comparison slideshow.tex @ 5:0455911c20bf

More notes about asym crypto; Before/during/after next meeting slides
author Josef "Jeff" Sipek <jeffpc@josefsipek.net>
date Tue, 08 Aug 2006 02:30:09 -0400
parents 0cbc2268d06f
children 32a5f6b01723
comparison
equal deleted inserted replaced
4:0cbc2268d06f 5:0455911c20bf
67 \begin{itemstep} 67 \begin{itemstep}
68 \item Public 68 \item Public
69 \item Private 69 \item Private
70 \end{itemstep} 70 \end{itemstep}
71 \end{itemstep} 71 \end{itemstep}
72 % give postal example
73 % FIXME: explain the process of public key crypto
74 % - use images from wikipedia
75 % - explain fingerprint
72 \end{slide}} 76 \end{slide}}
73 77
74 % PGP/GPG's role 78 % PGP/GPG's role
75 % - why is GPG useful? (for me) / why would I want to use it? 79 % - why is GPG useful? (for me) / why would I want to use it?
76 % - encrypt documents 80 % - encrypt documents
125 % - go home, and for each key which was verified by YOU 129 % - go home, and for each key which was verified by YOU
126 % - sign it 130 % - sign it
127 % - send me the signed public keys 131 % - send me the signed public keys
128 % - I'll combine them, and create a lilug keyring that 132 % - I'll combine them, and create a lilug keyring that
129 % everyone can import 133 % everyone can import
134 \overlays{8}{
135 \begin{slide}{Before Next Meetings}
136 \begin{itemstep}[2]
137 \item Generate key pair
138 \item Send the \emph{public} key to me
139 \item I will compile a list of keys
140 \item I will put it on the web
141 \item You will verify that your key is correct
142 \begin{itemstep}
143 \item If it is \emph{NOT}, let me know \emph{ASAP}
144 \end{itemstep}
145 \item Print a copy \& bring it next month
146 \end{itemstep}
147 \end{slide}}
148
149 \overlays{5}{
150 \begin{slide}{During Next Meeting}
151 \begin{itemstep}[2]
152 \item We'll go though each key
153 \begin{itemstep}
154 \item The author will read it
155 \item The author will present sufficient ID
156 \item Rest will verify
157 \end{itemstep}
158 \end{itemstep}
159 \end{slide}}
160
161 \overlays{5}{
162 \begin{slide}{After Next Meeting}
163 \begin{itemstep}[2]
164 \item Go home, and for each key which was verified by \emph{YOU}
165 \begin{itemstep}
166 \item Sign it
167 \end{itemstep}
168 \item Send me the signed public keys
169 \item I'll combine them, and create a lilug keyring that
170 everyone can import
171 \end{itemstep}
172 \end{slide}}
173
130 % references 174 % references
131 % - http://www.gnupg.org/ GNU Privacy Guard 175 % - http://www.gnupg.org/ GNU Privacy Guard
132 % - http://www.ietf.org/rfc/rfc2440.txt OpenPGP Message Format 176 % - http://www.ietf.org/rfc/rfc2440.txt OpenPGP Message Format
177 % - http://en.wikipedia.org/wiki/Asymmetric_key_algorithm
133 178
134 % Q&A 179 % Q&A
135 \overlays{1}{ 180 \overlays{1}{
136 \begin{slide}{Q\&A} 181 \begin{slide}{Q\&A}
137 \vspace{1in} 182 \vspace{1in}