2024-08-03 21:23:14 +00:00
# Glossary
## Ciphertext
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
In cryptography, ciphertext is the result of encryption performed on plaintext
using an algorithm, called a cipher.
2024-09-03 15:57:46 +00:00
## Entropy
Entropy in cryptography refers to the measure of randomness or unpredictability
in data used for generating cryptographic keys and other security elements.
2024-08-03 23:02:38 +00:00
## Quorum Key Management (QKM)
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
A set of highly specified processes and tooling used for setting up a highly
resilient quorum-based key management system.
## Operator
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
An individual who manages an [Operator Key ](#operator-key ) which is used for
protecting the passphrase of a Location key and participates in different
2024-08-03 23:02:38 +00:00
aspects of the lifecycle management of the QKM system.
2024-08-03 21:23:14 +00:00
## Operator Key
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
An asymmetric key used for protecting the passphrase of a Location key
## Quorum
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
The chosen M of N threshold used to achieve "quorum", which is a type of
agreement or consensus between a group of individuals. In the context of
Shamir's Secret Sharing, it refers to the minimum number of shards required to
reassemble the [Root Entropy ](#root-entripy-re ).
2024-09-03 15:57:46 +00:00
### Wrench Factor
2024-08-03 21:23:14 +00:00
How many people are required to be put under duress (via smacking them with a
wrench repeatedly or otherwise to get access to their Shard) before the Disaster
Recover Key is compromised.
2024-09-03 15:57:46 +00:00
### Bus Factor
2024-08-03 21:23:14 +00:00
How many members of the Quorum can meet an untimely demise without irretrievably
locking access to the Distrust Quroum system.
## Root Entropy (RE)
2024-09-03 15:57:46 +00:00
The main [entropy ](#entropy )/randomness which is used for hierarchical
deterministic key derivation of a variety of cryptographic algorithms.
2024-08-03 21:23:14 +00:00
## Shard
2024-09-03 15:57:46 +00:00
Cryptographic shard created using Shamir's Secret Sharing algorithm.
2024-08-03 21:23:14 +00:00
## Shamir's Secret Sharing (SSS)
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
An algorithm used to split cryptographic material into shards which can be
used to reassemble a secret. The shards can be combined according to a threshold
which is set at the time of initial sharding, expressed as M of N, or in other
words M shards of the total N shards in existence are required to reveal the
secret.
2024-11-28 23:30:19 +00:00
## Secure Compartmentalized Information Facility (SCIF)
2024-08-03 21:23:14 +00:00
## Workstation
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
Highly secure computer which is used for sensitive operations, typically in the
context of [Production Engineering ](TODO ).
#### Minimum
2024-09-03 15:57:46 +00:00
In order to set up a Workstation, as part of a [Production Engineering ](TODO )
setup, a separate computer only used for carrying out sensitive operations
should be used.
2024-08-03 21:23:14 +00:00
#### Recommended
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
Setting up a computer with QubesOS is recommended as it makes it easy to create
purpose built environments with minimal surface area for attacks, on the OS, and
networking level.
## Air-Gapped
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
Hardware which has no access to radio frequency or cable based networking
capabilities in order to reduce area for surface attacks. Typically Air-Gapped
computers are laptops which are never connected to the internet or any other
networks, and have had their radio frequency hardware permanently disabled or
ideally removed.
## Key Derivation Ceremony
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
Highly specified process which is used to secure derivation of cryptographic
material, with a focus on ensuring no single party has access to the Disaster
Recovery Key. The ceremony includes witnesses who can help attest to the fact
that the ceremony was executed properly, as well as instructions on hardware,
software and location that should be used. Each step of the ceremony is
carefully planned, and executed accordingly.
## Location Key
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
Is a asymmetric key pair which is used for encrypting shards which are used to
2024-08-03 22:59:25 +00:00
re-assemble the Root Entropy. Location Keys are stored in [Locations ](locations.md )
2024-08-03 21:23:14 +00:00
which adhere to a strict set of criteria to maximize their security. The location
smart card passphrase is encrypted to a Operator Key in order to secure access
to it.
## M of N
2024-09-03 15:57:46 +00:00
M is the minimum number of shards required to reassemble the secret, and N is
the total number of shards that exist. The minimum recommended threshold is
2-of-3.
2024-08-03 21:23:14 +00:00
## Organization
2024-09-03 15:57:46 +00:00
2024-08-03 23:02:38 +00:00
An organization which owns the QKM and is responsible for funding the setup and
2024-08-03 21:23:14 +00:00
maintenance. The organization is also responsible for ensuring that the
[Warehouse ](#warehouse ) is properly maintained in order to ensure that the
ciphertext blobs associated with the system are redundantly stored and
protected.
## Witness
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
An individual who attests the ceremony was performed according to specification
in order to have additional assurances the cryptographic material, most
importantly the Root Entropy was never exposed.
## Warehouse
2024-09-03 15:57:46 +00:00
2024-08-03 21:23:14 +00:00
* Online storage for encrypted data replicated across multiple providers
* All data in DR Warehouse can only be decrypted by the DR Key
* Tolerate loss of any single provider by duplicating data to all of them
* Storage backends can be any combination of the following:
* S3 Compatible object stores:
* AWS, Google Cloud, DigitalOcean, Azure, etc.
* [Version Control Systems ](software.md#version-control-system-vcs ):
* We tolerate a loss of all but one DR storage backend
* A minimum of three storage backends should be maintained
2024-11-27 16:12:33 +00:00
## MICE
A mnemonic device used in counterintelligence training to remind trainees of the four general motivations that could lead someone to commit treason, become an insider threat, or collaborate with a hostile agency or organization. It stands for Money, Ideology, Compromise, and Ego.