hi,

The methodology is very simple again.

'A'  uses a very strong crytographic algorithm which
would be forced out by rubber horse cryptanalysis
Now if Aice could give another key k` such that the 
cipher text (c) decrypts to another dummy plain
text(D) 
the secret police gets to read 
the dummy plain text(D) using the surrendered key k` 
without compramising the real plain text(P). 

goes like this. 
p=plain text 
c=cipher text 
D=dummy plain text 
k=oiginal key 
k`=dummy key. 

Now A encrypt using a good asymmetric key 
algorithm. 
Now A has cipher text C. 
Now A takes her Dummy plain text (D) and she, 
C (xor) D=k` 
Now to the secret police she can surrender k`. 
The secret police decrypts dummy plain text D as 
D=c(xor)k` 
She can now say that she used k` as one time pads to 
encrypt C. 

There is no way to prove that k` is not a valid key
unless 
they ever get hold of k. 

hOW ever as what is said,it doesn't look like it will
work.


Regards Sarath.

__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus – Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com

Reply via email to