cold boot attack question



Would it make the cold boot attack more difficult if each data chunk
was encrypted using two keys, the one currently not in use split into
multiple shadows? The attacker could directly read the key that was
in use when the power went down, but the other one would have to be
reconstructed from the shadows. The number of shadows would be
large enough that the number of bits decaying during a practical
attack would exceede key length. The splitting would have to use an
algorithm providing some bit-mixing (not simple xor).

--
Kusigrosz

to send mail, remove 'erase' from the address

.