Martijn Grooten - Elliptic Curve Cryptography for those who are afraid of maths

แชร์
ฝัง
  • เผยแพร่เมื่อ 9 ก.พ. 2025

ความคิดเห็น • 35

  • @mkmstillstackin
    @mkmstillstackin 6 ปีที่แล้ว +9

    I've watched a number of ecc explanation videos for math novices like myself. This is clearly one of the better ones and one I am much more able to understand. Great job. Thanks so much for sharing!

  • @wilsonbalderrama
    @wilsonbalderrama 5 ปีที่แล้ว +4

    great speaker, explaining hard concepts in a very friendly way, kudos to him!

  • @daryoushmehrtash7601
    @daryoushmehrtash7601 3 ปีที่แล้ว +2

    The Best explanation! Thanks.

  • @skdiamond
    @skdiamond 7 ปีที่แล้ว +1

    Thanks. This is excellent. I had to watch it a few times but I get your explanation. In particular I appreciate your comments on what could go wrong and concerns with NSA.

  • @robertvangeel3599
    @robertvangeel3599 หลายเดือนก่อน

    The key is at 6:46 because it's totally not obvious why that is. Why is doing "two times a complex operation on point A (so doubling A), followed once by the same operation on the resulting point B (so doubling B, which is 4 times A)" the same as doing "four times the initial complex operation on point A". Doubling A, and then doubling the result B again are 2 calculations. But four times an addition of A is four operations. That's like a rubiks cube: the order of twists is very relevant to where you end up. I mean, I have to assume these statements are correct but it is not obvious why. In fact, I think that the amount of math behind that is enormous. But exactly that is the bread&butter of this algorithm.

  • @Waldemar_la_Tendresse
    @Waldemar_la_Tendresse 3 วันที่ผ่านมา

    1:00 I love that amount of truth. 😆

  • @menesespaypa8765
    @menesespaypa8765 5 ปีที่แล้ว +3

    15:42 "there are good girls and bad girls"
    Of course

  • @jamesinonati7608
    @jamesinonati7608 6 ปีที่แล้ว +3

    I like the speaker, and good explanation.

  • @SmrutiDashiamironman
    @SmrutiDashiamironman 4 ปีที่แล้ว +2

    Great explanation.

  • @AnandKumar-zn3ox
    @AnandKumar-zn3ox 6 ปีที่แล้ว +3

    explained it so well ...
    thank you for this persentation

  • @Prashantkrdey
    @Prashantkrdey 7 ปีที่แล้ว

    I believe that we should avoid the particular curve which is standard by NIST due to a possible backdoor. But then again how secure are the other curves? Moreover, since there has been questions even on SHA-256, then possibly the bitcoin is in risk.

  • @PamirTea
    @PamirTea 7 ปีที่แล้ว +1

    Great talk, thank you.

  • @brendawilliams8062
    @brendawilliams8062 3 ปีที่แล้ว +1

    Nice. Thx

  • @luizalmeida1209
    @luizalmeida1209 3 ปีที่แล้ว +1

    Thanks, awesome talk! :)

    • @Waldemar_la_Tendresse
      @Waldemar_la_Tendresse 3 วันที่ผ่านมา +1

      Sometimes a tiny bit too complicated in it's explanations, but all in all true.

  • @lapetiteanessesoap7559
    @lapetiteanessesoap7559 ปีที่แล้ว

    so clearly

  • @andrdrcks8368
    @andrdrcks8368 6 ปีที่แล้ว +1

    I understand the spirit of the presentation; but, looks like some confusion between bits and bytes.

  • @vksingh1231
    @vksingh1231 7 ปีที่แล้ว +1

    Nice book: Rational points on Elliptic curve, Springer 00:36

  • @emmanuelbyrd3389
    @emmanuelbyrd3389 7 ปีที่แล้ว

    Can someone explain me or give more detail on what he says at 20:59 ??

    • @ShokoDemon
      @ShokoDemon 7 ปีที่แล้ว

      what don't you understand ? it's actually the basic way how random numbers are generated using an EC.
      thinking about vector * scala, where the vector is your random bytes array from /dev/random, and the point is an on the curve; even if your random bytes aren't random (assuming they aren't due to NSA shindig) the scala multiplication of your random bytes vector with the point will generate a better random point from the curve since multiplying a point on an EC curve makes it jump around in a seemingly /random/ manner. reversing this is /very/ costly for a CPU, or even a CPU cluster the size of several stadiums.

  • @prakashharionutube
    @prakashharionutube 7 ปีที่แล้ว

    Superb Man.... Superb!!!

  • @Waldemar_la_Tendresse
    @Waldemar_la_Tendresse 3 วันที่ผ่านมา

    11:53 Math can be so sexy. 🤣

  • @jeanFMoise
    @jeanFMoise 5 ปีที่แล้ว

    Great decoder

  • @frutiboy1
    @frutiboy1 8 ปีที่แล้ว +2

    "I don't think there is a secret formula for this large number that appears in the standard without explanation." is a pretty useless way of thinking about it.

  • @suhaibkhan4956
    @suhaibkhan4956 5 ปีที่แล้ว

    in ECC , a point on curve is shared between two bodies. How is the message lets say "hello" is encrypted and decrypted using ECC?

  • @vksingh1231
    @vksingh1231 7 ปีที่แล้ว

    wireshark demo: 14:15

  • @JohnSmith-bx4gf
    @JohnSmith-bx4gf 7 ปีที่แล้ว +2

    I watch this to treat insomnia

  • @vksingh1231
    @vksingh1231 7 ปีที่แล้ว

    Loop in curve 16:07

  • @TheJackTheLion
    @TheJackTheLion 2 หลายเดือนก่อน

    Who is here because of Task 3?

  • @Anonymous-ed4id
    @Anonymous-ed4id 5 ปีที่แล้ว

    still can't understand completely, but I think I got some idea... anyway, give up on understanding this... my math sucks.

  • @tranquoc-binh5287
    @tranquoc-binh5287 8 ปีที่แล้ว +1

    You believe in what NSA provide? Are you nuts???
    so if NSA knows the number d, then why are we using this security crypto?
    Thank you Martin for the great presentation. You have nailed the problem very well.
    I for one will not use ECC.

    • @martijngrooten5294
      @martijngrooten5294 8 ปีที่แล้ว +9

      Thanks for the kind words. However, please note that I was not saying you shouldn't use ECC, just that you should avoid this particular implementation (and not just because of the NSA backdoor - it's bad for other reasons too).

    • @bernardoramos9409
      @bernardoramos9409 5 ปีที่แล้ว

      Hi @@martijngrooten5294 , Could you inform a good and secure curve implementation? What about the secp256k1 used in Bitcoin?

  • @longestchain9063
    @longestchain9063 6 ปีที่แล้ว +1

    mimblewimble!!!