[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: You can be forced to turn over your encryption keys?
At 10:17 AM 10/7/96 -0800, Timothy C. May wrote:
>At 10:33 AM -0400 10/7/96, Geoffrey C. Grabow wrote:
>>I thought we had a 5th amendment. Isn't turning over your key that may (or
>>may not) expose encriminating evidence an extension of self-encrimination?
>>Haven't there been dozens of famous witnesses (Patty Hurst, Oliver North,
>>etc) that "take the 5th" dozens of times on the stand. Why couldn't I
>>"take the 5th" when asked for my encryption keys? When asked for your key,
>>can't you say: "I'm sorry your honor, but I respectfully refuse to answer
>>that question on the grounds that it may incriminate me.".
>Though IANAL, I know of many, many discussions of this question. So far as
>I know, it remains one of The Great Unresolved Questions.
I think that there was an idea that appeared in the last few months around
here, which took advantage of the fact that a one-time pad makes all
decrypts equally likely. If the cops sieze an apparently-encrypted file and
they insist on the key, just ask them to give you the file back (although
presumably you already had it) and present them with the OTP, revealing the
fact (surprise!!!) that the thing decrypts to (for just one example) the
first "N" bytes of the King James Bible, or the Cybernomicon, or "War and
Peace" or the stock exchange results for August 1, 1989, etc...
This suggests that there is a reason to have a program which uses OTP
techniques but generates files which "look like" valid PGP output. The judge
can't force you to reveal what you don't know, but more importantly if you
give him a "key" that might be the correct one, and assuming it is
impossible to prove that it wasn't the correct key, then it would be
somewhat pointless and certainly unjustified for him to continue to insist
on providing yet another key.
Jim Bell
[email protected]