I've watched a number of ecc explanation videos for math novices like myself. This is clearly one of the better ones and one I am much more able to understand. Great job. Thanks so much for sharing!
@wilsonbalderrama5 жыл бұрын
great speaker, explaining hard concepts in a very friendly way, kudos to him!
@robertvangeel3599Ай бұрын
The key is at 6:46 because it's totally not obvious why that is. Why is doing "two times a complex operation on point A (so doubling A), followed once by the same operation on the resulting point B (so doubling B, which is 4 times A)" the same as doing "four times the initial complex operation on point A". Doubling A, and then doubling the result B again are 2 calculations. But four times an addition of A is four operations. That's like a rubiks cube: the order of twists is very relevant to where you end up. I mean, I have to assume these statements are correct but it is not obvious why. In fact, I think that the amount of math behind that is enormous. But exactly that is the bread&butter of this algorithm.
@daryoushmehrtash76013 жыл бұрын
The Best explanation! Thanks.
@skdiamond7 жыл бұрын
Thanks. This is excellent. I had to watch it a few times but I get your explanation. In particular I appreciate your comments on what could go wrong and concerns with NSA.
@jamesinonati76086 жыл бұрын
I like the speaker, and good explanation.
@SmrutiDashiamironman4 жыл бұрын
Great explanation.
@menesespaypa87655 жыл бұрын
15:42 "there are good girls and bad girls" Of course
@emmanuelbyrd33897 жыл бұрын
Can someone explain me or give more detail on what he says at 20:59 ??
@ShokoDemon7 жыл бұрын
what don't you understand ? it's actually the basic way how random numbers are generated using an EC. thinking about vector * scala, where the vector is your random bytes array from /dev/random, and the point is an on the curve; even if your random bytes aren't random (assuming they aren't due to NSA shindig) the scala multiplication of your random bytes vector with the point will generate a better random point from the curve since multiplying a point on an EC curve makes it jump around in a seemingly /random/ manner. reversing this is /very/ costly for a CPU, or even a CPU cluster the size of several stadiums.
@AnandKumar-zn3ox6 жыл бұрын
explained it so well ... thank you for this persentation
@luizalmeida12093 жыл бұрын
Thanks, awesome talk! :)
@Prashantkrdey7 жыл бұрын
I believe that we should avoid the particular curve which is standard by NIST due to a possible backdoor. But then again how secure are the other curves? Moreover, since there has been questions even on SHA-256, then possibly the bitcoin is in risk.
@brendawilliams80623 жыл бұрын
Nice. Thx
@PamirTea7 жыл бұрын
Great talk, thank you.
@prakashharionutube7 жыл бұрын
Superb Man.... Superb!!!
@andrdrcks83686 жыл бұрын
I understand the spirit of the presentation; but, looks like some confusion between bits and bytes.
@jeanFMoise5 жыл бұрын
Great decoder
@vksingh12317 жыл бұрын
wireshark demo: 14:15
@lapetiteanessesoap7559 Жыл бұрын
so clearly
@suhaibkhan49565 жыл бұрын
in ECC , a point on curve is shared between two bodies. How is the message lets say "hello" is encrypted and decrypted using ECC?
@frutiboy18 жыл бұрын
"I don't think there is a secret formula for this large number that appears in the standard without explanation." is a pretty useless way of thinking about it.
@vksingh12317 жыл бұрын
Nice book: Rational points on Elliptic curve, Springer 00:36
@vksingh12317 жыл бұрын
Loop in curve 16:07
@JohnSmith-bx4gf7 жыл бұрын
I watch this to treat insomnia
@Anonymous-ed4id5 жыл бұрын
still can't understand completely, but I think I got some idea... anyway, give up on understanding this... my math sucks.
@longestchain90636 жыл бұрын
mimblewimble!!!
@tranquoc-binh52878 жыл бұрын
You believe in what NSA provide? Are you nuts??? so if NSA knows the number d, then why are we using this security crypto? Thank you Martin for the great presentation. You have nailed the problem very well. I for one will not use ECC.
@martijngrooten52948 жыл бұрын
Thanks for the kind words. However, please note that I was not saying you shouldn't use ECC, just that you should avoid this particular implementation (and not just because of the NSA backdoor - it's bad for other reasons too).
@bernardoramos94095 жыл бұрын
Hi @@martijngrooten5294 , Could you inform a good and secure curve implementation? What about the secp256k1 used in Bitcoin?