SlideShare a Scribd company logo
1 of 25
PUBLIC KEYM a d e v e r y s i m p l e
Peter Cochrane
cochrane.org.uk
ca-global.org
COCHRANE
a s s o c i a t e s
Wednesday, 5 June 13
Public Key protocols can be
used for transmission and
storage of information and
may be realized using
software ‘containers’ and/or
encryption...
...document encryption appears
to be the most prevalent use
today
Wednesday, 5 June 13
Protects against
•Misrepresentation
•Eavesdropping
•Impersonation
•Tampering
•Spoofing
•Theft
Facilitates
•Tamper Detection
•Non-Repudiation
•Authentication
•Encryption
Wednesday, 5 June 13
Public Key is the most popular
method today
Wednesday, 5 June 13
local-host$ ssh-yagi -t rsa -f ~/.ssh/peter
Add ~/.ssh/config:
Identity~/.ssh/peter
local-host$ ssh remote-host
cat >> ~/.ssh/authorized_keys2' < ~/.ssh/peter.pub
local-host$ ssh-keygen -e -f ~/.ssh/peter
pub > ~/.ssh/peter22.pub
local-host$ scp ~/.ssh/peter22.
pub remote-host:.ssh2/peter.pub
~/.ssh2/authorization:key peter.pub
eval `ssh-agent`
ssh-add
ssh-keygen2
local-host$ ssh-keygen2 -o ~/.ssh2/peter
~/.ssh2/identification:
IdKey peter
local-host$ scp ~/.ssh2/peter.pub
remote-host:.ssh/peter.pub
remote-host$ ssh-keygen -i -f ~/.ssh/peter
pub > ~/.ssh/peter22.pub
remote-host$ cat ~/.ssh/peter22
pub >> ~/.ssh/authorized_keys2
local-host$ scp ~/.ssh2/peter
pub remote-host:.ssh2/peter.pub
key peter.pub
ssh-agent2: eval `ssh-agent2`
But it not easy or
straightforward to
understand...
...so what is the hidden
mechanism defined by
the software coding ??
Wednesday, 5 June 13
By Direct
analogy
“A form of reasoning
where one thing is
inferred as similar to
another”
Wednesday, 5 June 13
Two o r m o re
people and/or
machines wish
to share vital
files over open
networks...
...with a very
real threat of
interception
They
must ...readablenot be
Wednesday, 5 June 13
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
Wednesday, 5 June 13
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
x
Wednesday, 5 June 13
x
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
Wednesday, 5 June 13
x
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
Wednesday, 5 June 13
Party B then applies a second
lock using a key that is unique
and only known to them
x
Wednesday, 5 June 13
Party B then applies a second
lock using a key that is unique
and only known to them
x
x
Wednesday, 5 June 13
The case is then returned to
Party A who removes the Red
lock using their unique key
x
x
Wednesday, 5 June 13
The case is then returned to
Party A who removes the Red
lock using their unique key
x
x
Wednesday, 5 June 13
x
x
The case is then returned to
Party A who removes the Red
lock using their unique key
Wednesday, 5 June 13
x
The case is then returned to
Party A who removes the Red
lock using their unique key
Wednesday, 5 June 13
x
The case is then returned to
Party B who removes the Blue
lock using their unique key
Wednesday, 5 June 13
x
The case is then returned to
Party B who removes the Blue
lock using their unique key
Wednesday, 5 June 13
The case is then returned to
Party B who removes the Blue
lock using their unique key
x
Wednesday, 5 June 13
The case is then returned to
Party B who removes the Blue
lock using their unique key
Wednesday, 5 June 13
The case is now fully unlocked
and the sensitive files can be
accessed by Party B
Wednesday, 5 June 13
Rendered even simpler???
Wednesday, 5 June 13
x x
x x
Documents
placed in case
Case is
locked
Second
lock is
applied
Transmitted to Party B
x
x x Returned to Party A
First
lock
can be
removed
Transmitted to Party B x
Second
lock is
removed
PUBLIC KEY
one more time
Wednesday, 5 June 13
cochrane.org.uk
ca-global.org
COCHRANE
a s s o c i a t e s
Wednesday, 5 June 13

More Related Content

Viewers also liked (10)

The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)
 
Digital slime trails & personal security
Digital slime trails & personal securityDigital slime trails & personal security
Digital slime trails & personal security
 
Quality at Speed
Quality at SpeedQuality at Speed
Quality at Speed
 
Systems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in ClassSystems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in Class
 
