OK. So we've established that the key is set via software.
Software can be hacked.
And now there's only a single spit of data to focus all the effort
on. Years ago at a SHARE presentation, I caught an IBMer after the
session and they admitted that I was correct.
/Leonard
P.S. Someone has to know all the security officers in order to
contact them when necessary to input the keys.
Radoslaw Skorupka wrote on 1/15/2024 6:44 AM:
It is being done everytime you buy new machine and use ICSF.
TKE can be used for that, but even without it is feasible and
secure. ...and secure. :-)
1. Master key is divided into parts. How many? 2 or more.
2. Each part is know to only one security officer. Note, the
officers need not to know each other. That's information security -
no single person can disclose the key. No one knows the key.
3. Every officer is "duplicated" by another person. That's data
security - lost key part is not a problem, because we have another
copy of the part.
So, let's assuming 2 key parts and three copies we have 6 persons
and 6 safes to keep the parts.
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN