July 28th, 2024

How can a time traveler encrypt info so it's only decryptable after a given date

A time traveler can generate a secure encryption key using astronomical events like novas or historical timestamps, ensuring unpredictability and reliability while minimizing human interaction for data access.

Read original articleLink Icon
How can a time traveler encrypt info so it's only decryptable after a given date

A time traveler aiming to encrypt information for future access can utilize various methods to generate an encryption key that becomes available only after a specified time. One proposed approach involves using astronomical events, such as novas, to create a secure key. The traveler could instruct users to record the coordinates of novas occurring within a specific five-year period, converting these coordinates into binary format and concatenating them to form a 256-bit key using SHA-256 hashing. This method ensures unpredictability and security, as novas cannot be predicted in advance.

Alternatively, the traveler could rely on historical events or timestamps, such as the last few binary digits of Unix timestamps from significant occurrences, to generate a long and complex key. This would allow for lower accuracy measurements while still achieving a secure encryption standard.

Another suggestion involves using tamper-proof devices that automatically release the encrypted data at predetermined intervals, minimizing human interaction and the risk of premature access. Additionally, low-tech solutions, such as depositing instructions with lawyers to be opened at a specific date, could serve as a backup method for key retrieval.

Overall, the key generation process must balance security, reliability, and the ability to withstand potential technological advancements or changes in measurement accuracy over time.

Link Icon 24 comments
By @card_zero - 3 months
There's this star called R Scuti:

https://en.wikipedia.org/wiki/R_Scuti

* The light from it is variable,

* This variation is continuous, not a rare event,

* It's 4,000 light years away, so the butterfly effect is irrelevant because the light is already on its way,

* It's chaotic and unpredictable.

Basically a reliable stream of random data. I guess the only problem is that you need to know what observations of its light levels were, throughout the 80s, if the records even exist.

Edit: "The AAVSO International Database currently contains over 110,000 observations of this erratic star spanning nearly a century of activity." There you go, that should provide a thousand measurements to base a key on in any given year.

By @slicktux - 3 months
This reminds me of the Joe Grand video titled:

“ I hacked time to recover $3 million from a Bitcoin software wallet”

Just put a program in the computer that generates a ‘random’ key based on time of day and second…and it does this every day at pre defined hours…and maybe some way that the time and date can’t be modified. Then, only when that day and time comes will the right key be generated and the files decrypted. Program does not know when that date is it just bases the key generation on time and date.

By @mrrccc - 3 months
The team behind the awesome drand project (https://drand.love) has proposed a timelock encryption scheme based on an existing threshold network (the League of Entropy).

They even provided a fully operational, web-based, open-source implementation: https://timevault.drand.love

By @kdkdodiei4 - 3 months
Make it only decrypted by brute force, taking into account the history of the algorithms and the computational level. There is no clue, you just have to use the knowledge of the time to try to solve it. You can even create the program and its minimum requirements to make sure they have a direction.
By @nickdothutton - 3 months
Position in a coordinate system of epicentre of earthquakes, perhaps those above a certain threshold depending on how much entropy you needed.
By @motohagiography - 3 months
the comment in the response about using stars going nova between the present and the travelled-from time was probably the best answer, but it requires accepting the paradox of the possibility of time travel while still ruling out faster than light travel- as you could get the key earlier than the set date by travelling light years toward where the stars were sampled from.

If you are protecting the secret from non-time travelers, you're probably fine, but if you are protecting it from other time travellers, your compute or proof of work has to be more expensive than their time-travel propulsion energy units.

We have this same problem with device attestation, where if the key exists in the same "universe" (hardware substrate) as the ciphertext, you're effectively fighting time travellers because they can run, re-run, use side channels, insert a breakpoint anywhere along the way. The current solutions are in the domains of physical tamper proofing, "white box" cryptography and other obfuscation schemes, and ultimately fully homomorphic encryption (FHE).

FHE would be the necessary solution against time travellers in this case because no matter where in time they were, they would have to be present at the instant the compute operation completes- and then you're into a race condition against Planck time to see who can grab the result of the computation first when it finishes. (assuming they can't infer or predict the result earlier than the completion of the FHE computation, that earlier decryption rounds don't reduce the time it takes to brute force the rest of it in a parallel stopped-timeline, and that Planck time still means anything in a universe where time isn't unidirectional and scalar)

Writing wise, there would have to be a hitch in their time travel scheme where to work it needed randomness and a lack of precision for some important quantum uncertainty reason, and the race to be present for the FHE decryption before the time travellers resolved their precision problem would drive the plot.

don't be discouraged though, a cursory reading of scientific discovery shows that impossible is mostly a convention, and cryptography historically reduces to a gentleman's agreement.

By @paulmendoza - 3 months
Use an encryption key that is a headline from a newspaper for that day. This assumes the time travel works like the Marvel movies and not like Back to the Future.
By @K0balt - 3 months
In order for the butterfly effect to not disturb the results of any random or pseudorandom key, the key must be derived in such a way that the distance of the key generation event is greater than 1/2 the light-time of the key delivery delay, so that in no case can any information from the key holders reference reach the key source prior to key generation.

Other than that the key must be based in a purely deterministic algorithm to be immune to butterfly factors, which can always be brute forced by accelerating the civilization to fractional relativistic velocities or bringing it close to an extremely massive object. (Leaving the keygen at rest) Of course other ways to brute force such a key generator are probably more practical, but a relativistic attack is the steel man for the impossibility of reliability.

Stealth might be the best bet, an undersea bouy that pops up and broadcasts the key at the specified time or something like that. But then again, a fast moving civilisation would get the key “early” from their frame, even for astronomical events.

I posit that there is no absolutely reliable delay, but stealth is probably the best practical hedge.

By @foota - 3 months
How about this: take as input something random from beyond the time horizon (e.g., brightness from stars 300 light years away). Then (if we assume the input is sufficiently random) they should be fine.
By @bdjsiqoocwk - 3 months
This is really one of those questions where you want X, you started down the path of answering the question but got stuck, and now are asking how to get unstuck when you should be asking for X.

He's asking "how to decrypt only after a certain date" when in reality he should be asking "how to make information available after a certain date".

By @PaulKeeble - 3 months
The more generic although potentially harder question is without the time traveler element what could you do today to make sure something could not be decrypted before a certain date. This seems potentially useful but also every bit as tricky to answer especially since we don't know what the future entails unlike a time traveller.
By @kdkdodiei4 - 3 months
For me it is easy if you are an old man you can simply know what algorithm was used at each time and at the computational level of each time, therefore you can make the only way to decipher the cave is by brute force and that it is probable and easy to resolved in each era through advances and knowledge.
By @a1o - 3 months
I don't quite get notion of sending something back in time but before the actual date you want the thing to work... But anyway, you really can't make the crypto device a tech level superior of the time or the crypto device itself gives information on the future.
By @0cf8612b2e1e - 3 months
Not going to result in an equal sharing of information, but if you can drop doodads at different time and locations, make a scavenger hunt for the key.

First key is stored at the center of Olympus Mons on Mars.

By @mtremsal - 3 months
Isn’t that exactly what drand is meant to provide?

See drand, the distributed randomness beacon protocol at https://drand.love/

By @mikewarot - 3 months
Lost texts are recovered, and artifacts are found all the time. You could use an old artifact's decrypted text, or location, as a source of a passkey.
By @geekodour - 3 months
By @staplung - 3 months
A basket of specified (closing) stock prices on day X.
By @piinbinary - 3 months
Ignoring the butterfly effect issue, I would have said just pick the title of a given newspaper on a given date as the password.
By @trabs4t - 3 months
Transmit the key via radio wave, from a point source located x light years from earth. The key will reach earth after x years.
By @eknkc - 3 months
Would earthquakes be susceptible to butterfly effect? Historic earhquake data might solve the issue.
By @aquafox - 3 months
Why not use a private key based on a bunch of lottery draws that happened just before the date?
By @_boffin_ - 3 months
market close data: tickers, their closing prices, and volumes for a given market or markets. For more, first paragraph of a story for each ticker.