Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Introduction to PGP

mongrelion
January 24, 2023

Introduction to PGP

In this talk we're going to have a look at encryption with PGP, its most common use cases, securing our online presence with public keys and a lot more.
If you already have a key and would like to have it signed, bring it.

mongrelion

January 24, 2023
Tweet

More Decks by mongrelion

Other Decks in Technology

Transcript

  1. Cloud Native Specialist @ CoreX Social Media: - mastodon: @[email protected]

    - Twitter: @mongrelion - LinkedIn: https://www.linkedin.com/in/mongrelion/ - [email protected]
  2. Julius Caesar’s Cipher When Julius Caesar sent messages to his

    generals, he didn't trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone who knew the "shift by 3" rule could decipher his messages. So starting with ABCDEFGHIJKLMNOPQRSTUVWXYZ and sliding everything up by 3, you get DEFGHIJKLMNOPQRSTUVWXYZABC where D=A, E=B, F=C, and so on. The key here is 3.
  3. What is PGP? From the Wikipedia: Pretty Good Privacy (PGP)

    is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991.[3]
  4. What will we cover? - Generate a set of key

    pairs using gpg - Import someone else’s public key - Encrypt/decrypt files - Sign messages - Verify signature