### view slideshow.tex @ 5:0455911c20bf

More notes about asym crypto; Before/during/after next meeting slides
author Josef "Jeff" Sipek Tue, 08 Aug 2006 02:30:09 -0400 0cbc2268d06f 32a5f6b01723
line wrap: on
line source

\documentclass[pdf,contemporain,slideColor,colorBG,accumulate,nototal]{prosper}

%\usepackage{macros-cp}

\title{PGP}
\subtitle{The government is watching you...}
\author{Josef Jeff'' Sipek}
\institution{}
\slideCaption{PGP -- Josef Jeff'' Sipek}

\begin{document}
\maketitle

% Intro to public key crypto
%	- what's symmetric cryptography?
%		- caesar cipher example (rot13 variant)
%		- (a) cypher
%		- (b) key
\overlays{1}{
\begin{slide}{What is cryptography?}
\begin{minipage}{\linewidth}
{\bf Cryptography}, n.

\vspace{0.5in}
The science which studies methods for encoding messages so
that they can be read only by a person who knows the
secret information required for decoding, called the key
\end{minipage}
\end{slide}}

\overlays{7}{
\begin{slide}{Little History}
\onlySlide*{1}{
\begin{center}
\includegraphics[width=\linewidth]{Roman_empire_395}
\end{center}}

\begin{itemstep}
\item Caesar cipher
\item ROT13
\item Symmetric cipher
\begin{itemstep}
\item Key used to encrypt \& decrypt
\item AES
\item Blowfish
\end{itemstep}
\end{itemstep}
\end{slide}}

%		- problems
\overlays{1}{
\begin{slide}{Problems with Symmetric Ciphers}
\begin{itemstep}
\item Pre-shared secret''
\end{itemstep}
% give postal example
\end{slide}}

%	- what's asymmetric crypto?
%		- (a) cypher
%		- (b) 2 keys!
\overlays{4}{
\begin{slide}{Asymmetric Ciphers}
\begin{itemstep}
\item 2 keys!
\begin{itemstep}
\item Public
\item Private
\end{itemstep}
\end{itemstep}
% give postal example
% FIXME: explain the process of public key crypto
%	- use images from wikipedia
%	- explain fingerprint
\end{slide}}

% PGP/GPG's role
% 	- why is GPG useful? (for me) / why would I want to use it?
%		- encrypt documents
%		- sign documents
\overlays{6}{
\begin{slide}{What, Why, How?}
\begin{itemstep}
\item What? --- GPG
\item Why?
\begin{itemstep}
\item Encrypt/decrypt documents
\item Sign/verify documents
\end{itemstep}
\item How?
\end{itemstep}
\end{slide}}

% 	- how do you use it?
%		- DEMO: sign a doc
%		- DEMO: verify sig on a doc
%		- DEMO: encrypt a doc
%		- DEMO: decrypt a doc
%		- There are frontends to make things easier
\overlays{6}{
\begin{slide}{Demo Time!}
\begin{itemstep}
\item Sign a file
\item Verify the signature on a file
\item Encrypt a file
\item Decrypt a file
\item Nasty, eh?
% FIXME: pick some frontends to demo
\end{itemstep}
\end{slide}}

% what is keysigning?
%	- How do you verify who a key belongs to?
%	- web of trust
%		- alice/bob/etc. web - built one sig at a time
% what will happen next month?
%	- generate keys
%	- send the PUBLIC key to me
%	- I will compile a list of keys
%	- I will put it on the web
%	- you will verify that your key is correct
%		- if it is NOT, let me know ASAP
%	- print a copy & bring it next month
%	- next month, we'll go though each key
%		- the author will read it
%		- the author will present sufficient ID
%		- rest will verify
%	- go home, and for each key which was verified by YOU
%		- sign it
%	- send me the signed public keys
%		- I'll combine them, and create a lilug keyring that
%		everyone can import
\overlays{8}{
\begin{slide}{Before Next Meetings}
\begin{itemstep}
\item Generate key pair
\item Send the \emph{public} key to me
\item I will compile a list of keys
\item I will put it on the web
\item You will verify that your key is correct
\begin{itemstep}
\item If it is \emph{NOT}, let me know \emph{ASAP}
\end{itemstep}
\item Print a copy \& bring it next month
\end{itemstep}
\end{slide}}

\overlays{5}{
\begin{slide}{During Next Meeting}
\begin{itemstep}
\item We'll go though each key
\begin{itemstep}
\item The author will read it
\item The author will present sufficient ID
\item Rest will verify
\end{itemstep}
\end{itemstep}
\end{slide}}

\overlays{5}{
\begin{slide}{After Next Meeting}
\begin{itemstep}
\item Go home, and for each key which was verified by \emph{YOU}
\begin{itemstep}
\item Sign it
\end{itemstep}
\item Send me the signed public keys
\item I'll combine them, and create a lilug keyring that
everyone can import
\end{itemstep}
\end{slide}}

% references
%	- http://www.gnupg.org/ GNU Privacy Guard
%	- http://www.ietf.org/rfc/rfc2440.txt OpenPGP Message Format
%	- http://en.wikipedia.org/wiki/Asymmetric_key_algorithm

% Q&A
\overlays{1}{
\begin{slide}{Q\&A}
\vspace{1in}
\begin{center}
Questions?
\end{center}
\end{slide}}

\end{document}