Solved

Does a encrption program exist the incorperates a time bomb.

Posted on 2003-12-04
3
180 Views
Last Modified: 2013-12-04
By this I mean if you open up a file with a password/key past a certain date it becomes corrupted.
So the password has a life span.
To reactivate the file you have to enter in a new password/ key that the user has to get from HQ


Cheers
Justin
I hope this makes sence
0
Comment
Question by:JustinJGreenland
3 Comments
 
LVL 1

Accepted Solution

by:
chrish4321 earned 250 total points
ID: 9893471
Well, I don't know of any product that attempts to do this off the top of my head, but even if there were such a product, it would be hard to make it very secure.  Take this scenario, for example:

1. you use such a program,and encrypt a file.  You set it to expire in a week.
2. Two weeks later, Mallory, having gotten access to your encrypted file, a copy of the program, and your password, want to get the file, even though it's expired.  If he runs the program the way he's supposed to, the file self destructs.  However, he'd just set his computer clock back a week, thereby fooling the program into accepting the wrong date, and giving him the file.  Even if the program "rembers" how long it's been installed, like some shareware programs do, this isn't cryptographically secure, and anyway he could just set his clock back before he installs the program.  

Now, if the program securely "phoned home" to a trusted internet sight to get the date, it would be tougher to trick but still not impossible.  Mallory could just write his own decryption program that paid no attention to the date, since traditionally, you want _all_ of your security to come from the key (password), and not from the program used to encrypt/decrypt.  

I can think of a scheme, using a trusted third party, that might work, but I know of no extant services that do this, and anyway, it has several disadvantages.  

You could encrypt the file, then XOR the key (password) with a random secret bit string.  You keep the XOR, throw away the original key, and send the random bit string to the third party, who keeps it securely for the specified time period.  

Before the time period expires, this third party would give the secret bit string to you once you've verified your identity with them, allowing you to XOR your secret and theirs to get the original key.  Once the time period has expired, the third party destroys their secret, forever destroying the original key.  

This idea has lots of holes, and there are probably better solutions in the cryptographic litterature, but essentially, you're stuck if you just want a stand alone Windows program that will (securely) refuse to decrypt a file after a certain amount of time.  Maybe you could do the splitting up of keys yourself, and destroy the key after a certain period of time.  

Now, having said all this, I do know there are email services that will destroy emails after a certain amount of time has passed.  Of course, you have to trust that they're not keeping a copy for themselves, but the solution is attractive for those who don't want records of what they've writeen lying about in other people's inboxes.  

Here's a link off of google: http://www.self-destructing-email.com/.  I know _nothing_ about these people and you probably shouldn't blindly trust what they say, or even what I reccommend, if you're truly concerned about security.  Look around for other services, I'm sure they're there.  

So, to sum up, no, I don't think there's any such program around, and if there were, I wouldn't trust the "expiration date" part of it to be secure.  

0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question