Great job. Thank you for the primer on elliptic curve cryptography. When you mentioned vulnerabilities of the DH key exchange, I was expecting you to mention the vulnerabilities of a MiTM attack where an attacker intercepts and throws away the shared values and passes along it's own made up values to each recipient. I wasn't aware of an attack vector that uses algorithms to make crunching the key easier. I'll have to look into that.
@DavidAKZ7 жыл бұрын
what about the immutability of the elliptic curve used for BTC ? Is there a trap door ?