Cyber Security: Public/Private Keys

OPENING QUESTIONS: Yesterday was a wee bit ragged. I worked to make a power point presentation HERE

If you don't have Power point, HERE is a pdf version. I tried an .mp4 version and that is HERE

OBJECTIVES: 

  1. I will be able to contrast public key encryption with private key encryption during today's class

WORDS FOR TODAY:

certificate:

public key:

private key:

asymmetric encryption: 1 key used to lock (the public key) and 1 key to unlock (private key)

symmetric encryption: 1 key used to lock AND unlock

WORK FOR TODAY:

Since we have a short day today, I'll walk through the power point with you.

When we are done I want you to work with chatGPT to have a conversation about how that process works.

It is REALLY important that you don't treat GPT as a search engine. GPT works best when you treat it as a knowledge base. Ask it specific questions and *require* that it give you straightforward questions.

GPT will often send a blast of text back at you. Don't let it do that, tell it in advance that you are going to ask a question and that you want a single sentence response.

Imagine that you are talking to a really, really knowledgeable 6th grader that tends to show off sometimes. You have to keep reminding that 6th grader that you want basic responses.

You have to learn how to interact with GPT in a way that is far removed from telling it to do whatever it is that you're working on. That is a lousy way to learn.

Instead try something like this:

 

"I'm a high school sophomore learning about asymmetric and symmetric encryption. I need to ask you specific questions about that and I need you to respond in single sentence responses. If I need more information I will respond with specific questions of my own"

IT WORKS!!!!