Questions tagged [key-escrow]
6 questions
17
votes
5 answers
Could one construct a cipher that is secure for friendly parties to use but insecure for hostile parties?
Consider the situation of a nation state (Blue) at war with another nation state (Red). Blue wants to deploy a secure cipher that blue currently can not break, but they are considered that Red could reverse engineer the cipher and use it to secure…
Ethan Heilman
- 2,326
- 2
- 20
- 40
7
votes
4 answers
How to require two keyholders to decrypt a document?
I want to create a system to encrypt a document and store it with a 3rd party, but not have the 3rd party be able to decrypt it until some unspecified later date. It seems like the solution would be to split the key into two parts, given to two…
Jim McKeeth
- 931
- 1
- 8
- 16
5
votes
1 answer
How does partial key escrow work?
It is being speculated that one of the ways that NSA leaker Edward Snowden may have created his "insurance policy" – distributing sensitive documents to various individuals with instructions to disseminate them should anything happen to him--is…
nitrl
- 153
- 5
2
votes
0 answers
How to safely double-encrypt a secret?
Imagine two persons: Alice and Bob. We have a generated secret value that is valuable and has to be encrypted in a way that both can't reveal the value on their own but only when they both confirm.
My first approach would have been to double encrypt…
David
- 21
- 1
1
vote
0 answers
Any algorithm with a pair of master keys and multiple pairs of subkey for a secure key escrow?
Note: This question looks like my other question — Any algorithm with a master key for decrypting private key encrypted messages? — which is perfectly answered by @real-or-random, but this one is different in how subkeys are generated.
Assume the…
BravoCrypto
- 31
- 4
1
vote
1 answer
RSA Protocol behind Yaksha Security System
So I'm reading over the Yaksha Security System and see it is based on the RSA cryptosystem and a centralized server, easy enough. What I'm slightly confused on is the math behind the related keys.
It states
nAlice - Alice(some user) modulus
…
sealsix
- 13
- 3