Bugtraq mailing list archives

Re: Joint encryption?


From: John Richard Moser <nigelenki () comcast net>
Date: Sun, 20 Feb 2005 13:00:51 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Valdis.Kletnieks () vt edu wrote:
On Fri, 18 Feb 2005 02:42:44 EST, John Richard Moser said:


The problem is that I need a guaranteed way to create data for any valid
N and M where N >= 3 > M >= 2 in which access to M fragments of the key
(each fragment is encrypted) can be used to gain access to the rest of
the fragments, which in turn allows any selection of M users to
authenticate and gain physical access to the key.


Schneier's 'Applied Cryptography' discusses "secret sharing" schemes, and
chasing the references from there should be sufficient.


Reminder that the idea here is to use a physical method, not bare access
control that can be evaded by loading a modified kernel.


Not sure what you mean by "a physical method", unless you go to something like
the old "2 keys must be inserted at the same time in slots more than an arm's
reach apart" type of scheme.

In essence, if you encrypt something, and destroy the key, you destroy
the data.  At least, the point of encrypting something is so that it
"can't" (reasonably) be accessed without the key (or a 4096 qubit
computer) (in the life of the universe).  There's no point to cyphering
something if it can be retrieved without the key in some interval which
ends within the period that the data is supposed to remain secret.

Because of this, I consider encryption to be a physical barrier.  You
can get the disk, you can use another OS on it, you can hardware hack
the machine, you can take it apart, you can do a MFM examination, splice
it in a chemical vat, spectral analyze it, put it in a tractor beam and
try to extract the data that way, fire phasers at it, whatever, you
don't get to the data without the key.

(note too that a lock is a physical barrier; but a good sledgehammer
will shatter the mechanism if it's bigger than the lock)

- --
All content of all messages exchanged herein are left in the
Public Domain, unless otherwise explicitly stated.

    Creative brains are a valuable, limited resource. They shouldn't be
    wasted on re-inventing the wheel when there are so many fascinating
    new problems waiting out there.
                                                 -- Eric Steven Raymond
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCGNBThDd4aOud5P8RAtQGAJ0UJ3rtj6G7YHtcgIvrFwMGw+rVrQCgiVd6
C0IM1xhECUl9Yuh5F71ExDs=
=+BN2
-----END PGP SIGNATURE-----


Current thread: