Martijn Grooten - Elliptic Curve Cryptography for those who are afraid of maths

  Рет қаралды 51,446

Security BSides London

Security BSides London

Күн бұрын

Пікірлер: 32
@mkmstillstackin
@mkmstillstackin 6 жыл бұрын
I've watched a number of ecc explanation videos for math novices like myself. This is clearly one of the better ones and one I am much more able to understand. Great job. Thanks so much for sharing!
@wilsonbalderrama
@wilsonbalderrama 5 жыл бұрын
great speaker, explaining hard concepts in a very friendly way, kudos to him!
@robertvangeel3599
@robertvangeel3599 Ай бұрын
The key is at 6:46 because it's totally not obvious why that is. Why is doing "two times a complex operation on point A (so doubling A), followed once by the same operation on the resulting point B (so doubling B, which is 4 times A)" the same as doing "four times the initial complex operation on point A". Doubling A, and then doubling the result B again are 2 calculations. But four times an addition of A is four operations. That's like a rubiks cube: the order of twists is very relevant to where you end up. I mean, I have to assume these statements are correct but it is not obvious why. In fact, I think that the amount of math behind that is enormous. But exactly that is the bread&butter of this algorithm.
@daryoushmehrtash7601
@daryoushmehrtash7601 3 жыл бұрын
The Best explanation! Thanks.
@skdiamond
@skdiamond 7 жыл бұрын
Thanks. This is excellent. I had to watch it a few times but I get your explanation. In particular I appreciate your comments on what could go wrong and concerns with NSA.
@jamesinonati7608
@jamesinonati7608 6 жыл бұрын
I like the speaker, and good explanation.
@SmrutiDashiamironman
@SmrutiDashiamironman 4 жыл бұрын
Great explanation.
@menesespaypa8765
@menesespaypa8765 5 жыл бұрын
15:42 "there are good girls and bad girls" Of course
@emmanuelbyrd3389
@emmanuelbyrd3389 7 жыл бұрын
Can someone explain me or give more detail on what he says at 20:59 ??
@ShokoDemon
@ShokoDemon 7 жыл бұрын
what don't you understand ? it's actually the basic way how random numbers are generated using an EC. thinking about vector * scala, where the vector is your random bytes array from /dev/random, and the point is an on the curve; even if your random bytes aren't random (assuming they aren't due to NSA shindig) the scala multiplication of your random bytes vector with the point will generate a better random point from the curve since multiplying a point on an EC curve makes it jump around in a seemingly /random/ manner. reversing this is /very/ costly for a CPU, or even a CPU cluster the size of several stadiums.
@AnandKumar-zn3ox
@AnandKumar-zn3ox 6 жыл бұрын
explained it so well ... thank you for this persentation
@luizalmeida1209
@luizalmeida1209 3 жыл бұрын
Thanks, awesome talk! :)
@Prashantkrdey
@Prashantkrdey 7 жыл бұрын
I believe that we should avoid the particular curve which is standard by NIST due to a possible backdoor. But then again how secure are the other curves? Moreover, since there has been questions even on SHA-256, then possibly the bitcoin is in risk.
@brendawilliams8062
@brendawilliams8062 3 жыл бұрын
Nice. Thx
@PamirTea
@PamirTea 7 жыл бұрын
Great talk, thank you.
@prakashharionutube
@prakashharionutube 7 жыл бұрын
Superb Man.... Superb!!!
@andrdrcks8368
@andrdrcks8368 6 жыл бұрын
I understand the spirit of the presentation; but, looks like some confusion between bits and bytes.
@jeanFMoise
@jeanFMoise 5 жыл бұрын
Great decoder
@vksingh1231
@vksingh1231 7 жыл бұрын
wireshark demo: 14:15
@lapetiteanessesoap7559
@lapetiteanessesoap7559 Жыл бұрын
so clearly
@suhaibkhan4956
@suhaibkhan4956 5 жыл бұрын
in ECC , a point on curve is shared between two bodies. How is the message lets say "hello" is encrypted and decrypted using ECC?
@frutiboy1
@frutiboy1 8 жыл бұрын
"I don't think there is a secret formula for this large number that appears in the standard without explanation." is a pretty useless way of thinking about it.
@vksingh1231
@vksingh1231 7 жыл бұрын
Nice book: Rational points on Elliptic curve, Springer 00:36
@vksingh1231
@vksingh1231 7 жыл бұрын
Loop in curve 16:07
@JohnSmith-bx4gf
@JohnSmith-bx4gf 7 жыл бұрын
I watch this to treat insomnia
@Anonymous-ed4id
@Anonymous-ed4id 5 жыл бұрын
still can't understand completely, but I think I got some idea... anyway, give up on understanding this... my math sucks.
@longestchain9063
@longestchain9063 6 жыл бұрын
mimblewimble!!!
@tranquoc-binh5287
@tranquoc-binh5287 8 жыл бұрын
You believe in what NSA provide? Are you nuts??? so if NSA knows the number d, then why are we using this security crypto? Thank you Martin for the great presentation. You have nailed the problem very well. I for one will not use ECC.
@martijngrooten5294
@martijngrooten5294 8 жыл бұрын
Thanks for the kind words. However, please note that I was not saying you shouldn't use ECC, just that you should avoid this particular implementation (and not just because of the NSA backdoor - it's bad for other reasons too).
@bernardoramos9409
@bernardoramos9409 5 жыл бұрын
Hi @@martijngrooten5294 , Could you inform a good and secure curve implementation? What about the secp256k1 used in Bitcoin?
@TheJackTheLion
@TheJackTheLion Ай бұрын
Who is here because of Task 3?
Elliptic Curve Back Door - Computerphile
12:24
Computerphile
Рет қаралды 519 М.
黑天使被操控了#short #angel #clown
00:40
Super Beauty team
Рет қаралды 61 МЛН
小丑女COCO的审判。#天使 #小丑 #超人不会飞
00:53
超人不会飞
Рет қаралды 16 МЛН
Elliptic curves
58:06
Imperial College London
Рет қаралды 131 М.
Cryptography: From Mathematical Magic to Secure Communication
1:08:14
Simons Institute
Рет қаралды 35 М.
How did the NSA hack our emails?
10:59
Numberphile
Рет қаралды 1,2 МЛН
Elliptic Curves - Computerphile
8:42
Computerphile
Рет қаралды 565 М.
What is... an elliptic curve?
53:28
Alvaro Lozano-Robledo
Рет қаралды 55 М.
Hashing vs Encryption Differences
19:38
Programming w/ Professor Sluiter
Рет қаралды 177 М.
Blockchain tutorial 11: Elliptic Curve key pair generation
18:58
Mobilefish.com
Рет қаралды 60 М.
Jeff Dean: AI will Reshape Chip Design - NeurIPS 2024
43:53
GradientSpills
Рет қаралды 4,6 М.
Elliptic Curve Cryptography, A very brief and superficial introduction
48:42
Elliptic Curve Cryptography Overview
11:29
F5 DevCentral
Рет қаралды 484 М.