Your SlideShare is downloading. ×
Public Key - Made Very Easy
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Public Key - Made Very Easy

774
views

Published on

The technical papers, articles and book chapters on Public Key are difficult, if not impossible, for lay people to understand.. So this slide set has been put together to help those people (and …

The technical papers, articles and book chapters on Public Key are difficult, if not impossible, for lay people to understand.. So this slide set has been put together to help those people (and students) to get a grip on the fundamental mechanisms. Experts in the field are therefor asked to excuse the analogies used and the omission of all mathematics, but the ‘key’ here is simplicity of concept and clarity of communication without a complete bastardization of the subtleties of the actual method/
Public-key mostly implies cryptographic system requiring two separate keys or codes, one of which is secret and one can be public. It can also be used in terms of ‘secure software containers’ which is used for the exemplar model here. The two keys can also be ‘secret’, static or dynamic, and communication can be one-to-one or one-to-many.

Published in: Technology

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
774
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. PUBLIC KEYM a d e v e r y s i m p l ePeter Cochranecochrane.org.ukca-global.orgCOCHRANEa s s o c i a t e sWednesday, 5 June 13
  • 2. Public Key protocols can beused for transmission andstorage of information andmay be realized usingsoftware ‘containers’ and/orencryption......document encryption appearsto be the most prevalent usetodayWednesday, 5 June 13
  • 3. Protects against•Misrepresentation•Eavesdropping•Impersonation•Tampering•Spoofing•TheftFacilitates•Tamper Detection•Non-Repudiation•Authentication•EncryptionWednesday, 5 June 13
  • 4. Public Key is the most popularmethod todayWednesday, 5 June 13
  • 5. local-host$ ssh-yagi -t rsa -f ~/.ssh/peterAdd ~/.ssh/config:Identity~/.ssh/peterlocal-host$ ssh remote-hostcat >> ~/.ssh/authorized_keys2 < ~/.ssh/peter.publocal-host$ ssh-keygen -e -f ~/.ssh/peterpub > ~/.ssh/peter22.publocal-host$ scp ~/.ssh/peter22.pub remote-host:.ssh2/peter.pub~/.ssh2/authorization:key peter.pubeval `ssh-agent`ssh-addssh-keygen2local-host$ ssh-keygen2 -o ~/.ssh2/peter~/.ssh2/identification:IdKey peterlocal-host$ scp ~/.ssh2/peter.pubremote-host:.ssh/peter.pubremote-host$ ssh-keygen -i -f ~/.ssh/peterpub > ~/.ssh/peter22.pubremote-host$ cat ~/.ssh/peter22pub >> ~/.ssh/authorized_keys2local-host$ scp ~/.ssh2/peterpub remote-host:.ssh2/peter.pubkey peter.pubssh-agent2: eval `ssh-agent2`But it not easy orstraightforward tounderstand......so what is the hiddenmechanism defined bythe software coding ??Wednesday, 5 June 13
  • 6. By Directanalogy“A form of reasoningwhere one thing isinferred as similar toanother”Wednesday, 5 June 13
  • 7. Two o r m o repeople and/ormachines wishto share vitalfiles over opennetworks......with a veryreal threat ofinterceptionTheymust ...readablenot beWednesday, 5 June 13
  • 8. Sensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWednesday, 5 June 13
  • 9. Sensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BxWednesday, 5 June 13
  • 10. xSensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWednesday, 5 June 13
  • 11. xSensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWednesday, 5 June 13
  • 12. Party B then applies a secondlock using a key that is uniqueand only known to themxWednesday, 5 June 13
  • 13. Party B then applies a secondlock using a key that is uniqueand only known to themxxWednesday, 5 June 13
  • 14. The case is then returned toParty A who removes the Redlock using their unique keyxxWednesday, 5 June 13
  • 15. The case is then returned toParty A who removes the Redlock using their unique keyxxWednesday, 5 June 13
  • 16. xxThe case is then returned toParty A who removes the Redlock using their unique keyWednesday, 5 June 13
  • 17. xThe case is then returned toParty A who removes the Redlock using their unique keyWednesday, 5 June 13
  • 18. xThe case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
  • 19. xThe case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
  • 20. The case is then returned toParty B who removes the Bluelock using their unique keyxWednesday, 5 June 13
  • 21. The case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
  • 22. The case is now fully unlockedand the sensitive files can beaccessed by Party BWednesday, 5 June 13
  • 23. Rendered even simpler???Wednesday, 5 June 13
  • 24. x xx xDocumentsplaced in caseCase islockedSecondlock isappliedTransmitted to Party Bxx x Returned to Party AFirstlockcan beremovedTransmitted to Party B xSecondlock isremovedPUBLIC KEYone more timeWednesday, 5 June 13
  • 25. cochrane.org.ukca-global.orgCOCHRANEa s s o c i a t e sWednesday, 5 June 13