fix: minor cleanup of root-entropy-ceremonies file
This commit is contained in:
parent
a813634432
commit
18cbd8ff69
|
@ -25,7 +25,7 @@
|
|||
|
||||
* [Key Ceremonies]()
|
||||
* [Ceremony Log Template](ceremony-log-template.md)
|
||||
* [Root Entropy Ceremonies](core-key-ceremonies.md)
|
||||
* [Root Entropy Ceremonies](root-entropy-ceremonies.md)
|
||||
* [Local Key Provisioning](local-key-provisioning.md)
|
||||
* [Hybrid Key Provisioning](hybrid-key-provisioning.md)
|
||||
* [Remote Key Provisioning](remote-key-provisioning.md)
|
||||
|
|
|
@ -12,7 +12,8 @@ This setup can be done on any machine.
|
|||
* In your Terminal use this command:
|
||||
`vi autorun.sh`
|
||||
* Once you are in the editor press "i" to enter "insert mode"
|
||||
* Type in the contents, replacing <N> and <M> with your chosen threshold numbers according to your [Quorum](selecting-quorum.md):
|
||||
* Type in the contents, replacing <N> and <M> with your chosen threshold
|
||||
numbers according to your [Quorum](selecting-quorum.md):
|
||||
```sh
|
||||
#!/bin/sh
|
||||
keyfork wizard generate-shard-secret --threshold <M> --max <N> --output shards.pgp
|
||||
|
@ -39,5 +40,5 @@ to do so.
|
|||
|
||||
c. Copy the `autorun.sh` file to the Storage Device
|
||||
|
||||
4. Make note of this hash on a piece of paper or print it as you will need it
|
||||
to verify the file during Ceremonies.
|
||||
4. Make note of this hash on a piece of paper or print it as you will need it to
|
||||
verify the file during Ceremonies.
|
|
@ -32,8 +32,8 @@ How many members of the Quorum can meet an untimely demise without irretrievably
|
|||
locking access to the Distrust Quroum system.
|
||||
|
||||
## Root Entropy (RE)
|
||||
The root cryptographic material which is used for hierarchical deterministic
|
||||
key derivation of a variety of cryptographic algorithms.
|
||||
The main entropy/randomness which is used for hierarchical deterministic key
|
||||
derivation of a variety of cryptographic algorithms.
|
||||
|
||||
## Shard
|
||||
Crytpographic shard created using Shamir's Secret Sharing algorithm.
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# Root Entropy Ceremonies
|
||||
|
||||
There are 3 primary types of key derivation ceremonies:
|
||||
|
||||
There are 3 primary types of [Root Entropy](glossary.md#root-entropy-re)
|
||||
derivation ceremonies:
|
||||
|
||||
* "Local": where all cryptographic material, including the Operator Keys,
|
||||
Location Keys, and the Root Entropy are all generated during a single in-person
|
||||
|
@ -11,4 +11,4 @@ ceremony
|
|||
prior to the in-person ceremony where the Root Entropy is generated
|
||||
|
||||
* "Remote": where all cryptographic material is generated in a decentralized
|
||||
manner, remotely.
|
||||
manner, remotely.
|
Loading…
Reference in New Issue