Encryption Key Signing

Presented at The Fifth HOPE (2004), July 11, 2004, 5 p.m. (60 minutes).

It's a surprising fact that a large number of attendees at this very conference, even those who call themselves hackers and/or security professionals, probably don't use any sort of encryption - or don't use it properly. One reason may be because people think nobody else uses it. So until it has a stronger presence, it won't be as widespread as it really should be. In order to help fight this, Seth will be hosting a key signing session. There will be a rundown of why people should be using strong crypto, how the web of trust works, and moderation to public verification of identity and key fingerprints. If you want in on this, send your public key to shardy@aculei.net so that he can prepare a keyring ahead of time to make things more convenient - or visit him in the NOC in area "4."

Presenters:

  • Seth Hardy
    Seth Hardy is involved in both research and implementation in the field of cryptology, both as part of a university research group and independently. Although he enjoys programming, his primary interest is the mathematics side of cryptography. For this reason, he's been involved in a number of projects which involve translating mathematical concepts and algorithms into working implementations in code. Seth has presented his work at a number of conferences, usually with his good friend Jose.

Links:

Similar Presentations: