horcrux icon indicating copy to clipboard operation
horcrux copied to clipboard

Option for XOR implementation

Open mcandre opened this issue 4 years ago • 2 comments

For users who want to require exactly N of N keys, XOR would be the safest, most performant, most reliable option.

mcandre avatar Jan 03 '20 21:01 mcandre

I don't have a particularly strong background in encryption. Are you referring to the encryption step? Or the step where we write to the horcruxes.

For context, currently when we require N of N horcruxes, I'm writing through a demultiplexer to give the first 100 characters of the encrypted content to the first horcrux, the second 100 characters to the second horcrux, and so on.

jesseduffield avatar Jan 04 '20 00:01 jesseduffield

I don't have a particularly strong background in encryption. Are you referring to the encryption step? Or the step where we write to the horcruxes.

XOR encryption for "N out of N" is actually quite simple. Instead of using SSS to generate N keys, you generate N random keys and XOR them all together. The result is your AES key.

AyrA avatar Aug 20 '20 08:08 AyrA