2024-08-03 21:23:14 +00:00
|
|
|
# Glossary
|
|
|
|
|
|
|
|
## Ciphertext
|
|
|
|
In cryptography, ciphertext is the result of encryption performed on plaintext
|
|
|
|
using an algorithm, called a cipher.
|
|
|
|
|
2024-08-03 23:02:38 +00:00
|
|
|
## Quorum Key Management (QKM)
|
2024-08-03 21:23:14 +00:00
|
|
|
A set of highly specified processes and tooling used for setting up a highly
|
|
|
|
resilient quorum-based key management system.
|
|
|
|
|
|
|
|
## Operator
|
|
|
|
An individual who manages an [Operator Key](#operator-key) which is used for
|
|
|
|
protecting the passphrase of a Location key and participates in different
|
2024-08-03 23:02:38 +00:00
|
|
|
aspects of the lifecycle management of the QKM system.
|
2024-08-03 21:23:14 +00:00
|
|
|
|
|
|
|
## Operator Key
|
|
|
|
An asymmetric key used for protecting the passphrase of a Location key
|
|
|
|
|
|
|
|
## Quorum
|
|
|
|
The chosen M of N threshold used to achieve "quorum", which is a type of
|
|
|
|
agreement or consensus between a group of individuals. In the context of
|
|
|
|
Shamir's Secret Sharing, it refers to the minimum number of shards required to
|
|
|
|
reassemble the [Root Entropy](#root-entripy-re).
|
|
|
|
|
|
|
|
#### Wrench Factor
|
|
|
|
How many people are required to be put under duress (via smacking them with a
|
|
|
|
wrench repeatedly or otherwise to get access to their Shard) before the Disaster
|
|
|
|
Recover Key is compromised.
|
|
|
|
|
|
|
|
#### Bus Factor
|
|
|
|
How many members of the Quorum can meet an untimely demise without irretrievably
|
|
|
|
locking access to the Distrust Quroum system.
|
|
|
|
|
|
|
|
## Root Entropy (RE)
|
|
|
|
The root cryptographic material which is used for hierarchical deterministic
|
|
|
|
key derivation of a variety of cryptographic algorithms.
|
|
|
|
|
|
|
|
## Shard
|
|
|
|
Crytpographic shard created using Shamir's Secret Sharing algorithm.
|
|
|
|
|
|
|
|
## Shamir's Secret Sharing (SSS)
|
|
|
|
An algorithm used to split cryptographic material into shards which can be
|
|
|
|
used to reassemble a secret. The shards can be combined according to a threshold
|
|
|
|
which is set at the time of initial sharding, expressed as M of N, or in other
|
|
|
|
words M shards of the total N shards in existence are required to reveal the
|
|
|
|
secret.
|
|
|
|
|
|
|
|
## Workstation
|
|
|
|
Highly secure computer which is used for sensitive operations, typically in the
|
|
|
|
context of [Production Engineering](TODO).
|
|
|
|
|
|
|
|
#### Minimum
|
|
|
|
In order to set up a Workstation, as part of a [Production Engineering](TODO) setup,
|
|
|
|
a separate computer only used for carrying out sensitive operations should be used.
|
|
|
|
|
|
|
|
#### Recommended
|
|
|
|
Setting up a computer with QubesOS is recommended as it makes it easy to create
|
|
|
|
purpose built environments with minimal surface area for attacks, on the OS, and
|
|
|
|
networking level.
|
|
|
|
|
|
|
|
## Air-Gapped
|
|
|
|
Hardware which has no access to radio frequency or cable based networking
|
|
|
|
capabilities in order to reduce area for surface attacks. Typically Air-Gapped
|
|
|
|
computers are laptops which are never connected to the internet or any other
|
|
|
|
networks, and have had their radio frequency hardware permanently disabled or
|
|
|
|
ideally removed.
|
|
|
|
|
|
|
|
## Key Derivation Ceremony
|
|
|
|
Highly specified process which is used to secure derivation of cryptographic
|
|
|
|
material, with a focus on ensuring no single party has access to the Disaster
|
|
|
|
Recovery Key. The ceremony includes witnesses who can help attest to the fact
|
|
|
|
that the ceremony was executed properly, as well as instructions on hardware,
|
|
|
|
software and location that should be used. Each step of the ceremony is
|
|
|
|
carefully planned, and executed accordingly.
|
|
|
|
|
|
|
|
## Location Key
|
|
|
|
Is a asymmetric key pair which is used for encrypting shards which are used to
|
2024-08-03 22:59:25 +00:00
|
|
|
re-assemble the Root Entropy. Location Keys are stored in [Locations](locations.md)
|
2024-08-03 21:23:14 +00:00
|
|
|
which adhere to a strict set of criteria to maximize their security. The location
|
|
|
|
smart card passphrase is encrypted to a Operator Key in order to secure access
|
|
|
|
to it.
|
|
|
|
|
|
|
|
## M of N
|
|
|
|
M is the minimum number of shards required to reassemble the secret, and N is the
|
|
|
|
total number of shards that exist. The minimum recommended threshold is 2-of-3.
|
|
|
|
|
|
|
|
## Organization
|
2024-08-03 23:02:38 +00:00
|
|
|
An organization which owns the QKM and is responsible for funding the setup and
|
2024-08-03 21:23:14 +00:00
|
|
|
maintenance. The organization is also responsible for ensuring that the
|
|
|
|
[Warehouse](#warehouse) is properly maintained in order to ensure that the
|
|
|
|
ciphertext blobs associated with the system are redundantly stored and
|
|
|
|
protected.
|
|
|
|
|
|
|
|
## Witness
|
|
|
|
An individual who attests the ceremony was performed according to specification
|
|
|
|
in order to have additional assurances the cryptographic material, most
|
|
|
|
importantly the Root Entropy was never exposed.
|
|
|
|
|
|
|
|
## Warehouse
|
|
|
|
* Online storage for encrypted data replicated across multiple providers
|
|
|
|
* All data in DR Warehouse can only be decrypted by the DR Key
|
|
|
|
* Tolerate loss of any single provider by duplicating data to all of them
|
|
|
|
* Storage backends can be any combination of the following:
|
|
|
|
* S3 Compatible object stores:
|
|
|
|
* AWS, Google Cloud, DigitalOcean, Azure, etc.
|
|
|
|
* [Version Control Systems](software.md#version-control-system-vcs):
|
|
|
|
* We tolerate a loss of all but one DR storage backend
|
|
|
|
* A minimum of three storage backends should be maintained
|