Day: April 27, 2012
Secret splitting
A few days ago I resurrected all my files from a desktop system I haven’t used for almost six years. Below is my implementation of secret splitting as described in Bruce Schneier’s book “Applied Cryptography, 2nd edition”. The idea is basically: generate a random keystream, xor the plaintext with the random keystream, use separate couriers […]
Read More → Secret splitting