Re: Sharing/Storing a private key

2013-12-18 Thread Peter Lebbing
On 16/12/13 23:41, Doug Barton wrote:
 but one argument against what you're suggesting is that it's only as secure 
 as the encryption used in step 1 of the hybrid approach.

If only everything in cryptoland was only as secure as 3DES...

 The ability to apply SSS to the entire secret would be quite valuable

I don't see why. If this is because you avoid insecurities in symmetric
crypto, I just don't buy it. Otherwise, please explain.

 although your concern about entropy use is something that should be addressed
 explicitly.

And how do you propose to do that? You can't conjure up good quality entropy.
And if you don't trust symmetric crypto, you can't use that to create an
almost-random stream either.

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://digitalbrains.com/2012/openpgp-key-peter

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Sharing/Storing a private key

2013-12-18 Thread Doug Barton

On 12/18/2013 08:53 AM, Peter Lebbing wrote:

On 16/12/13 23:41, Doug Barton wrote:

but one argument against what you're suggesting is that it's only as secure
as the encryption used in step 1 of the hybrid approach.


If only everything in cryptoland was only as secure as 3DES...


I understand that you're not interested in an argument that the 
encryption of the entire secret may not be secure, but everything is 
secure right up until it isn't. (Robert, please ignore my tortuous use 
of secure in that sentence.) :)



The ability to apply SSS to the entire secret would be quite valuable


I don't see why. If this is because you avoid insecurities in symmetric
crypto, I just don't buy it. Otherwise, please explain.


Completely aside from the possibility (however remote) of the crypto 
failing, I'm also thinking of layer 9 issues that can come into play. 
For example I was the one who proposed using SSS to distribute portions 
of the root DNSSEC KSK to members of the community to provide a disaster 
recovery procedure should something catastrophic happen to ICANN. They 
didn't finish the root key protocol until after I left IANA, and what 
they ended up doing instead was using a HSM to store the key. But they 
did end up using SSS with members of the community to share the password 
for the HSM, for the same reason I proposed.


If the HSM hadn't come into play the politically expedient thing to do 
would have been to distribute pieces of the secret, rather than pieces 
of the key used to encrypt the secret. Now I realize that most of the 
people on the list aren't interested in layer 9, but some of us live in 
a world where it is necessary to do so. :)



although your concern about entropy use is something that should be addressed
explicitly.


And how do you propose to do that?


I don't, I was suggesting that your concerns are valid and that the 
author of the new software is responsible for addressing them.


Doug


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Sharing/Storing a private key

2013-12-18 Thread Robert J. Hansen
On 12/18/2013 1:25 PM, Doug Barton wrote:
 (Robert, please ignore my tortuous use of secure in that sentence.) :)

Hey, I was being *nice*.  I wasn't even pointing out that 3DES only has
112 bits of keyspace... ;)


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Sharing/Storing a private key

2013-12-18 Thread Mindiell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Well,

I'm really sorry to have set up such a conversation :o)

As I said earlier I'm not quite good at crypto-things, all I wanted to
do was to protect my private key easily in case of HDD error.

And all I wanted to do with this little tool was to share it with you.

If you can explain to such a nooby-noob like me what matters, I'll try
to do my best not to make you loose your time ;o)

Mindiell,


Le 18/12/2013 17:53, Peter Lebbing a écrit :
 On 16/12/13 23:41, Doug Barton wrote:
 but one argument against what you're suggesting is that it's only
 as secure as the encryption used in step 1 of the hybrid
 approach.
 
 If only everything in cryptoland was only as secure as 3DES...
 
 The ability to apply SSS to the entire secret would be quite
 valuable
 
 I don't see why. If this is because you avoid insecurities in
 symmetric crypto, I just don't buy it. Otherwise, please explain.
 
 although your concern about entropy use is something that should
 be addressed explicitly.
 
 And how do you propose to do that? You can't conjure up good
 quality entropy. And if you don't trust symmetric crypto, you can't
 use that to create an almost-random stream either.
 
 Peter.
 

- -- 
Mindiell
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iF4EAREIAAYFAlKyCscACgkQUrT9WwBwY7zakQD/YTei8nEPmIL+aiPrF+lVqJPP
POvkULr4DoDGA+bV63cA/2rUxaY8epxpdtbQtT44zEJ6fL6cwO3Go4jtRPy2LSNu
=i3nj
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Sharing/Storing a private key

2013-12-16 Thread Doug Barton

On 12/15/2013 04:58 AM, Peter Lebbing wrote:

On 14/12/13 21:14, Leo Gaspard wrote:

Maybe if you explained what the limitations of  are...?


My guess is the fact that  only supports secrets up to 1024 bits; if you
want to share a larger secret you need to do a hybrid approach where you
symmetrically encrypt the data and then use secret sharing for the randomly
chosen encryption key.

If I understand Mindiell's message right, his implementation works for larger
secrets.

But I don't see why you wouldn't just use  and the hybrid approach.


I haven't looked at Mindiell's software, but one argument against what 
you're suggesting is that it's only as secure as the encryption used in 
step 1 of the hybrid approach. The ability to apply SSS to the entire 
secret would be quite valuable, although your concern about entropy use 
is something that should be addressed explicitly.


Doug



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Sharing/Storing a private key

2013-12-15 Thread Werner Koch
On Sat, 14 Dec 2013 21:14, ekl...@gmail.com said:

 AFAIK,  *is* an implementation of SSS. So, why would you write a new
 version?

FWIW, a few years ago, Phil Sutter  wrote a daemon for GnuPG which
implements secret key splitting.  I don't have the URL handy, but it
should be easy to find.


Salam-Shalom,

   Werner


-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Sharing/Storing a private key

2013-12-15 Thread Peter Lebbing
On 14/12/13 21:14, Leo Gaspard wrote:
 Maybe if you explained what the limitations of  are...?

My guess is the fact that  only supports secrets up to 1024 bits; if you
want to share a larger secret you need to do a hybrid approach where you
symmetrically encrypt the data and then use secret sharing for the randomly
chosen encryption key.

If I understand Mindiell's message right, his implementation works for larger
secrets.

But I don't see why you wouldn't just use  and the hybrid approach. For one,
it uses much less entropy, since Shamir's secret sharing algorithm requires a
lot of it, I believe proportional to the size of the data to be shared. I
haven't checked the code by Mindiell, but this sounds like a potentially big 
issue.

It seems to me the hybrid approach is better. Since  supports the hybrid
approach, I don't see the need for a new tool. I do see use for a much simpler
tool that makes the hybrid approach more accessible: pick a random key, and use
that for invocations of both (openssl or gnupg) and .

HTH,

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://digitalbrains.com/2012/openpgp-key-peter

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Sharing/Storing a private key

2013-12-15 Thread Mindiell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

 AFAIK,  *is* an implementation of SSS. So, why would you write
 a new version?
 
 I must say I didn't look at the source, as I do not see the point
 at first.
 
 So, this is a warning about security issues : something you made
 yourself is likely to be unsafe. A tested implementation exists.
 
 Maybe is there really a point in writing it, but I can't see which.
 Maybe if you explained what the limitations of  are...?
 
 HTH,
 
 Leo
 

Hello,

The demo of  shows :
- - a secret limited to 128 characters
- - a generation of n fragments in once pass. You couldn't generate a
new fragment later
- - you have to copy paste each fragments after splitting, and right again
on combination

Plus, in the source code, you can see it is not using the modulo part,
needing a specific lib (if I understood well).
Finally, when I tried it on the demo page, if I enter less fragments
than needed, it seems to raise an error which can help into
discovering how much fragments are needed.

In the end, it was a good exercise for me and I wanted to share it.
And as a Python version it is runnable everywhere without compiling
which seems to be a problem with the last version of .

regards,

- -- 
Mindiell
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iF4EAREIAAYFAlKtofQACgkQUrT9WwBwY7xd4wD9HCDe/Rb6uNZTvT+Jlm1SZLVU
k2+hl/971LMU8EcBSzwA/RSJE+CV0+vdrwKWOZyK2XQp5du3lsH69SAic5RU9IRm
=L9PN
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Sharing/Storing a private key

2013-12-14 Thread Leo Gaspard
On Fri, Dec 13, 2013 at 12:12:12PM +0100, Mindiell wrote:
 Hello,
 
 I'm using GPG regularly and did want to save my private key.
 
 [...]
 
 I found  (http://point-at-infinity.org//) too, but it wasn't
 really usable beacause it has too many limitations IMHO.
 
 So I did it myself : ShareIt (https://gitorious.org/shareit)

 [...]
 
 It is using the Shamir's Sharing Secret Algorithm
 (http://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing).
 
 [...]

 Any Comments and/or critics are more than welcome, especially on security
 issues.

AFAIK,  *is* an implementation of SSS. So, why would you write a new
version?

I must say I didn't look at the source, as I do not see the point at first.

So, this is a warning about security issues : something you made yourself is
likely to be unsafe. A tested implementation exists.

Maybe is there really a point in writing it, but I can't see which. Maybe if you
explained what the limitations of  are...?

HTH,

Leo

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Sharing/Storing a private key

2013-12-13 Thread Mindiell

Hello,



I'm using GPG regularly and did want to save my private key.



On the IRC channel someone linked me to paperkey :

http://www.jabberwocky.com/software/paperkey/

While this project is really interseting, it does not fit my needs.



I found  (http://point-at-infinity.org//) too, but it wasn't

really usable beacause it has too many limitations IMHO.



So I did it myself : ShareIt (https://gitorious.org/shareit)



It's a very simple program which take a file (whatever in it a GPG key

or a pdf, etc...) and generates some fragments which can be given to

some contacts in order to store the document while not making it

readable directly.



It is using the Shamir's Sharing Secret Algorithm

(http://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing).



I ever worked on a faster fragmentation this morning and will push it on

the repo this evening (I can't from here). I planned a C version too, I

hope to release quickly, but it is not really needed urgently because

the Python version

is fast enough to share a GnuPG key.





Any Comments and/or critics are more than welcome, especially on security

issues.



Regards,





Mindiell

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users