Reconstruct the key

S Moonesamy <sm+ietf@elandsys.com> Tue, 26 November 2013 01:56 UTC

Return-Path: <sm@elandsys.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1AF11AE0E4 for <ietf@ietfa.amsl.com>; Mon, 25 Nov 2013 17:56:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.791
X-Spam-Level:
X-Spam-Status: No, score=-1.791 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, RP_MATCHES_RCVD=-0.001, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wL5izU_QtWuw for <ietf@ietfa.amsl.com>; Mon, 25 Nov 2013 17:56:28 -0800 (PST)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id ADBA61AE07D for <ietf@ietf.org>; Mon, 25 Nov 2013 17:56:21 -0800 (PST)
Received: from SUBMAN.elandsys.com ([197.224.141.202]) (authenticated bits=0) by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id rAQ1u8A7013512 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 25 Nov 2013 17:56:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1385430981; bh=hpoh7FyIq7qLDJ0WgDVdeJPAEMQw9JcAVVxofObSsUU=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=cmOWH4Ckl34CUnnRAzP9oQKub3ennjGZUKcx/FvsR+YqHmOCoOB4d+/A+LiBXKjiQ oK9y86gHmJkLDfiI+u8+NSoDuav2OZKJ7BKAaqVQh/KXJlUlgGVY9nraECTm5mV+0i nJRxH2EmUxBW2KhjUP1aXFRU3h26JMpPFy7S2Y5M=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=elandsys.com; s=mail; t=1385430981; i=@elandsys.com; bh=hpoh7FyIq7qLDJ0WgDVdeJPAEMQw9JcAVVxofObSsUU=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=t6MiLmuggRnmt3/n30qVepc0b85TagcbwtIofEpBB4VlzCJMpG37f0q8emTptvE63 uIvDKsge+8tPEKhCSA3pkCctOFukdJ3g0wnRNVGWsHz5/3ZRuMP3v02RJwNa4r85TG Q0z8d5ujXKU95ol/BJbgXfXSsYxuBE6YXmsj/+Gw=
Message-Id: <6.2.5.6.2.20131125173031.0c3333e0@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Mon, 25 Nov 2013 17:53:57 -0800
To: Michael Richardson <mcr+ietf@sandelman.ca>
From: S Moonesamy <sm+ietf@elandsys.com>
Subject: Reconstruct the key
In-Reply-To: <17228.1385429097@sandelman.ca>
References: <20131125180608.55454.qmail@joyce.lan> <E5836934-317D-4E73-80CC-B8847047852A@virtualized.org> <alpine.BSF.2.00.1311251833400.57383@joyce.lan> <DCC0C5E5-A69E-4FBD-B666-BD6E58F0979D@nominum.com> <17228.1385429097@sandelman.ca>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Nov 2013 01:56:29 -0000

Hi Michael,
At 17:24 25-11-2013, Michael Richardson wrote:
>and my understanding from careful reading of the site that any three Crypto
>Officers are enough to reconstruct the key, it seems that a US NSL would not
>suffice.

This is an individual opinion.  Key reconstruction would require more 
than three
Key Share Holders.

>There are not three US people in any category, but I did not read how the key
>was split.  If two Crypto Officers and a backup crypto officer cound as
>three, then I'm wrong: a US NSL takes it.

Those roles do not have the ability to do that.

>I was also assuming that CO's for east coast do not also have west coast
>keys, but I may be wrong here.

The above is ambiguous.

Sorry for being brief.

Regards,
S. Moonesamy