could be tied in to the atomic clocks, 
it could poll several PC's and check their time... any significant major 
time change would be spotted immediatly...  that is you couldn't possibly 
change the time on many machines at the same time without having physical 
access to all the machines, etc.  Altering the time on an atomic clock 
would be visible to just about everyone, etc.

This in now way would prevent an attacker from stealing the passphrase to 
the time signing service, so it wouldn't prevent anyone from issuing 
false keys.  But by using a hardware random generator the time keeping 
service could know if it issued a key or not by storing all the keys it 
issued previously.

This would achive the following: even if a theif stole the key, with 
enough randomization, the stolen keys would show up as valid, but would 
not show up in the time server's database - which should be written to 
write-once-media such as worm, or CDROM, etc...  the stolen key would 
generate valid time signatures, but would not be on the database, so it 
would be clear it was forged.  To get around this, the bad guy would need 
constant physical access to the time keeper, not just a single black bag 
job.

This also means that this database must be publically searchable at all 
times.  Perhaps the generator phassphrase should also be changed randomly 
as time passes - but then these things too would have to be stored 
somewhere before the time the key expires...

This is probably a bit far fetched, but the time keeper could be tied 
into astronomical events - that is have it follow the path of planets, 
star systems, etc. and derrive time that way and compare it with what 
time it thinks it is.  This would require quite a lot of sensors and 
extra hardware to track stars, planets, etc...   The bad guy would have 
to do a lot more work to get around this...  basically what you want to 
do is track some totally unalterable event to keep track of time, and we 
presume the NSA cannot change the orbits of planets... yet. ;-)


Another method would be to set up a key breaking system which would 
accept weaker keys - say 300 bits or so, and start breaking them.  This 
wouldn't guarantee they wouldn't be broken before such and such time, and 
wouldn't prevent anyone from running their own on faster hardware, or 
building special hardware optimized to break it faster though...  but 
without the private key, the only way to break it would be to brute force 
it.

==========================================================================
 + ^ + |  Ray Arachelian | Amerika: The land of the Freeh. |   _ |>
  \|/  |[email protected]| Where day by day, yet another   |   \ |
<--+-->|                 | Constitutional right vanishes.  |    \|
  /|\  |    Just Say     |                                 |    <|\
 + v + | "No" to the NSA!| Jail the censor, not the author!|    <| n
==========================================================================