1994-09-13 - Boulder, Colorado RMIUG Crypto-Fest 9/13 6:30pm

Header Data

From: Michael Johnson <mpj@csn.org>
To: cypherpunks@toad.com
Message Hash: d66be911f4eaf25a04510b945371ce989a8652dab321bc1ac56c3c8ff29667d1
Message ID: <Pine.3.89.9409122215.A8680-0100000@teal.csn.org>
Reply To: N/A
UTC Datetime: 1994-09-13 04:37:58 UTC
Raw Date: Mon, 12 Sep 94 21:37:58 PDT

Raw message

From: Michael Johnson <mpj@csn.org>
Date: Mon, 12 Sep 94 21:37:58 PDT
To: cypherpunks@toad.com
Subject: Boulder, Colorado RMIUG Crypto-Fest 9/13 6:30pm
Message-ID: <Pine.3.89.9409122215.A8680-0100000@teal.csn.org>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

What:  Rocky Mountain Internet User's Group (RMIUG) Crypto-Fest
When:  Tuesday 13 September 1994 7:00pm-9:00pm, cookies at 6:30pm
Where: NCAR (West end of Table Mesa Drive), Boulder, COLORADO

Who:   Philip Dubois (Philip Zimmermann's lawyer and a very nice guy) and Mike
       Johnson (alledged crypto expert, designer of the Diamond Encryption
       Algorithm, PGP beta tester, and PGP user).  Sorry, Philip Zimmermann
       had a change of plans and will be at a conference in Atlanta.  The show
       must go on!

RMIUG "Crypto-Fest"

A users approach to encryption with PGP (Pretty Good Privacy):

I. A Very Short History of Cryptography
	A. Single Key Systems
	B. Two Key Systems (Public Key Cryptography)
	C. Hash Functions (MD4, MD4, SHA)
	D. What can be done with encryption?
II. Current crypto applications
III. PGP Building Blocks
	A. Public Key Algorithm (RSA)
	B. Hash function (MD5)
	C. Symmetric Key Algorithm (IDEA)
	D. Compression engine (Info-ZIP)
	E. ASCII armor engine
	F. Key database
	G. File formats
IV. What can PGP do?  What are its advantages?
	A. Privacy
	B. Authentication with nonrepudiation
	C. Compression (ZIP)
	D. ASCII armor
	C. Distributed Key Management (the Web of Trust)
	D. Inter-platform compatibility
	E. Wide availability
	F. Source code available (except for Viacrypt Digi-Sig)
	G. Ease of use (best around, but could be better)
V. Who uses PGP?  What do they use it for?
VI. How do you use PGP?  Read the fine manual.  2 books coming.
	A. Getting PGP
	B. Installing PGP
	C. Generate your key
	D. Distribute your public key
	E. Add keys from your correspondents
	E. Signing messages
	F. Encrypting messages (public key method)
	G. Conventional encryption pgp -c
VII. History/development of PGP & Legal Issues
	A. Why did Philip Zimmermann write pgp?
	B. Legal Issues
	C. Version History
VIII. What's happening now?
	A. Legal Actions & Status
	B. Political Action
	C. Future Development Plans

There will be opportunities to ask questions of the two panelists during and
after the presentation.

                  ___________________________________________________________
                 |                                                           |
 |\  /| |        | Michael Paul Johnson  Colorado Catacombs BBS 303-772-1062 |
 | \/ |o|        | PO Box 1151, Longmont CO 80502-1151 USA   Jesus is alive! |
 |    | | /  _   | mpj@csn.org aka mpj@netcom.com m.p.johnson@ieee.org       |
 |    |||/  /_\  | ftp://ftp.csn.net/mpj/README.MPJ          CIS: 71331,2332 |
 |    |||\  (    | ftp://ftp.netcom.com/pub/mpj/README.MPJ  -. --- ----- ....|
 |    ||| \ \_/  | PGPprint=F2 5E A1 C1 A6 CF EF 71  12 1F 91 92 6A ED AE A9 |
                 |___________________________________________________________|


-----BEGIN PGP SIGNATURE-----
Version: 2.7

iQCVAgUBLnUoSPX0zg8FAL9FAQE6nAQAmWpomcfCcWslktsuRYPNotY8kJFOwiuL
BUrh5L/UbCnM8L9Gh36CF2PGjrwuxDLhlySc70yhAGpBuMijWryTk0mPcJVKDoDm
6Z9v+L0Xs4Ql2kTshYpiJg5DlUd7CKsuREN0r07xJUMybudUXM8NLUG9YGvDz4CX
tIGH4nlDAS4=
=Qedh
-----END PGP SIGNATURE-----





Thread