The case hinged around the question of where the state’s rights to subpoena material in a court case ends and fifth amendment rights against self-incrimination begin.
A better analogy is a combination lock vs. a key lock. The police can show you the warrant and ask for the key. Can they show you a warrant and demand you tell them the combination or you unlock it for them? How is making you reveal a combination or encription password different than compelling you to admit where you were last Saturday during the murder, or put you on the stand without your consent and demand you say where the gun is?
The discussions I read said that if it comes from out of your mind, it’s fifth protected. If it’s physical actual, “I can do it without your inpu” data, then it’s subject to a warrant.
your OP is moderately ambiguous. Do you mean you have a file of garble - pretty much impossible to memorize - that can unlcok the encrypted documents? Whatever medium that file is on, if you erare it, you are destroying evidence. Depending on the evidence, you may be better off with the obstruction-of-justice charge than with the evidence out in the open. Case law around electronic material is still evolving, but essentially if you detroyed the only real way to read a bunch of electronic documents, I would imagine the argument could be made the documents are effectively destroyed. (If you encased the documents inc oncrete adn dropped them in the ocean, they could dredge for a few years, eventually find them, and maybe crack open the concrete and read them - but for the practical purposes of the trial, you disposed of them.)
Once you realize that the material of any sort would be evidence and you destroy it, you are obstructing justice. (Maybe a lawyer can clarify the issues here). For example, Martha Stewart IIRC got a call warning ehr the feds were investigating her tipster for insider trading. She then deleted the log entry on her computer about her stock ip phone call. Even though she re-typed the entry a little bit later, she was still convicted of obstruction for the deletion.
The twist in the Colorado case was that they had a awiretap of the woman cleverly telling her husband that the incriminating documents were in the encrypted folder; so the state’s argument was that they were not requiring the woman to incriminate herself because they already knew these were incriminating documents, they were just ordering her to produce what she had.
Note the other distinction… the police cannot go fishing. They need to say exactly what they are after, then only look for that. If they are looking for a gun, they cannot open letters and file folders (unless they are bulky and fat and could be hiding a gun). Similarly, if they are looking for stlen VCR’s they can’t read your files (unless the warrant includes “and corrspondence about disposing of stolen VCR’s”, say.) Anything found which is not in plain sight or obvious during search for legitimate search targets, is off limits.
The difficulty is that if you refuse to open a combination lock the police can call in the torches and jackhammers and get there in a day or less. (IIRC you are not obliged the materially assist them). SO, the incentive is to either have an intact house or not, for the rest the outcome is the same. With electronic documents, it will take the jackhammers several lifetimes of the universe.
So the question is - is a password or combination testimony or physical evidence?
If you can forget it, IMHO it’s testimony.
In Colorado, they bypassed the question when the hubby produced the password.