SlideShare a Scribd company logo
1 of 25
PUBLIC KEYM a d e v e r y s i m p l e
Peter Cochrane
cochrane.org.uk
ca-global.org
COCHRANE
a s s o c i a t e s
Wednesday, 5 June 13
Public Key protocols can be
used for transmission and
storage of information and
may be realized using
software ‘containers’ and/or
encryption...
...document encryption appears
to be the most prevalent use
today
Wednesday, 5 June 13
Protects against
•Misrepresentation
•Eavesdropping
•Impersonation
•Tampering
•Spoofing
•Theft
Facilitates
•Tamper Detection
•Non-Repudiation
•Authentication
•Encryption
Wednesday, 5 June 13
Public Key is the most popular
method today
Wednesday, 5 June 13
local-host$ ssh-yagi -t rsa -f ~/.ssh/peter
Add ~/.ssh/config:
Identity~/.ssh/peter
local-host$ ssh remote-host
cat >> ~/.ssh/authorized_keys2' < ~/.ssh/peter.pub
local-host$ ssh-keygen -e -f ~/.ssh/peter
pub > ~/.ssh/peter22.pub
local-host$ scp ~/.ssh/peter22.
pub remote-host:.ssh2/peter.pub
~/.ssh2/authorization:key peter.pub
eval `ssh-agent`
ssh-add
ssh-keygen2
local-host$ ssh-keygen2 -o ~/.ssh2/peter
~/.ssh2/identification:
IdKey peter
local-host$ scp ~/.ssh2/peter.pub
remote-host:.ssh/peter.pub
remote-host$ ssh-keygen -i -f ~/.ssh/peter
pub > ~/.ssh/peter22.pub
remote-host$ cat ~/.ssh/peter22
pub >> ~/.ssh/authorized_keys2
local-host$ scp ~/.ssh2/peter
pub remote-host:.ssh2/peter.pub
key peter.pub
ssh-agent2: eval `ssh-agent2`
But it not easy or
straightforward to
understand...
...so what is the hidden
mechanism defined by
the software coding ??
Wednesday, 5 June 13
By Direct
analogy
“A form of reasoning
where one thing is
inferred as similar to
another”
Wednesday, 5 June 13
Two o r m o re
people and/or
machines wish
to share vital
files over open
networks...
...with a very
real threat of
interception
They
must ...readablenot be
Wednesday, 5 June 13
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
Wednesday, 5 June 13
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
x
Wednesday, 5 June 13
x
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
Wednesday, 5 June 13
x
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
Wednesday, 5 June 13
Party B then applies a second
lock using a key that is unique
and only known to them
x
Wednesday, 5 June 13
Party B then applies a second
lock using a key that is unique
and only known to them
x
x
Wednesday, 5 June 13
The case is then returned to
Party A who removes the Red
lock using their unique key
x
x
Wednesday, 5 June 13
The case is then returned to
Party A who removes the Red
lock using their unique key
x
x
Wednesday, 5 June 13
x
x
The case is then returned to
Party A who removes the Red
lock using their unique key
Wednesday, 5 June 13
x
The case is then returned to
Party A who removes the Red
lock using their unique key
Wednesday, 5 June 13
x
The case is then returned to
Party B who removes the Blue
lock using their unique key
Wednesday, 5 June 13
x
The case is then returned to
Party B who removes the Blue
lock using their unique key
Wednesday, 5 June 13
The case is then returned to
Party B who removes the Blue
lock using their unique key
x
Wednesday, 5 June 13
The case is then returned to
Party B who removes the Blue
lock using their unique key
Wednesday, 5 June 13
The case is now fully unlocked
and the sensitive files can be
accessed by Party B
Wednesday, 5 June 13
Rendered even simpler???
Wednesday, 5 June 13
x x
x x
Documents
placed in case
Case is
locked
Second
lock is
applied
Transmitted to Party B
x
x x Returned to Party A
First
lock
can be
removed
Transmitted to Party B x
Second
lock is
removed
PUBLIC KEY
one more time
Wednesday, 5 June 13
cochrane.org.uk
ca-global.org
COCHRANE
a s s o c i a t e s
Wednesday, 5 June 13

More Related Content

Viewers also liked

The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)
University of Hertfordshire
 
Quality at Speed
Quality at SpeedQuality at Speed
Quality at Speed
University of Hertfordshire
 
Systems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in ClassSystems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in Class
University of Hertfordshire
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructure
University of Hertfordshire
 
Successful FTTH Implementation
Successful FTTH ImplementationSuccessful FTTH Implementation
Successful FTTH Implementation
Finley Engineering Company
 

Viewers also liked (10)

The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)
 
Digital slime trails & personal security
Digital slime trails & personal securityDigital slime trails & personal security
Digital slime trails & personal security
 
Quality at Speed
Quality at SpeedQuality at Speed
Quality at Speed
 
Systems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in ClassSystems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in Class
 
The conference formula has changed, but we haven't
The conference formula has changed, but we haven'tThe conference formula has changed, but we haven't
The conference formula has changed, but we haven't
 
Business tools you may have missed
Business tools you may have missedBusiness tools you may have missed
Business tools you may have missed
 
FTTH @ last
FTTH @ lastFTTH @ last
FTTH @ last
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructure
 
Successful FTTH Implementation
Successful FTTH ImplementationSuccessful FTTH Implementation
Successful FTTH Implementation
 
A Cloudy Future
A Cloudy FutureA Cloudy Future
A Cloudy Future
 

More from University of Hertfordshire

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
University of Hertfordshire
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
University of Hertfordshire
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
University of Hertfordshire
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
University of Hertfordshire
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
University of Hertfordshire
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
University of Hertfordshire
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
University of Hertfordshire
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
University of Hertfordshire
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
University of Hertfordshire
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
University of Hertfordshire
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
University of Hertfordshire
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
University of Hertfordshire
 

More from University of Hertfordshire (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Public Key - Made Very Easy

  • 1. PUBLIC KEYM a d e v e r y s i m p l e Peter Cochrane cochrane.org.uk ca-global.org COCHRANE a s s o c i a t e s Wednesday, 5 June 13
  • 2. Public Key protocols can be used for transmission and storage of information and may be realized using software ‘containers’ and/or encryption... ...document encryption appears to be the most prevalent use today Wednesday, 5 June 13
  • 4. Public Key is the most popular method today Wednesday, 5 June 13
  • 5. local-host$ ssh-yagi -t rsa -f ~/.ssh/peter Add ~/.ssh/config: Identity~/.ssh/peter local-host$ ssh remote-host cat >> ~/.ssh/authorized_keys2' < ~/.ssh/peter.pub local-host$ ssh-keygen -e -f ~/.ssh/peter pub > ~/.ssh/peter22.pub local-host$ scp ~/.ssh/peter22. pub remote-host:.ssh2/peter.pub ~/.ssh2/authorization:key peter.pub eval `ssh-agent` ssh-add ssh-keygen2 local-host$ ssh-keygen2 -o ~/.ssh2/peter ~/.ssh2/identification: IdKey peter local-host$ scp ~/.ssh2/peter.pub remote-host:.ssh/peter.pub remote-host$ ssh-keygen -i -f ~/.ssh/peter pub > ~/.ssh/peter22.pub remote-host$ cat ~/.ssh/peter22 pub >> ~/.ssh/authorized_keys2 local-host$ scp ~/.ssh2/peter pub remote-host:.ssh2/peter.pub key peter.pub ssh-agent2: eval `ssh-agent2` But it not easy or straightforward to understand... ...so what is the hidden mechanism defined by the software coding ?? Wednesday, 5 June 13
  • 6. By Direct analogy “A form of reasoning where one thing is inferred as similar to another” Wednesday, 5 June 13
  • 7. Two o r m o re people and/or machines wish to share vital files over open networks... ...with a very real threat of interception They must ...readablenot be Wednesday, 5 June 13
  • 8. Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B Wednesday, 5 June 13
  • 9. Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B x Wednesday, 5 June 13
  • 10. x Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B Wednesday, 5 June 13
  • 11. x Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B Wednesday, 5 June 13
  • 12. Party B then applies a second lock using a key that is unique and only known to them x Wednesday, 5 June 13
  • 13. Party B then applies a second lock using a key that is unique and only known to them x x Wednesday, 5 June 13
  • 14. The case is then returned to Party A who removes the Red lock using their unique key x x Wednesday, 5 June 13
  • 15. The case is then returned to Party A who removes the Red lock using their unique key x x Wednesday, 5 June 13
  • 16. x x The case is then returned to Party A who removes the Red lock using their unique key Wednesday, 5 June 13
  • 17. x The case is then returned to Party A who removes the Red lock using their unique key Wednesday, 5 June 13
  • 18. x The case is then returned to Party B who removes the Blue lock using their unique key Wednesday, 5 June 13
  • 19. x The case is then returned to Party B who removes the Blue lock using their unique key Wednesday, 5 June 13
  • 20. The case is then returned to Party B who removes the Blue lock using their unique key x Wednesday, 5 June 13
  • 21. The case is then returned to Party B who removes the Blue lock using their unique key Wednesday, 5 June 13
  • 22. The case is now fully unlocked and the sensitive files can be accessed by Party B Wednesday, 5 June 13
  • 24. x x x x Documents placed in case Case is locked Second lock is applied Transmitted to Party B x x x Returned to Party A First lock can be removed Transmitted to Party B x Second lock is removed PUBLIC KEY one more time Wednesday, 5 June 13
  • 25. cochrane.org.uk ca-global.org COCHRANE a s s o c i a t e s Wednesday, 5 June 13