Mercurial > lilug > gpg
view slideshow.tex @ 3:f6292213320b
Many additions...
- 2 examples of modern symmetric ciphers
- problems with symmetric ciphers
- begining of asymmetric cipher slide
- MANY comments about what will happen next month
author | Josef "Jeff" Sipek <jeffpc@josefsipek.net> |
---|---|
date | Tue, 08 Aug 2006 01:29:48 -0400 |
parents | 5f931119cf7b |
children | 0cbc2268d06f |
line wrap: on
line source
\documentclass[pdf,contemporain,slideColor,colorBG,accumulate,nototal]{prosper} %\usepackage{macros-cp} \title{PGP} \subtitle{The government is watching you...} \author{Josef ``Jeff'' Sipek} \institution{} \slideCaption{PGP -- Josef ``Jeff'' Sipek} \begin{document} \maketitle % Intro to public key crypto % - what's symmetric cryptography? % - caesar cipher example (rot13 variant) % - (a) cypher % - (b) key \overlays{1}{ \begin{slide}{What is cryptography?} \begin{minipage}{\linewidth} {\bf Cryptography}, n. \vspace{0.5in} The science which studies methods for encoding messages so that they can be read only by a person who knows the secret information required for decoding, called the key \end{minipage} \end{slide}} \overlays{7}{ \begin{slide}{Little History} \onlySlide*{1}{ \begin{center} \includegraphics[width=\linewidth]{Roman_empire_395} \end{center}} \begin{itemstep}[2] \item Caesar cipher \item ROT13 \item Symmetric cipher \begin{itemstep} \item Key used to encrypt \& decrypt \item AES \item Blowfish \end{itemstep} \end{itemstep} \end{slide}} % - problems \overlays{1}{ \begin{slide}{Problems with Symmetric Ciphers} \begin{itemstep} \item ``Pre-shared secret'' % FIXME: add more \end{itemstep} % give postal example \end{slide}} % - what's asymmetric crypto? % - (a) cypher % - (b) 2 keys! \overlays{4}{ \begin{slide}{Asymmetric Ciphers} \begin{itemstep}[2] \item 2 keys! \begin{itemstep} \item Public \item Private \end{itemstep} \end{itemstep} \end{slide}} % PGP/GPG's role % - why is GPG useful? (for me) / why would I want to use it? % - encrypt documents % - sign documents % - what do I need to know? % - % - how do you use it? % - DEMO: sign a doc % - DEMO: verify sig on a doc % - DEMO: encrypt a doc % - DEMO: decrypt a doc % - There are frontends to make things easier % what is keysigning? % - How do you verify who a key belongs to? % - web of trust % - alice/bob/etc. web - built one sig at a time % what will happen next month? % - generate keys % - send the PUBLIC key to me % - I will compile a list of keys % - I will put it on the web % - you will verify that your key is correct % - if it is NOT, let me know ASAP % - print a copy & bring it next month % - next month, we'll go though each key % - the author will read it % - the author will present sufficient ID % - rest will verify % - go home, and for each key which was verified by YOU % - sign it % - send me the signed public keys % - I'll combine them, and create a lilug keyring that % everyone can import % references % - http://www.gnupg.org/ GNU Privacy Guard % - http://www.ietf.org/rfc/rfc2440.txt OpenPGP Message Format % Q&A \overlays{1}{ \begin{slide}{Q\&A} \vspace{1in} \begin{center} Questions? \end{center} \end{slide}} \end{document}