Martijn Grooten - Elliptic Curve Cryptography for those who are afraid of maths

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 ก.ค. 2024
  • Elliptic Curve Cryptography (ECC) is hot. Far better scalable than traditional encryption, more and more data and networks are being protected using ECC. Not many people know the gory details of ECC though, which given its increasing prevalence is a very bad thing. In this presentation I will turn all members of the audience into ECC experts who will be able to implement the relevant algorithms and also audit existing implementations to find weaknesses or backdoors. Actually, I won't. To fully understand ECC to a point where you could use it in practice, you would need to spend years inside university lecture rooms to study number theory, geometry and software engineering. And then you can probably still be fooled by a backdoored implementation. What I will do, however, is explain the basics of ECC. I'll skip over the gory maths (it will help if you can add up, but that's about the extent of it) and explain how this funny thing referred to as "point addition on curves" can be used to exchange a secret code between two entities over a public connection. I will also explain how the infamous backdoor in Dual_EC_DRGB (a random number generator that uses the same kind of maths) worked. At the end of the presentation, you'll still not be able to find such backdoors yourselves and you probably realise you never will. But you will be able to understand articles about ECC a little better. And, hopefully, you will be convinced it is important that we educate more people to become ECC-experts.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 29

  • @mkmstillstackin
    @mkmstillstackin 5 ปีที่แล้ว +8

    I've watched a number of ecc explanation videos for math novices like myself. This is clearly one of the better ones and one I am much more able to understand. Great job. Thanks so much for sharing!

  • @wilsonbalderrama
    @wilsonbalderrama 5 ปีที่แล้ว +4

    great speaker, explaining hard concepts in a very friendly way, kudos to him!

  • @skdiamond
    @skdiamond 7 ปีที่แล้ว +1

    Thanks. This is excellent. I had to watch it a few times but I get your explanation. In particular I appreciate your comments on what could go wrong and concerns with NSA.

  • @daryoushmehrtash7601
    @daryoushmehrtash7601 2 ปีที่แล้ว +2

    The Best explanation! Thanks.

  • @jamesinonati7608
    @jamesinonati7608 5 ปีที่แล้ว +3

    I like the speaker, and good explanation.

  • @PamirTea
    @PamirTea 6 ปีที่แล้ว +1

    Great talk, thank you.

  • @AnandKumar-zn3ox
    @AnandKumar-zn3ox 5 ปีที่แล้ว +3

    explained it so well ...
    thank you for this persentation

  • @SmrutiDashiamironman
    @SmrutiDashiamironman 3 ปีที่แล้ว +2

    Great explanation.

  • @prakashharionutube
    @prakashharionutube 6 ปีที่แล้ว

    Superb Man.... Superb!!!

  • @luizalmeida1209
    @luizalmeida1209 3 ปีที่แล้ว +1

    Thanks, awesome talk! :)

  • @Prashantkrdey
    @Prashantkrdey 6 ปีที่แล้ว

    I believe that we should avoid the particular curve which is standard by NIST due to a possible backdoor. But then again how secure are the other curves? Moreover, since there has been questions even on SHA-256, then possibly the bitcoin is in risk.

  • @jeanFMoise
    @jeanFMoise 5 ปีที่แล้ว

    Great decoder

  • @menesespaypa8765
    @menesespaypa8765 4 ปีที่แล้ว +3

    15:42 "there are good girls and bad girls"
    Of course

  • @brendawilliams8062
    @brendawilliams8062 2 ปีที่แล้ว +1

    Nice. Thx

  • @lapetiteanessesoap7559
    @lapetiteanessesoap7559 11 หลายเดือนก่อน

    so clearly

  • @emmanuelbyrd3389
    @emmanuelbyrd3389 7 ปีที่แล้ว

    Can someone explain me or give more detail on what he says at 20:59 ??

    • @ShokoDemon
      @ShokoDemon 7 ปีที่แล้ว

      what don't you understand ? it's actually the basic way how random numbers are generated using an EC.
      thinking about vector * scala, where the vector is your random bytes array from /dev/random, and the point is an on the curve; even if your random bytes aren't random (assuming they aren't due to NSA shindig) the scala multiplication of your random bytes vector with the point will generate a better random point from the curve since multiplying a point on an EC curve makes it jump around in a seemingly /random/ manner. reversing this is /very/ costly for a CPU, or even a CPU cluster the size of several stadiums.

  • @andrdrcks8368
    @andrdrcks8368 5 ปีที่แล้ว +1

    I understand the spirit of the presentation; but, looks like some confusion between bits and bytes.

  • @frutiboy1
    @frutiboy1 8 ปีที่แล้ว +2

    "I don't think there is a secret formula for this large number that appears in the standard without explanation." is a pretty useless way of thinking about it.

  • @vksingh1231
    @vksingh1231 7 ปีที่แล้ว

    Nice book: Rational points on Elliptic curve, Springer 00:36

  • @longestchain9063
    @longestchain9063 5 ปีที่แล้ว +1

    mimblewimble!!!

  • @suhaibkhan4956
    @suhaibkhan4956 5 ปีที่แล้ว

    in ECC , a point on curve is shared between two bodies. How is the message lets say "hello" is encrypted and decrypted using ECC?

  • @JohnSmith-bx4gf
    @JohnSmith-bx4gf 6 ปีที่แล้ว +2

    I watch this to treat insomnia

  • @Anonymous-ed4id
    @Anonymous-ed4id 5 ปีที่แล้ว

    still can't understand completely, but I think I got some idea... anyway, give up on understanding this... my math sucks.

  • @vksingh1231
    @vksingh1231 7 ปีที่แล้ว

    wireshark demo: 14:15

  • @vksingh1231
    @vksingh1231 7 ปีที่แล้ว

    Loop in curve 16:07

  • @tranquoc-binh5287
    @tranquoc-binh5287 7 ปีที่แล้ว +1

    You believe in what NSA provide? Are you nuts???
    so if NSA knows the number d, then why are we using this security crypto?
    Thank you Martin for the great presentation. You have nailed the problem very well.
    I for one will not use ECC.

    • @martijngrooten5294
      @martijngrooten5294 7 ปีที่แล้ว +9

      Thanks for the kind words. However, please note that I was not saying you shouldn't use ECC, just that you should avoid this particular implementation (and not just because of the NSA backdoor - it's bad for other reasons too).

    • @bernardoramos9409
      @bernardoramos9409 4 ปีที่แล้ว

      Hi @@martijngrooten5294 , Could you inform a good and secure curve implementation? What about the secp256k1 used in Bitcoin?