SlideShare a Scribd company logo
PUBLIC KEYM a d e v e r y s i m p l e
Peter Cochrane
cochrane.org.uk
ca-global.org
COCHRANE
a s s o c i a t e s
Wednesday, 5 June 13
Public Key protocols can be
used for transmission and
storage of information and
may be realized using
software ‘containers’ and/or
encryption...
...document encryption appears
to be the most prevalent use
today
Wednesday, 5 June 13
Protects against
•Misrepresentation
•Eavesdropping
•Impersonation
•Tampering
•Spoofing
•Theft
Facilitates
•Tamper Detection
•Non-Repudiation
•Authentication
•Encryption
Wednesday, 5 June 13
Public Key is the most popular
method today
Wednesday, 5 June 13
local-host$ ssh-yagi -t rsa -f ~/.ssh/peter
Add ~/.ssh/config:
Identity~/.ssh/peter
local-host$ ssh remote-host
cat >> ~/.ssh/authorized_keys2' < ~/.ssh/peter.pub
local-host$ ssh-keygen -e -f ~/.ssh/peter
pub > ~/.ssh/peter22.pub
local-host$ scp ~/.ssh/peter22.
pub remote-host:.ssh2/peter.pub
~/.ssh2/authorization:key peter.pub
eval `ssh-agent`
ssh-add
ssh-keygen2
local-host$ ssh-keygen2 -o ~/.ssh2/peter
~/.ssh2/identification:
IdKey peter
local-host$ scp ~/.ssh2/peter.pub
remote-host:.ssh/peter.pub
remote-host$ ssh-keygen -i -f ~/.ssh/peter
pub > ~/.ssh/peter22.pub
remote-host$ cat ~/.ssh/peter22
pub >> ~/.ssh/authorized_keys2
local-host$ scp ~/.ssh2/peter
pub remote-host:.ssh2/peter.pub
key peter.pub
ssh-agent2: eval `ssh-agent2`
But it not easy or
straightforward to
understand...
...so what is the hidden
mechanism defined by
the software coding ??
Wednesday, 5 June 13
By Direct
analogy
“A form of reasoning
where one thing is
inferred as similar to
another”
Wednesday, 5 June 13
Two o r m o re
people and/or
machines wish
to share vital
files over open
networks...
...with a very
real threat of
interception
They
must ...readablenot be
Wednesday, 5 June 13
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
Wednesday, 5 June 13
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
x
Wednesday, 5 June 13
x
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
Wednesday, 5 June 13
x
Sensitive files are placed in a case,
it is locked using a key unique and
only known to party A...it is then
sent to party B
Wednesday, 5 June 13
Party B then applies a second
lock using a key that is unique
and only known to them
x
Wednesday, 5 June 13
Party B then applies a second
lock using a key that is unique
and only known to them
x
x
Wednesday, 5 June 13
The case is then returned to
Party A who removes the Red
lock using their unique key
x
x
Wednesday, 5 June 13
The case is then returned to
Party A who removes the Red
lock using their unique key
x
x
Wednesday, 5 June 13
x
x
The case is then returned to
Party A who removes the Red
lock using their unique key
Wednesday, 5 June 13
x
The case is then returned to
Party A who removes the Red
lock using their unique key
Wednesday, 5 June 13
x
The case is then returned to
Party B who removes the Blue
lock using their unique key
Wednesday, 5 June 13
x
The case is then returned to
Party B who removes the Blue
lock using their unique key
Wednesday, 5 June 13
The case is then returned to
Party B who removes the Blue
lock using their unique key
x
Wednesday, 5 June 13
The case is then returned to
Party B who removes the Blue
lock using their unique key
Wednesday, 5 June 13
The case is now fully unlocked
and the sensitive files can be
accessed by Party B
Wednesday, 5 June 13
Rendered even simpler???
Wednesday, 5 June 13
x x
x x
Documents
placed in case
Case is
locked
Second
lock is
applied
Transmitted to Party B
x
x x Returned to Party A
First
lock
can be
removed
Transmitted to Party B x
Second
lock is
removed
PUBLIC KEY
one more time
Wednesday, 5 June 13
cochrane.org.uk
ca-global.org
COCHRANE
a s s o c i a t e s
Wednesday, 5 June 13

More Related Content

Viewers also liked

The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)
University of Hertfordshire
 
Quality at Speed
Quality at SpeedQuality at Speed
Quality at Speed
University of Hertfordshire
 
Systems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in ClassSystems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in Class
University of Hertfordshire
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructure
University of Hertfordshire
 
Successful FTTH Implementation
Successful FTTH ImplementationSuccessful FTTH Implementation
Successful FTTH Implementation
Finley Engineering Company
 

Viewers also liked (10)

The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)The infinite Security of Clouds (Madeira Networks 2014 Keynote)
The infinite Security of Clouds (Madeira Networks 2014 Keynote)
 
Digital slime trails & personal security
Digital slime trails & personal securityDigital slime trails & personal security
Digital slime trails & personal security
 
Quality at Speed
Quality at SpeedQuality at Speed
Quality at Speed
 
Systems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in ClassSystems 1.0 What They Should Have Told You in Class
Systems 1.0 What They Should Have Told You in Class
 
The conference formula has changed, but we haven't
The conference formula has changed, but we haven'tThe conference formula has changed, but we haven't
The conference formula has changed, but we haven't
 
Business tools you may have missed
Business tools you may have missedBusiness tools you may have missed
Business tools you may have missed
 
FTTH @ last
FTTH @ lastFTTH @ last
FTTH @ last
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructure
 
Successful FTTH Implementation
Successful FTTH ImplementationSuccessful FTTH Implementation
Successful FTTH Implementation
 
A Cloudy Future
A Cloudy FutureA Cloudy Future
A Cloudy Future
 

More from University of Hertfordshire

Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!
University of Hertfordshire
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
University of Hertfordshire
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
University of Hertfordshire
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
University of Hertfordshire
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
University of Hertfordshire
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
University of Hertfordshire
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
University of Hertfordshire
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
University of Hertfordshire
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
University of Hertfordshire
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
University of Hertfordshire
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
University of Hertfordshire
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
University of Hertfordshire
 

More from University of Hertfordshire (20)

Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 

Public Key - Made Very Easy

  • 1. PUBLIC KEYM a d e v e r y s i m p l e Peter Cochrane cochrane.org.uk ca-global.org COCHRANE a s s o c i a t e s Wednesday, 5 June 13
  • 2. Public Key protocols can be used for transmission and storage of information and may be realized using software ‘containers’ and/or encryption... ...document encryption appears to be the most prevalent use today Wednesday, 5 June 13
  • 4. Public Key is the most popular method today Wednesday, 5 June 13
  • 5. local-host$ ssh-yagi -t rsa -f ~/.ssh/peter Add ~/.ssh/config: Identity~/.ssh/peter local-host$ ssh remote-host cat >> ~/.ssh/authorized_keys2' < ~/.ssh/peter.pub local-host$ ssh-keygen -e -f ~/.ssh/peter pub > ~/.ssh/peter22.pub local-host$ scp ~/.ssh/peter22. pub remote-host:.ssh2/peter.pub ~/.ssh2/authorization:key peter.pub eval `ssh-agent` ssh-add ssh-keygen2 local-host$ ssh-keygen2 -o ~/.ssh2/peter ~/.ssh2/identification: IdKey peter local-host$ scp ~/.ssh2/peter.pub remote-host:.ssh/peter.pub remote-host$ ssh-keygen -i -f ~/.ssh/peter pub > ~/.ssh/peter22.pub remote-host$ cat ~/.ssh/peter22 pub >> ~/.ssh/authorized_keys2 local-host$ scp ~/.ssh2/peter pub remote-host:.ssh2/peter.pub key peter.pub ssh-agent2: eval `ssh-agent2` But it not easy or straightforward to understand... ...so what is the hidden mechanism defined by the software coding ?? Wednesday, 5 June 13
  • 6. By Direct analogy “A form of reasoning where one thing is inferred as similar to another” Wednesday, 5 June 13
  • 7. Two o r m o re people and/or machines wish to share vital files over open networks... ...with a very real threat of interception They must ...readablenot be Wednesday, 5 June 13
  • 8. Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B Wednesday, 5 June 13
  • 9. Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B x Wednesday, 5 June 13
  • 10. x Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B Wednesday, 5 June 13
  • 11. x Sensitive files are placed in a case, it is locked using a key unique and only known to party A...it is then sent to party B Wednesday, 5 June 13
  • 12. Party B then applies a second lock using a key that is unique and only known to them x Wednesday, 5 June 13
  • 13. Party B then applies a second lock using a key that is unique and only known to them x x Wednesday, 5 June 13
  • 14. The case is then returned to Party A who removes the Red lock using their unique key x x Wednesday, 5 June 13
  • 15. The case is then returned to Party A who removes the Red lock using their unique key x x Wednesday, 5 June 13
  • 16. x x The case is then returned to Party A who removes the Red lock using their unique key Wednesday, 5 June 13
  • 17. x The case is then returned to Party A who removes the Red lock using their unique key Wednesday, 5 June 13
  • 18. x The case is then returned to Party B who removes the Blue lock using their unique key Wednesday, 5 June 13
  • 19. x The case is then returned to Party B who removes the Blue lock using their unique key Wednesday, 5 June 13
  • 20. The case is then returned to Party B who removes the Blue lock using their unique key x Wednesday, 5 June 13
  • 21. The case is then returned to Party B who removes the Blue lock using their unique key Wednesday, 5 June 13
  • 22. The case is now fully unlocked and the sensitive files can be accessed by Party B Wednesday, 5 June 13
  • 24. x x x x Documents placed in case Case is locked Second lock is applied Transmitted to Party B x x x Returned to Party A First lock can be removed Transmitted to Party B x Second lock is removed PUBLIC KEY one more time Wednesday, 5 June 13
  • 25. cochrane.org.uk ca-global.org COCHRANE a s s o c i a t e s Wednesday, 5 June 13