The conference formula has changed, but we haven't
The conference formula has changed, but we haven'tThe conference formula has changed, but we haven't
The conference formula has changed, but we haven't
 
Business tools you may have missed
Business tools you may have missedBusiness tools you may have missed
Business tools you may have missed
 
FTTH @ last
FTTH @ lastFTTH @ last
FTTH @ last
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructure
 
Successful FTTH Implementation
Successful FTTH ImplementationSuccessful FTTH Implementation
Successful FTTH Implementation
 
A Cloudy Future
A Cloudy FutureA Cloudy Future
A Cloudy Future
 

More from University of Hertfordshire

More from University of Hertfordshire (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Public Key - Made Very Easy

  • 1. PUBLIC KEYM a d e v e r y s i m p l e Peter Cochrane cochrane.org.uk ca-global.org COCHRANE a s s o c i a t e s Wednesday, 5 June 13
  • 2. Public Key protocols can be used for transmission and storage of information and may be realized using software ‘containers’ and/or encryption... ...document encryption appears to be the most prevalent use today Wednesday, 5 June 13
  • 4. Public Key is the most popular method today Wednesday, 5 June 13
  • 5. local-host$ ssh-yagi -t rsa -f ~/.ssh/peter Add ~/.ssh/config: Identity~/.ssh/peter local-host$ ssh remote-host cat >> ~/.ssh/authorized_keys2' < ~/.ssh/peter.pub local-host$ ssh-keygen -e -f ~/.ssh/peter pub > ~/.ssh/peter22.pub local-host$ scp ~/.ssh/peter22. pub remote-host:.ssh2/peter.pub ~/.ssh2/authorization:key peter.pub eval `ssh-agent` ssh-add ssh-keygen2 local-host$ ssh-keygen2 -o ~/.ssh2/peter ~/.ssh2/identification: IdKey peter local-host$ scp ~/.ssh2/peter.pub remote-host:.ssh/peter.pub remote-host$ ssh-keygen -i -f ~/.ssh/peter pub > ~/.ssh/peter22.pub remote-host$ cat ~/.ssh/peter22 pub >> ~/.ssh/authorized_keys2 local-host$ scp ~/.ssh2/peter pub remote-host:.ssh2/peter.pub key peter.pub ssh-agent2: eval `ssh-agent2` But it not easy or straightforward to understand... ...so what is the hidden mechanism defined by the software coding ?? Wednesday, 5 June 13
  • 6. By Direct analogy “A form of reasoning where one thing is inferred as similar to another” Wednesday, 5 June 13
  • 7. Two o r m o re people and/or machines wish to share vital files over open networks... ...with a very real threat of interception They must ...readablenot be Wednesday, 5 June 13
  • 8. Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B Wednesday, 5 June 13
  • 9. Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B x Wednesday, 5 June 13
  • 10. x Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B Wednesday, 5 June 13
  • 11. x Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B Wednesday, 5 June 13
  • 12. Party B then applies a second lock using a key that is unique and only known to them x Wednesday, 5 June 13
  • 13. Party B then applies a second lock using a key that is unique and only known to them x x Wednesday, 5 June 13
  • 14. The case is then returned to Party A who removes the Red lock using their unique key x x Wednesday, 5 June 13
  • 15. The case is then returned to Party A who removes the Red lock using their unique key x x Wednesday, 5 June 13
  • 16. x x The case is then returned to Party A who removes the Red lock using their unique key Wednesday, 5 June 13
  • 17. x The case is then returned to Party A who removes the Red lock using their unique key Wednesday, 5 June 13
  • 18. x The case is then returned to Party B who removes the Blue lock using their unique key Wednesday, 5 June 13
  • 19. x The case is then returned to Party B who removes the Blue lock using their unique key Wednesday, 5 June 13
  • 20. The case is then returned to Party B who removes the Blue lock using their unique key x Wednesday, 5 June 13
  • 21. The case is then returned to Party B who removes the Blue lock using their unique key Wednesday, 5 June 13
  • 22. The case is now fully unlocked and the sensitive files can be accessed by Party B Wednesday, 5 June 13
  • 24. x x x x Documents placed in case Case is locked Second lock is applied Transmitted to Party B x x x Returned to Party A First lock can be removed Transmitted to Party B x Second lock is removed PUBLIC KEY one more time Wednesday, 5 June 13
  • 25. cochrane.org.uk ca-global.org COCHRANE a s s o c i a t e s Wednesday, 5 June 13