From 0369d3c0ee7736433049ee28cf5f51c392be55c8d9f162939d4d5fa9840f1bdf Mon Sep 17 00:00:00 2001 From: Karol Babioch Date: Sun, 11 Feb 2018 11:19:02 +0000 Subject: [PATCH] Accepting request 575212 from home:jengelh:branches:security:privacy - Trim/compact long description for size, and wrap at 70 cols. OBS-URL: https://build.opensuse.org/request/show/575212 OBS-URL: https://build.opensuse.org/package/show/security:privacy/dkgpg?expand=0&rev=3 --- dkgpg.changes | 5 +++++ dkgpg.spec | 22 +++++++++++++++++++--- 2 files changed, 24 insertions(+), 3 deletions(-) diff --git a/dkgpg.changes b/dkgpg.changes index e93ab7a..2e13aa9 100644 --- a/dkgpg.changes +++ b/dkgpg.changes @@ -1,3 +1,8 @@ +------------------------------------------------------------------- +Sat Feb 10 13:32:34 UTC 2018 - jengelh@inai.de + +- Trim/compact long description for size, and wrap at 70 cols. + ------------------------------------------------------------------- Thu Feb 8 22:13:12 UTC 2018 - kbabioch@suse.com diff --git a/dkgpg.spec b/dkgpg.spec index aaa6688..7625c20 100644 --- a/dkgpg.spec +++ b/dkgpg.spec @@ -33,11 +33,27 @@ BuildRequires: libgcrypt-devel >= 1.6 BuildRequires: libgpg-error-devel >= 1.12 %description -The Distributed Privacy Guard (DKGPG) implements Distributed Key Generation (DKG) and Threshold Cryptography for OpenPGP. The generated public keys are compatible with the standard and thus can be used by any RFC4880-compliant application (e.g. GnuPG). The main purposes of this software are distributing power among multiple parties, eliminating single points of failure, and increasing the difficulty of side-channel attacks on private key material. +The Distributed Privacy Guard (DKGPG) implements Distributed Key +Generation (DKG) and Threshold Cryptography for OpenPGP. The +generated public keys are RFC4880 compatible and can be used by e.g. +GnuPG. The main purpose of this software is distributing power among +multiple parties, eliminating single points of failure, and +increasing the difficulty of side-channel attacks on private key +material. -DKGPG consists of a bunch of simple command-line programs. The current implementation is in experimental state and should NOT be used in production environments. Motivation, cryptographical background and some usage scenarios have been presented at 26th Krypto-Tag (GI Working Group) and Datengarten/81 (CCCB). Please consult the slides for a first overview. +DKGPG consists of a number of command-line programs. The current implementation +is in experimental state and should NOT be used in production environments. -Using well-established multi-party protocols a shared private key and a common public key (currently only DSA/ElGamal) is generated. Then further interactive protocols perform the private operations like decryption and signing of files, provided that a previously defined threshold of parties/devices take part in the distributed computation. Due to the interactiveness of the protocols a lot of messages between participating parties have to be exchanged in a secure way. We employ GNUnet, and in particular its mesh routed CADET service, to establish private and broadcast channels for this message exchange. However, as alternative to GNUnet a simple TCP/IP based service for message exchange is included. With torsocks and port-forwarding of a local hidden service this allows running the interactive programs over the well-known TOR network. +A shared private key and a common public key (currently only +DSA/ElGamal) are generated. Further interactive protocols perform the +private operations like decryption and signing of files, provided +that a previously defined threshold of parties/devices take part in +the distributed computation. Due to the interactiveness of the +protocols, a lot of messages between participating parties have to be +exchanged in a secure way. GNUnet's mesh-routed CADET srvice is used +to establish private and broadcast channels for this message +exchange. A TCP/IP-based service is included as an alternative. It +may be combined with torsocks and NAT of a local hidden service. %prep %setup -q