diff --git a/quorum-key-management/src/SUMMARY.md b/quorum-key-management/src/SUMMARY.md index 077a3cb..6442cbd 100644 --- a/quorum-key-management/src/SUMMARY.md +++ b/quorum-key-management/src/SUMMARY.md @@ -25,7 +25,7 @@ * [Key Ceremonies]() * [Ceremony Log Template](ceremony-log-template.md) - * [Root Entropy Ceremonies](core-key-ceremonies.md) + * [Root Entropy Ceremonies](root-entropy-ceremonies.md) * [Local Key Provisioning](local-key-provisioning.md) * [Hybrid Key Provisioning](hybrid-key-provisioning.md) * [Remote Key Provisioning](remote-key-provisioning.md) diff --git a/quorum-key-management/src/autorun-sh-setup.md b/quorum-key-management/src/autorun-sh-setup.md index 80e6716..0b15356 100644 --- a/quorum-key-management/src/autorun-sh-setup.md +++ b/quorum-key-management/src/autorun-sh-setup.md @@ -12,7 +12,8 @@ This setup can be done on any machine. * In your Terminal use this command: `vi autorun.sh` * Once you are in the editor press "i" to enter "insert mode" - * Type in the contents, replacing and with your chosen threshold numbers according to your [Quorum](selecting-quorum.md): + * Type in the contents, replacing and with your chosen threshold + numbers according to your [Quorum](selecting-quorum.md): ```sh #!/bin/sh keyfork wizard generate-shard-secret --threshold --max --output shards.pgp @@ -39,5 +40,5 @@ to do so. c. Copy the `autorun.sh` file to the Storage Device -4. Make note of this hash on a piece of paper or print it as you will need it -to verify the file during Ceremonies. \ No newline at end of file +4. Make note of this hash on a piece of paper or print it as you will need it to +verify the file during Ceremonies. \ No newline at end of file diff --git a/quorum-key-management/src/glossary.md b/quorum-key-management/src/glossary.md index 5696524..7dfff83 100644 --- a/quorum-key-management/src/glossary.md +++ b/quorum-key-management/src/glossary.md @@ -32,8 +32,8 @@ How many members of the Quorum can meet an untimely demise without irretrievably locking access to the Distrust Quroum system. ## Root Entropy (RE) -The root cryptographic material which is used for hierarchical deterministic -key derivation of a variety of cryptographic algorithms. +The main entropy/randomness which is used for hierarchical deterministic key +derivation of a variety of cryptographic algorithms. ## Shard Crytpographic shard created using Shamir's Secret Sharing algorithm. diff --git a/quorum-key-management/src/core-key-ceremonies.md b/quorum-key-management/src/root-entropy-ceremonies.md similarity index 78% rename from quorum-key-management/src/core-key-ceremonies.md rename to quorum-key-management/src/root-entropy-ceremonies.md index 81f5efb..cae7c7c 100644 --- a/quorum-key-management/src/core-key-ceremonies.md +++ b/quorum-key-management/src/root-entropy-ceremonies.md @@ -1,7 +1,7 @@ # Root Entropy Ceremonies -There are 3 primary types of key derivation ceremonies: - +There are 3 primary types of [Root Entropy](glossary.md#root-entropy-re) +derivation ceremonies: * "Local": where all cryptographic material, including the Operator Keys, Location Keys, and the Root Entropy are all generated during a single in-person @@ -11,4 +11,4 @@ ceremony prior to the in-person ceremony where the Root Entropy is generated * "Remote": where all cryptographic material is generated in a decentralized -manner, remotely. \ No newline at end of file +manner, remotely.