fix: minor cleanup of root-entropy-ceremonies file

This commit is contained in:
Anton Livaja 2024-08-03 19:07:55 -04:00
parent a813634432
commit 18cbd8ff69
Signed by: anton
GPG Key ID: 44A86CFF1FDF0E85
4 changed files with 10 additions and 9 deletions

View File

@ -25,7 +25,7 @@
* [Key Ceremonies]()
* [Ceremony Log Template](ceremony-log-template.md)
* [Root Entropy Ceremonies](core-key-ceremonies.md)
* [Root Entropy Ceremonies](root-entropy-ceremonies.md)
* [Local Key Provisioning](local-key-provisioning.md)
* [Hybrid Key Provisioning](hybrid-key-provisioning.md)
* [Remote Key Provisioning](remote-key-provisioning.md)

View File

@ -12,7 +12,8 @@ This setup can be done on any machine.
* In your Terminal use this command:
`vi autorun.sh`
* Once you are in the editor press "i" to enter "insert mode"
* Type in the contents, replacing <N> and <M> with your chosen threshold numbers according to your [Quorum](selecting-quorum.md):
* Type in the contents, replacing <N> and <M> with your chosen threshold
numbers according to your [Quorum](selecting-quorum.md):
```sh
#!/bin/sh
keyfork wizard generate-shard-secret --threshold <M> --max <N> --output shards.pgp
@ -39,5 +40,5 @@ to do so.
c. Copy the `autorun.sh` file to the Storage Device
4. Make note of this hash on a piece of paper or print it as you will need it
to verify the file during Ceremonies.
4. Make note of this hash on a piece of paper or print it as you will need it to
verify the file during Ceremonies.

View File

@ -32,8 +32,8 @@ How many members of the Quorum can meet an untimely demise without irretrievably
locking access to the Distrust Quroum system.
## Root Entropy (RE)
The root cryptographic material which is used for hierarchical deterministic
key derivation of a variety of cryptographic algorithms.
The main entropy/randomness which is used for hierarchical deterministic key
derivation of a variety of cryptographic algorithms.
## Shard
Crytpographic shard created using Shamir's Secret Sharing algorithm.

View File

@ -1,7 +1,7 @@
# Root Entropy Ceremonies
There are 3 primary types of key derivation ceremonies:
There are 3 primary types of [Root Entropy](glossary.md#root-entropy-re)
derivation ceremonies:
* "Local": where all cryptographic material, including the Operator Keys,
Location Keys, and the Root Entropy are all generated during a single in-person