Social:Key signing party

From HandWiki
Revision as of 13:50, 5 February 2024 by Jport (talk | contribs) (change)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Key signing in front of FOSDEM 2008.

In public-key cryptography, a key signing party is an event at which people present their public keys to others in person, who, if they are confident the key actually belongs to the person who claims it, digitally sign the certificate containing that public key and the person's name, etc.[1] Key signing parties are common within the PGP and GNU Privacy Guard community, as the PGP public key infrastructure does not depend on a central key certifying authority, but to a distributed web of trust approach. Key signing parties are a way to strengthen the web of trust. Participants at a key signing party are expected to present adequate identity documents.[2]

Although PGP keys are generally used with personal computers for Internet-related applications, key signing parties themselves generally do not involve computers, since that would give adversaries increased opportunities for subterfuge. Rather, participants write down a string of letters and numbers, called a public key fingerprint, which represents their key. The fingerprint is created by a cryptographic hash function, which condenses the public key down to a string which is shorter and more manageable. Participants exchange these fingerprints as they verify each other's identification. Then, after the party, they obtain the public keys corresponding to the fingerprints they received and digitally sign them.[3]

See also

References

  1. The Keysigning Party HOWTO https://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html
  2. Section §2.1 of NIST Special Publication 800-57 Part 3 Revision 1 Recommendation for Key Management http://dx.doi.org/10.6028/NIST.SP.800-57pt3r1
  3. Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing (2015-09-01). "Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography" (in en). Optics and Lasers in Engineering 72: 12–17. doi:10.1016/j.optlaseng.2015.03.024. ISSN 0143-8166. Bibcode2015OptLE..72...12Z. https://www.sciencedirect.com/science/article/pii/S014381661500072X. 

External links