[9561] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Best practices/HOWTO for key storage in small office/home

daemon@ATHENA.MIT.EDU (Bill Stewart)
Tue Oct 2 12:49:50 2001

Message-Id: <5.0.2.1.1.20011002093944.034d5930@idiom.com>
Date: Tue, 02 Oct 2001 09:41:51 -0700
To: Conspiracy <cryptography@wasabisystems.com>
From: Bill Stewart <bill.stewart@pobox.com>
In-Reply-To: <Pine.SOL.4.30.0110021917010.24155-100000@kruuna.Helsinki.F
 I>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

At 07:23 PM 10/02/2001 +0300, Sampo Syreeni wrote:
>Or integrate some computing power into those IBM thingies, and use
>remotely keyed encryption. Enough power is available through USB so that
>you don't have to end up with battery power.

Sounds like you're starting to reinvent the I-Button.
(Dallas semiconductor's product - uses a small computer chip
and an infrared link attached to a watch battery.)

But, yeah, the USB memory things are cute, at least if you're
using machines new enough to have USB ports.

If your threat model includes people rifling through your office
looking for stuff, you're probably toast anyway,
but you can always do a secret-sharing thing.
If you do want off-site storage for your keys,
secret-sharing is especially important.




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post