view slideshow.tex @ 3:f6292213320b

Many additions... - 2 examples of modern symmetric ciphers - problems with symmetric ciphers - begining of asymmetric cipher slide - MANY comments about what will happen next month
author Josef "Jeff" Sipek <jeffpc@josefsipek.net>
date Tue, 08 Aug 2006 01:29:48 -0400
parents 5f931119cf7b
children 0cbc2268d06f
line wrap: on
line source

\documentclass[pdf,contemporain,slideColor,colorBG,accumulate,nototal]{prosper}

%\usepackage{macros-cp}

\title{PGP}
\subtitle{The government is watching you...}
\author{Josef ``Jeff'' Sipek}
\institution{}
\slideCaption{PGP -- Josef ``Jeff'' Sipek}

\begin{document}
\maketitle

% Intro to public key crypto
%	- what's symmetric cryptography?
%		- caesar cipher example (rot13 variant)
%		- (a) cypher
%		- (b) key
\overlays{1}{
\begin{slide}{What is cryptography?}
	\begin{minipage}{\linewidth}
{\bf Cryptography}, n.

\vspace{0.5in}
The science which studies methods for encoding messages so
that they can be read only by a person who knows the
secret information required for decoding, called the key
	\end{minipage}
\end{slide}}

\overlays{7}{
\begin{slide}{Little History}
	\onlySlide*{1}{
	\begin{center}
		\includegraphics[width=\linewidth]{Roman_empire_395}
	\end{center}}
	
	\begin{itemstep}[2]
		\item Caesar cipher
		\item ROT13
		\item Symmetric cipher
		\begin{itemstep}
			\item Key used to encrypt \& decrypt
			\item AES
			\item Blowfish
		\end{itemstep}
	\end{itemstep}
\end{slide}}

%		- problems
\overlays{1}{
\begin{slide}{Problems with Symmetric Ciphers}
	\begin{itemstep}
		\item ``Pre-shared secret''
		% FIXME: add more
	\end{itemstep}
	% give postal example
\end{slide}}

%	- what's asymmetric crypto?
%		- (a) cypher
%		- (b) 2 keys!
\overlays{4}{
\begin{slide}{Asymmetric Ciphers}
	\begin{itemstep}[2]
		\item 2 keys!
		\begin{itemstep}
			\item Public
			\item Private
		\end{itemstep}
	\end{itemstep}
\end{slide}}

% PGP/GPG's role
% 	- why is GPG useful? (for me) / why would I want to use it?
%		- encrypt documents
%		- sign documents
% 	- what do I need to know?
%		- 
% 	- how do you use it?
%		- DEMO: sign a doc
%		- DEMO: verify sig on a doc
%		- DEMO: encrypt a doc
%		- DEMO: decrypt a doc
%		- There are frontends to make things easier
% what is keysigning?
%	- How do you verify who a key belongs to?
%	- web of trust
%		- alice/bob/etc. web - built one sig at a time
% what will happen next month?
%	- generate keys
%	- send the PUBLIC key to me
%	- I will compile a list of keys
%	- I will put it on the web
%	- you will verify that your key is correct
%		- if it is NOT, let me know ASAP
%	- print a copy & bring it next month
%	- next month, we'll go though each key
%		- the author will read it
%		- the author will present sufficient ID
%		- rest will verify
%	- go home, and for each key which was verified by YOU
%		- sign it
%	- send me the signed public keys
%		- I'll combine them, and create a lilug keyring that
%		everyone can import
% references
%	- http://www.gnupg.org/ GNU Privacy Guard
%	- http://www.ietf.org/rfc/rfc2440.txt OpenPGP Message Format

% Q&A
\overlays{1}{
\begin{slide}{Q\&A}
	\vspace{1in}
	\begin{center}
		Questions?
	\end{center}
\end{slide}}

\end{document}