PUBLIC KEYM a d e v e r y s i m p l ePeter Cochranecochrane.org.ukca-global.orgCOCHRANEa s s o c i a t e sWednesday, 5 Jun...
Public Key protocols can beused for transmission andstorage of information andmay be realized usingsoftware ‘containers’ a...
Protects against•Misrepresentation•Eavesdropping•Impersonation•Tampering•Spoofing•TheftFacilitates•Tamper Detection•Non-Rep...
Public Key is the most popularmethod todayWednesday, 5 June 13
local-host$ ssh-yagi -t rsa -f ~/.ssh/peterAdd ~/.ssh/config:Identity~/.ssh/peterlocal-host$ ssh remote-hostcat >> ~/.ssh/...
By Directanalogy“A form of reasoningwhere one thing isinferred as similar toanother”Wednesday, 5 June 13
Two o r m o repeople and/ormachines wishto share vitalfiles over opennetworks......with a veryreal threat ofinterceptionTh...
Sensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWe...
Sensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BxW...
xSensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BW...
xSensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BW...
Party B then applies a secondlock using a key that is uniqueand only known to themxWednesday, 5 June 13
Party B then applies a secondlock using a key that is uniqueand only known to themxxWednesday, 5 June 13
The case is then returned toParty A who removes the Redlock using their unique keyxxWednesday, 5 June 13
The case is then returned toParty A who removes the Redlock using their unique keyxxWednesday, 5 June 13
xxThe case is then returned toParty A who removes the Redlock using their unique keyWednesday, 5 June 13
xThe case is then returned toParty A who removes the Redlock using their unique keyWednesday, 5 June 13
xThe case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
xThe case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
The case is then returned toParty B who removes the Bluelock using their unique keyxWednesday, 5 June 13
The case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
The case is now fully unlockedand the sensitive files can beaccessed by Party BWednesday, 5 June 13
Rendered even simpler???Wednesday, 5 June 13
x xx xDocumentsplaced in caseCase islockedSecondlock isappliedTransmitted to Party Bxx x Returned to Party AFirstlockcan b...
cochrane.org.ukca-global.orgCOCHRANEa s s o c i a t e sWednesday, 5 June 13
Upcoming SlideShare
Loading in...5
×

Public Key - Made Very Easy

828

Published on

The technical papers, articles and book chapters on Public Key are difficult, if not impossible, for lay people to understand.. So this slide set has been put together to help those people (and students) to get a grip on the fundamental mechanisms. Experts in the field are therefor asked to excuse the analogies used and the omission of all mathematics, but the ‘key’ here is simplicity of concept and clarity of communication without a complete bastardization of the subtleties of the actual method/
Public-key mostly implies cryptographic system requiring two separate keys or codes, one of which is secret and one can be public. It can also be used in terms of ‘secure software containers’ which is used for the exemplar model here. The two keys can also be ‘secret’, static or dynamic, and communication can be one-to-one or one-to-many.

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
828
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Public Key - Made Very Easy

  1. 1. PUBLIC KEYM a d e v e r y s i m p l ePeter Cochranecochrane.org.ukca-global.orgCOCHRANEa s s o c i a t e sWednesday, 5 June 13
  2. 2. Public Key protocols can beused for transmission andstorage of information andmay be realized usingsoftware ‘containers’ and/orencryption......document encryption appearsto be the most prevalent usetodayWednesday, 5 June 13
  3. 3. Protects against•Misrepresentation•Eavesdropping•Impersonation•Tampering•Spoofing•TheftFacilitates•Tamper Detection•Non-Repudiation•Authentication•EncryptionWednesday, 5 June 13
  4. 4. Public Key is the most popularmethod todayWednesday, 5 June 13
  5. 5. local-host$ ssh-yagi -t rsa -f ~/.ssh/peterAdd ~/.ssh/config:Identity~/.ssh/peterlocal-host$ ssh remote-hostcat >> ~/.ssh/authorized_keys2 < ~/.ssh/peter.publocal-host$ ssh-keygen -e -f ~/.ssh/peterpub > ~/.ssh/peter22.publocal-host$ scp ~/.ssh/peter22.pub remote-host:.ssh2/peter.pub~/.ssh2/authorization:key peter.pubeval `ssh-agent`ssh-addssh-keygen2local-host$ ssh-keygen2 -o ~/.ssh2/peter~/.ssh2/identification:IdKey peterlocal-host$ scp ~/.ssh2/peter.pubremote-host:.ssh/peter.pubremote-host$ ssh-keygen -i -f ~/.ssh/peterpub > ~/.ssh/peter22.pubremote-host$ cat ~/.ssh/peter22pub >> ~/.ssh/authorized_keys2local-host$ scp ~/.ssh2/peterpub remote-host:.ssh2/peter.pubkey peter.pubssh-agent2: eval `ssh-agent2`But it not easy orstraightforward tounderstand......so what is the hiddenmechanism defined bythe software coding ??Wednesday, 5 June 13
  6. 6. By Directanalogy“A form of reasoningwhere one thing isinferred as similar toanother”Wednesday, 5 June 13
  7. 7. Two o r m o repeople and/ormachines wishto share vitalfiles over opennetworks......with a veryreal threat ofinterceptionTheymust ...readablenot beWednesday, 5 June 13
  8. 8. Sensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWednesday, 5 June 13
  9. 9. Sensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BxWednesday, 5 June 13
  10. 10. xSensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWednesday, 5 June 13
  11. 11. xSensitive files are placed in a case,it is locked using a key unique andonly known to party A...it is thensent to party BWednesday, 5 June 13
  12. 12. Party B then applies a secondlock using a key that is uniqueand only known to themxWednesday, 5 June 13
  13. 13. Party B then applies a secondlock using a key that is uniqueand only known to themxxWednesday, 5 June 13
  14. 14. The case is then returned toParty A who removes the Redlock using their unique keyxxWednesday, 5 June 13
  15. 15. The case is then returned toParty A who removes the Redlock using their unique keyxxWednesday, 5 June 13
  16. 16. xxThe case is then returned toParty A who removes the Redlock using their unique keyWednesday, 5 June 13
  17. 17. xThe case is then returned toParty A who removes the Redlock using their unique keyWednesday, 5 June 13
  18. 18. xThe case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
  19. 19. xThe case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
  20. 20. The case is then returned toParty B who removes the Bluelock using their unique keyxWednesday, 5 June 13
  21. 21. The case is then returned toParty B who removes the Bluelock using their unique keyWednesday, 5 June 13
  22. 22. The case is now fully unlockedand the sensitive files can beaccessed by Party BWednesday, 5 June 13
  23. 23. Rendered even simpler???Wednesday, 5 June 13
  24. 24. x xx xDocumentsplaced in caseCase islockedSecondlock isappliedTransmitted to Party Bxx x Returned to Party AFirstlockcan beremovedTransmitted to Party B xSecondlock isremovedPUBLIC KEYone more timeWednesday, 5 June 13
  25. 25. cochrane.org.ukca-global.orgCOCHRANEa s s o c i a t e sWednesday, 5 June 13

×