• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Public Key - Made Very Easy
 

Public Key - Made Very Easy

on

  • 1,021 views

The technical papers, articles and book chapters on Public Key are difficult, if not impossible, for lay people to understand.. So this slide set has been put together to help those people (and ...

The technical papers, articles and book chapters on Public Key are difficult, if not impossible, for lay people to understand.. So this slide set has been put together to help those people (and students) to get a grip on the fundamental mechanisms. Experts in the field are therefor asked to excuse the analogies used and the omission of all mathematics, but the ‘key’ here is simplicity of concept and clarity of communication without a complete bastardization of the subtleties of the actual method/
Public-key mostly implies cryptographic system requiring two separate keys or codes, one of which is secret and one can be public. It can also be used in terms of ‘secure software containers’ which is used for the exemplar model here. The two keys can also be ‘secret’, static or dynamic, and communication can be one-to-one or one-to-many.

Statistics

Views

Total Views
1,021
Views on SlideShare
1,016
Embed Views
5

Actions

Likes
2
Downloads
0
Comments
0

2 Embeds 5

https://twitter.com 4
https://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Public Key - Made Very Easy Public Key - Made Very Easy Presentation Transcript

    • PUBLIC KEYM a d e v e r y s i m p l ePeter Cochranecochrane.org.ukca-global.orgCOCHRANEa s s o c i a t e sWednesday, 5 June 13
    • Public Key protocols can beused for transmission andstorage of information andmay be realized usingsoftware ‘containers’ and/orencryption......document encryption appearsto be the most prevalent usetodayWednesday, 5 June 13
    • Protects against•Misrepresentation•Eavesdropping•Impersonation•Tampering•Spoofing•TheftFacilitates•Tamper Detection•Non-Repudiation•Authentication•EncryptionWednesday, 5 June 13
    • Public Key is the most popularmethod todayWednesday, 5 June 13
    • local-host$ ssh-yagi -t rsa -f ~/.ssh/peterAdd ~/.ssh/config:Identity~/.ssh/peterlocal-host$ ssh remote-hostcat >> ~/.ssh/authorized_keys2 < ~/.ssh/peter.publocal-host$ ssh-keygen -e -f ~/.ssh/peterpub > ~/.ssh/peter22.publocal-host$ scp ~/.ssh/peter22.pub remote-host:.ssh2/peter.pub~/.ssh2/authorization:key peter.pubeval `ssh-agent`ssh-addssh-keygen2local-host$ ssh-keygen2 -o ~/.ssh2/peter~/.ssh2/identification:IdKey peterlocal-host$ scp ~/.ssh2/peter.pubremote-host:.ssh/peter.pubremote-host$ ssh-keygen -i -f ~/.ssh/peterpub > ~/.ssh/peter22.pubremote-host$ cat ~/.ssh/peter22pub >> ~/.ssh/authorized_keys2local-host$ scp ~/.ssh2/peterpub remote-host:.ssh2/peter.pubkey peter.pubssh-agent2: eval `ssh-agent2`But it not easy orstraightforward tounderstand......so what is the hiddenmechanism defined bythe software coding ??Wednesday, 5 June 13
    • By Directanalogy“A form of reasoningwhere one thing isinferred as similar toanother”Wednesday, 5 June 13
    • Two o r m o repeople and/ormachines wishto share vitalfiles over opennetworks......with a veryreal threat ofinterceptionTheymust ...readablenot beWednesday, 5 June 13
    • Sensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWednesday, 5 June 13
    • Sensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BxWednesday, 5 June 13
    • xSensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWednesday, 5 June 13
    • xSensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWednesday, 5 June 13
    • Party B then applies a secondlock using a key that is uniqueand only known to themxWednesday, 5 June 13
    • Party B then applies a secondlock using a key that is uniqueand only known to themxxWednesday, 5 June 13
    • The case is then returned toParty A who removes the Redlock using their unique keyxxWednesday, 5 June 13
    • The case is then returned toParty A who removes the Redlock using their unique keyxxWednesday, 5 June 13
    • xxThe case is then returned toParty A who removes the Redlock using their unique keyWednesday, 5 June 13
    • xThe case is then returned toParty A who removes the Redlock using their unique keyWednesday, 5 June 13
    • xThe case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
    • xThe case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
    • The case is then returned toParty B who removes the Bluelock using their unique keyxWednesday, 5 June 13
    • The case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
    • The case is now fully unlockedand the sensitive files can beaccessed by Party BWednesday, 5 June 13
    • Rendered even simpler???Wednesday, 5 June 13
    • x xx xDocumentsplaced in caseCase islockedSecondlock isappliedTransmitted to Party Bxx x Returned to Party AFirstlockcan beremovedTransmitted to Party B xSecondlock isremovedPUBLIC KEYone more timeWednesday, 5 June 13
    • cochrane.org.ukca-global.orgCOCHRANEa s s o c i a t e sWednesday, 5 June 13