[Cryptech Tech] Fwd: Question regarding Trusted Path Authentication

Peter Gutmann pgut001 at cs.auckland.ac.nz
Thu Dec 18 04:21:44 UTC 2014


Randy Bush <randy at psg.com> quotes Tomofumi Okubo <tomokubo at verisign.com>:

>The question I had during the session is regarding the Trusted Path 
>Authentication.  This is popular for HSM usage in military, financial 
>institutions and commercial CAs. They use Trusted Path Authentication to 
>split the authority to access to the HSM. During the initialization of the 
>HSM, multiple credentials are created using the secret sharing scheme so that 
>it requires M out of N people to perform an operation on the HSM. Per 
>FIPS140, this does not necessarily have to use physical credentials so it 
>shouldn¹t be too messy to implement.

It's actually really, really hard to implement, hard to document, and hard to 
use.  I use this in my book as an example of something that seems quite simple 
(and desirable to have as a feature) until you start thinking about it, and 
then the more you think about it the harder it gets.  If you don't believe me, 
sit down and write out the API required, the data formats, the order and form 
in which the API is called to set things up, the user interface both for when 
things go right and when they go wrong, the procedures required to use it, and 
so on.

This is a feature that can go on the wishlist if required, but a long, long 
way down.

Peter.


More information about the Tech mailing list