Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you claim the encryption was done using a One Time Pad, you can pick any result you want, generate the corresponding key, and hand that over.

https://en.wikipedia.org/wiki/One-time_pad



Unfortunately, the OTP is always as large as the encrypted data. So strictly speaking, this is not really "encrypted data + password" but more of a "split data into two random-looking parts". In particular, this is nothing you can keep in your head or print on paper.

You'd have to keep it on a separate storage medium. And if you have to hand out the done medium, what's preventing them to get your second medium? And if you are able to keep that second medium secret and safe, why don't you store the whole unencrypted data on it in the first place?

Either way: OTPs are really cool, but I don't think they have any relevance here.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: