Re: Is this the first ever practically-deployed use of a threshold scheme?

2010-08-02 Thread D. K. Smetters
Jonathan Katz wrote: On Sat, 31 Jul 2010, Jakob Schlyter wrote: On 31 jul 2010, at 08.44, Peter Gutmann wrote: Apparently the DNS root key is protected by what sounds like a five-of-seven threshold scheme, but the description is a bit unclear. Does anyone know more? The DNS root key is s

Re: once more, with feeling.

2008-09-24 Thread D. K. Smetters
Peter Gutmann wrote: For existing apps with habituated users, so am I. So how about the following strawman: Take an existing browser (say Firefox), brand it as some special- case secure online banking browser, and use the "new developments" solution above, i.e. it only talks mutual-auth chall

Re: question re practical use of secret sharing

2007-06-22 Thread D. K. Smetters
Peter Gutmann wrote: "Charles Jackson" <[EMAIL PROTECTED]> writes: Is anyone aware of a commercial product that implements secret sharing? If so, can I get a pointer to some product literature? I believe at least some versions of PGP might have supported secret sharing for key backup.

Re: Is cryptography where security took the wrong branch?

2003-09-04 Thread D. K. Smetters
> Eric Rescorla wrote: Ian Grigg <[EMAIL PROTECTED]> writes: I'm almost convinced that WEP is a failure, but I think it retains some residual value. I agree. After all, I occasionally come upon a network I'd like to use and WEP stops me cause I'm too lazy. On the other hand, MAC restrictions wou