Great job. Thank you for the primer on elliptic curve cryptography. When you mentioned vulnerabilities of the DH key exchange, I was expecting you to mention the vulnerabilities of a MiTM attack where an attacker intercepts and throws away the shared values and passes along it's own made up values to each recipient. I wasn't aware of an attack vector that uses algorithms to make crunching the key easier. I'll have to look into that.
Great lecture
Great presentation
Great job. Thank you for the primer on elliptic curve cryptography. When you mentioned vulnerabilities of the DH key exchange, I was expecting you to mention the vulnerabilities of a MiTM attack where an attacker intercepts and throws away the shared values and passes along it's own made up values to each recipient. I wasn't aware of an attack vector that uses algorithms to make crunching the key easier. I'll have to look into that.
what about the immutability of the elliptic curve used for BTC ? Is there a trap door ?
Steven Kifer 7draft aduuuuuh:yhi6y0.vo(drag
Loadracing
Steven Kifer
Is that a dot product?