[Cryptech Tech] Fwd: Question regarding Trusted Path Authentication

Leif Johansson leifj at sunet.se
Thu Dec 18 07:58:09 UTC 2014


On 12/18/2014 05:21 AM, Peter Gutmann wrote:
> Randy Bush <randy at psg.com> quotes Tomofumi Okubo <tomokubo at verisign.com>:
> 
>> The question I had during the session is regarding the Trusted Path 
>> Authentication.  This is popular for HSM usage in military, financial 
>> institutions and commercial CAs. They use Trusted Path Authentication to 
>> split the authority to access to the HSM. During the initialization of the 
>> HSM, multiple credentials are created using the secret sharing scheme so that 
>> it requires M out of N people to perform an operation on the HSM. Per 
>> FIPS140, this does not necessarily have to use physical credentials so it 
>> shouldn¹t be too messy to implement.
> 
> It's actually really, really hard to implement, hard to document, and hard to 
> use.  I use this in my book as an example of something that seems quite simple 
> (and desirable to have as a feature) until you start thinking about it, and 
> then the more you think about it the harder it gets.  If you don't believe me, 
> sit down and write out the API required, the data formats, the order and form 
> in which the API is called to set things up, the user interface both for when 
> things go right and when they go wrong, the procedures required to use it, and 
> so on.
> 
> This is a feature that can go on the wishlist if required, but a long, long 
> way down.
> 

Just curious: what is the bcp m-b-n scheme folks implement... is it
still shamirs?

	Cheers Leif




More information about the Tech mailing list