]
[mailto:[EMAIL PROTECTED] On Behalf Of Peter Gutmann
Sent: Thursday, June 21, 2007 6:57 AM
To: [EMAIL PROTECTED]; cryptography@metzdowd.com
Subject: Re: question re practical use of secret sharing
Charles Jackson [EMAIL PROTECTED] writes:
Is anyone aware of a commercial product that implements
Actually I worked on a project recently that had this scenario.
Paramedic team picks up heart attack/stroke/serious accident
patient. The paramedic tending the patient is using a laptop to
record EKG or other electronic medical process.
Even with the siren on they get in a serious accident
James A. Donald:
Is anyone aware of a commercial product that
implements secret sharing? If so, can I get a
pointer to some product literature?
Peter Gutmann
It's available as part of other products (e.g. nCipher
do it for keying their HSMs), but I don't know of any
product that just
Peter Gutmann wrote:
Charles Jackson [EMAIL PROTECTED] writes:
Is anyone aware of a commercial product that implements secret sharing? If
so, can I get a pointer to some product literature?
I believe at least some versions of PGP might have supported secret
sharing for key backup.
D. K. Smetters [EMAIL PROTECTED] writes:
However, given the difficulty people have in managing keys in general,
building effective systems that allow them to manage key fragments is beyond
the range of most current commercial products.
I think that's the perfect summary of the problem with
Alexander Klimov wrote:
So if one xors a Linux iso image and some movie, it is quite hard to
claim that the result is copyright-protected.
Why? A copyright-protected work is still copyright-protected,
encrypted or not.
It is just as with any reversible encoding of a copyright-
protected work,
On Jun 13, 2007, at 4:47 AM, Charles Jackson wrote:
A quick question.
Is anyone aware of a commercial product that implements secret
sharing? If
so, can I get a pointer to some product literature?
PGP. http://www.pgp.com/
I can tell you more gory details than you're probably interested
[EMAIL PROTECTED]
D. K. Smetters [EMAIL PROTECTED] writes:
However, given the difficulty people have in managing keys in general,
building effective systems that allow them to manage key fragments is beyond
the range of most current commercial products.
I think that's the perfect
Very interesting discussion.
I bring a different angle to the very topic of discussion (practical
use). See below, after the quotes which I fully agree.
Peter Gutmann wrote:
D. K. Smetters [EMAIL PROTECTED] writes:
However, given the difficulty people have in managing keys in general,
There is a opensource implementation available:
http://point-at-infinity.org//
On 6/13/07, Charles Jackson [EMAIL PROTECTED] wrote:
A quick question.
Is anyone aware of a commercial product that implements secret sharing? If
so, can I get a pointer to some product literature?
--
Saqib
On Fri, 22 Jun 2007, Peter Gutmann wrote:
It's available as part of other products (e.g. nCipher do it for keying their
HSMs), but I don't know of any product that just does... secret sharing. What
would be the user interface for such an application? What would be the target
audience? (I
RSA's BSAFE 6.2.1.0 supports Bloom-Shamir secret sharing.
Peter Trei
Principal Engineer
RSA: the Security Division of EMC.
Disclaimer: I am not a spokesperson for RSA or EMC.
-Original Message-
Charles Jackson asks:
A quick question.
Is anyone aware of a commercial product that
12 matches
Mail list logo