• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Quotes Best

  • Quotes Best
  • Home
  • Business
  • Entertainment
  • Health
  • Shopping
  • Technology
  • Travel
  • About
  • Contact
encrypted messages

September 2, 2022 By Emily Hudson Leave a Comment

How To Send Encrypted Messages That Self-Destruct

Messages are often encrypted in transit to protect them from eavesdroppers and attackers. However, once a message has been received, there is no way to stop the recipient from saving the unencrypted message for later use.

One way to address this shortcoming is by allowing messages to self-destruct after they have been read. This ensures that even if the recipient of a message copies or saves it for later use, when it self-destructs there will be no copies left on either end of the transmission channel.

Choosing A Time Period

The first decision to make is how long the private note message should be able to survive beyond being read. This is a tradeoff between the time it takes for an attacker to understand that he has been foiled and the time during which there will be no evidence left of having been read.

For example, if you have a message that you want to encrypt and send over an insecure channel, it may take an attacker several minutes or even hours before she realizes that she has received trash. If the message is self-destructing after reading it, the attacker needs to know that immediately.

Choosing An Encryption Scheme

The encryption scheme chosen should be one that is resistant to known attacks and offers forward secrecy. Ideally it will have a self-destruct capability built in where any encrypted messages received can be destroyed after a certain period of time elapses.

Choosing A Key Length

The key length chosen should be chosen so that it is small enough not to compromise the RIPEMD-160 hash function. The smaller the key length, the shorter the period of time that any unreadable message can survive. For example, if we encrypt an unencrypted message with a 128 bit encryption key, it can survive for 4.3 billion years before being unrecoverable (assuming that there are no major technological changes in 2 billion years). If we lower the key to 64 bits, then it can survive for over a million years.

Choosing A Key Management Scheme

The time before the message becomes irrecoverable depends on when the message is encrypted and which algorithm and key length were used to achieve this encryption. On the other hand, determining where any encrypted messages are received also depends on which algorithm and key length are used as well as how this information is stored in memory.

Since key management will have to be centrally performed by the sender and receiver, using a password that is statically stored in memory is not enough. Instead the keys have to be generated centrally and then activated on both ends of the communication.

The simplest way to achieve this is for both sender and receiver to agree on a common activation time (for example, midnight at one of their local times). The sender can then use this activation time (along with the chosen encryption scheme) to activate any messages that he wants received after that activation time.

Filed Under: Quotes

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Follow US

  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter

TOP 5

Couple discussing relationship myths and realistic dating expectations

Common Dating Misconceptions and the Truth Behind Them

Employment Lawyers

Expert Guidance from Employment Lawyers: What You Need to Know

Home Care

The Role of Family Members in Supporting In Home Care Plans

marine insurance

Are You Underinsured at Sea? A Practical Guide for Importers

Property

How Emergency Glazing Protects Property After Damage

BROWSE BY CATEGORY

  • Business
  • Entertainment
  • Finance
  • General
  • Health
  • Home
  • Life
  • News
  • Photography
  • Property
  • Quotes
  • Shopping
  • Sports
  • Technology
  • Travel
  • Wedding

Footer

About

Hi everyone, My name is Emily Hudson. Welcome to my blog quotesbest.net. We are a team of passionate people who have come together to share our love of writing. We are dedicated to providing quality content that is both informative and entertaining. In our articles, you will get information on business, entertainment, health, shopping, travel and technology...
Read More

Recent Posts

  • Common Dating Misconceptions and the Truth Behind Them
  • Expert Guidance from Employment Lawyers: What You Need to Know
  • The Role of Family Members in Supporting In Home Care Plans
  • Are You Underinsured at Sea? A Practical Guide for Importers
Couple discussing relationship myths and realistic dating expectations

Dating often feels confusing because of the many beliefs people carry into it. Some ideas sound convincing but quietly lead to disappointment. Understanding what truly matters can change how connections form, grow, and last. A clear perspective helps avoid frustration and creates more meaningful, balanced, and respectful dating experiences from the start. Why Dating Misconceptions […]

Copyright @ 2017-2026 Quotes Best | Privacy Policy
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.