lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200502200621.j1K6Lnk5016864@turing-police.cc.vt.edu>
Date: Sun, 20 Feb 2005 01:21:49 -0500
From: Valdis.Kletnieks@...edu
To: John Richard Moser <nigelenki@...cast.net>
Cc: bugtraq@...urityfocus.com
Subject: Re: Joint encryption?

On Fri, 18 Feb 2005 02:42:44 EST, John Richard Moser said:

> The problem is that I need a guaranteed way to create data for any valid
> N and M where N >= 3 > M >= 2 in which access to M fragments of the key
> (each fragment is encrypted) can be used to gain access to the rest of
> the fragments, which in turn allows any selection of M users to
> authenticate and gain physical access to the key.

Schneier's 'Applied Cryptography' discusses "secret sharing" schemes, and
chasing the references from there should be sufficient.

> Reminder that the idea here is to use a physical method, not bare access
> control that can be evaded by loading a modified kernel.

Not sure what you mean by "a physical method", unless you go to something like
the old "2 keys must be inserted at the same time in slots more than an arm's
reach apart" type of scheme.

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