Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

1. You need all the shards of the key to decrypt the text instead of just reaching a threshold.

2. The full encrypted text is available to each person, making it vulnerable to a brute force attack at some point in the far future.

I'm not entirely sure if this implementation actually covers that second point though. It could be including the entire encrypted text with each copy. But it would theoretically be possible to protect against brute force attacks in that way.



The second point, yeah that's relevant.

On the first point, just give each person n-1 shards, each missing a different one. Then any 2 can decrypt. Or configure it for however many participants there are and they minimum number needed to encrypt.


The key part about Shamir is that having any number of shards short of the threshold doesn't reveal anything about the secret. Let's say you split your 256 bit encryption key into 4 64-bit pieces with each person getting 3 of the 4. Each person now knows 3/4 of the secret. Now any one person simply has to brute force the remaining 64 bits of the key in order to decrypt.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: