A few days ago I resurrected all my files from a desktop system I haven’t used for almost six years. Below is my implementation of secret splitting as described in Bruce Schneier’s book “Applied Cryptography, 2nd edition”. The idea is basically: generate a random keystream, xor the plaintext with the random keystream, use separate couriers […]

Read More → Secret splitting