What will happen to your crypto keys when you die?

Jon Callas jon at callas.org
Thu Jul 2 14:42:39 EDT 2009


On Jul 1, 2009, at 4:29 PM, silky wrote:

> On Wed, Jul 1, 2009 at 6:48 PM, Udhay Shankar N<udhay at pobox.com>  
> wrote:
>> Udhay Shankar N wrote, [on 5/29/2009 9:02 AM]:
>>> Fascinating discussion at boing boing that will probably be of  
>>> interest
>>> to this list.
>>>
>>> http://www.boingboing.net/2009/05/27/what-will-happen-to.html
>>
>> Followup article by Cory Doctorow:
>>
>> http://www.guardian.co.uk/technology/2009/jun/30/data-protection-internet
>
> A potentially amusing/silly solution would be to have one strong key
> that you change monthly, and then, encrypt *that* key, with a method
> that will be brute-forceable in 2 months and make it public. As long
> as you are constantly changing your key, no-one will decrypt it in
> time, but assuming you do die, they can potentially decrypt it while
> arranging your funeral :)

I'll point out that PGP has had key splitting for ages now. You can  
today make a strong public key and split it into N shares, of which  
two or three shares are needed to reconstitute the key, and hand those  
out to trusted loved ones.

You can then use that public key for files, virtual disks, whole disk  
volumes -- anywhere you could use an RSA or Elgamal key -- and be  
assured that your data is safe in the absence of a conspiracy of those  
loved ones.

It's there now, and has been there for a decade.

	Jon

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list