view slideshow.tex @ 5:0455911c20bf

More notes about asym crypto; Before/during/after next meeting slides
author Josef "Jeff" Sipek <jeffpc@josefsipek.net>
date Tue, 08 Aug 2006 02:30:09 -0400
parents 0cbc2268d06f
children 32a5f6b01723
line wrap: on
line source

\documentclass[pdf,contemporain,slideColor,colorBG,accumulate,nototal]{prosper}

%\usepackage{macros-cp}

\title{PGP}
\subtitle{The government is watching you...}
\author{Josef ``Jeff'' Sipek}
\institution{}
\slideCaption{PGP -- Josef ``Jeff'' Sipek}

\begin{document}
\maketitle

% Intro to public key crypto
%	- what's symmetric cryptography?
%		- caesar cipher example (rot13 variant)
%		- (a) cypher
%		- (b) key
\overlays{1}{
\begin{slide}{What is cryptography?}
	\begin{minipage}{\linewidth}
{\bf Cryptography}, n.

\vspace{0.5in}
The science which studies methods for encoding messages so
that they can be read only by a person who knows the
secret information required for decoding, called the key
	\end{minipage}
\end{slide}}

\overlays{7}{
\begin{slide}{Little History}
	\onlySlide*{1}{
	\begin{center}
		\includegraphics[width=\linewidth]{Roman_empire_395}
	\end{center}}
	
	\begin{itemstep}[2]
		\item Caesar cipher
		\item ROT13
		\item Symmetric cipher
		\begin{itemstep}
			\item Key used to encrypt \& decrypt
			\item AES
			\item Blowfish
		\end{itemstep}
	\end{itemstep}
\end{slide}}

%		- problems
\overlays{1}{
\begin{slide}{Problems with Symmetric Ciphers}
	\begin{itemstep}
		\item ``Pre-shared secret''
		% FIXME: add more
	\end{itemstep}
	% give postal example
\end{slide}}

%	- what's asymmetric crypto?
%		- (a) cypher
%		- (b) 2 keys!
\overlays{4}{
\begin{slide}{Asymmetric Ciphers}
	\begin{itemstep}[2]
		\item 2 keys!
		\begin{itemstep}
			\item Public
			\item Private
		\end{itemstep}
	\end{itemstep}
	% give postal example
	% FIXME: explain the process of public key crypto
	%	- use images from wikipedia
	%	- explain fingerprint
\end{slide}}

% PGP/GPG's role
% 	- why is GPG useful? (for me) / why would I want to use it?
%		- encrypt documents
%		- sign documents
\overlays{6}{
\begin{slide}{What, Why, How?}
	\begin{itemstep}[2]
		\item What? --- GPG
		\item Why?
		\begin{itemstep}
			\item Encrypt/decrypt documents
			\item Sign/verify documents
		\end{itemstep}
		\item How?
	\end{itemstep}
\end{slide}}

% 	- how do you use it?
%		- DEMO: sign a doc
%		- DEMO: verify sig on a doc
%		- DEMO: encrypt a doc
%		- DEMO: decrypt a doc
%		- There are frontends to make things easier
\overlays{6}{
\begin{slide}{Demo Time!}
	\begin{itemstep}[2]
		\item Sign a file
		\item Verify the signature on a file
		\item Encrypt a file
		\item Decrypt a file
		\item Nasty, eh?
		% FIXME: pick some frontends to demo
	\end{itemstep}
\end{slide}}

% what is keysigning?
%	- How do you verify who a key belongs to?
%	- web of trust
%		- alice/bob/etc. web - built one sig at a time
% what will happen next month?
%	- generate keys
%	- send the PUBLIC key to me
%	- I will compile a list of keys
%	- I will put it on the web
%	- you will verify that your key is correct
%		- if it is NOT, let me know ASAP
%	- print a copy & bring it next month
%	- next month, we'll go though each key
%		- the author will read it
%		- the author will present sufficient ID
%		- rest will verify
%	- go home, and for each key which was verified by YOU
%		- sign it
%	- send me the signed public keys
%		- I'll combine them, and create a lilug keyring that
%		everyone can import
\overlays{8}{
\begin{slide}{Before Next Meetings}
	\begin{itemstep}[2]
		\item Generate key pair
		\item Send the \emph{public} key to me
		\item I will compile a list of keys
		\item I will put it on the web
		\item You will verify that your key is correct
		\begin{itemstep}
			\item If it is \emph{NOT}, let me know \emph{ASAP}
		\end{itemstep}
		\item Print a copy \& bring it next month
	\end{itemstep}
\end{slide}}

\overlays{5}{
\begin{slide}{During Next Meeting}
	\begin{itemstep}[2]
		\item We'll go though each key
		\begin{itemstep}
			\item The author will read it
			\item The author will present sufficient ID
			\item Rest will verify
		\end{itemstep}
	\end{itemstep}
\end{slide}}

\overlays{5}{
\begin{slide}{After Next Meeting}
	\begin{itemstep}[2]
		\item Go home, and for each key which was verified by \emph{YOU}
		\begin{itemstep}
			\item Sign it
		\end{itemstep}
		\item Send me the signed public keys
		\item I'll combine them, and create a lilug keyring that
		everyone can import
	\end{itemstep}
\end{slide}}

% references
%	- http://www.gnupg.org/ GNU Privacy Guard
%	- http://www.ietf.org/rfc/rfc2440.txt OpenPGP Message Format
%	- http://en.wikipedia.org/wiki/Asymmetric_key_algorithm

% Q&A
\overlays{1}{
\begin{slide}{Q\&A}
	\vspace{1in}
	\begin{center}
		Questions?
	\end{center}
\end{slide}}

\end{document}