Mercurial > lilug > gpg
comparison slideshow.tex @ 5:0455911c20bf
More notes about asym crypto; Before/during/after next meeting slides
author | Josef "Jeff" Sipek <jeffpc@josefsipek.net> |
---|---|
date | Tue, 08 Aug 2006 02:30:09 -0400 |
parents | 0cbc2268d06f |
children | 32a5f6b01723 |
comparison
equal
deleted
inserted
replaced
4:0cbc2268d06f | 5:0455911c20bf |
---|---|
67 \begin{itemstep} | 67 \begin{itemstep} |
68 \item Public | 68 \item Public |
69 \item Private | 69 \item Private |
70 \end{itemstep} | 70 \end{itemstep} |
71 \end{itemstep} | 71 \end{itemstep} |
72 % give postal example | |
73 % FIXME: explain the process of public key crypto | |
74 % - use images from wikipedia | |
75 % - explain fingerprint | |
72 \end{slide}} | 76 \end{slide}} |
73 | 77 |
74 % PGP/GPG's role | 78 % PGP/GPG's role |
75 % - why is GPG useful? (for me) / why would I want to use it? | 79 % - why is GPG useful? (for me) / why would I want to use it? |
76 % - encrypt documents | 80 % - encrypt documents |
125 % - go home, and for each key which was verified by YOU | 129 % - go home, and for each key which was verified by YOU |
126 % - sign it | 130 % - sign it |
127 % - send me the signed public keys | 131 % - send me the signed public keys |
128 % - I'll combine them, and create a lilug keyring that | 132 % - I'll combine them, and create a lilug keyring that |
129 % everyone can import | 133 % everyone can import |
134 \overlays{8}{ | |
135 \begin{slide}{Before Next Meetings} | |
136 \begin{itemstep}[2] | |
137 \item Generate key pair | |
138 \item Send the \emph{public} key to me | |
139 \item I will compile a list of keys | |
140 \item I will put it on the web | |
141 \item You will verify that your key is correct | |
142 \begin{itemstep} | |
143 \item If it is \emph{NOT}, let me know \emph{ASAP} | |
144 \end{itemstep} | |
145 \item Print a copy \& bring it next month | |
146 \end{itemstep} | |
147 \end{slide}} | |
148 | |
149 \overlays{5}{ | |
150 \begin{slide}{During Next Meeting} | |
151 \begin{itemstep}[2] | |
152 \item We'll go though each key | |
153 \begin{itemstep} | |
154 \item The author will read it | |
155 \item The author will present sufficient ID | |
156 \item Rest will verify | |
157 \end{itemstep} | |
158 \end{itemstep} | |
159 \end{slide}} | |
160 | |
161 \overlays{5}{ | |
162 \begin{slide}{After Next Meeting} | |
163 \begin{itemstep}[2] | |
164 \item Go home, and for each key which was verified by \emph{YOU} | |
165 \begin{itemstep} | |
166 \item Sign it | |
167 \end{itemstep} | |
168 \item Send me the signed public keys | |
169 \item I'll combine them, and create a lilug keyring that | |
170 everyone can import | |
171 \end{itemstep} | |
172 \end{slide}} | |
173 | |
130 % references | 174 % references |
131 % - http://www.gnupg.org/ GNU Privacy Guard | 175 % - http://www.gnupg.org/ GNU Privacy Guard |
132 % - http://www.ietf.org/rfc/rfc2440.txt OpenPGP Message Format | 176 % - http://www.ietf.org/rfc/rfc2440.txt OpenPGP Message Format |
177 % - http://en.wikipedia.org/wiki/Asymmetric_key_algorithm | |
133 | 178 |
134 % Q&A | 179 % Q&A |
135 \overlays{1}{ | 180 \overlays{1}{ |
136 \begin{slide}{Q\&A} | 181 \begin{slide}{Q\&A} |
137 \vspace{1in} | 182 \vspace{1in} |