Главная
Study mode:
on
1
Intro
2
Why We Need Encryption
3
Modern Encryption
4
Asymmetric Encryption
5
Behind the Trapdoor
6
RSA is one of these
7
This is a good trapdoor...
8
but is it good enough?
9
Have no fear, ECC is here
10
An Elliptic Curve
11
Interesting Properties
12
A New Trapdoor
13
Key Generation
14
Example: Diffie-Hellman 2.0
15
Common Implementation
16
The Downsides
17
NIST Incident
18
The Benefits
19
The End
Description:
Explore the cutting-edge world of Elliptic Curve Cryptography (ECC) in this informative 28-minute talk by Nick Gonella, an officer of White Hat Cal Poly. Delve into the machinery behind this revolutionary encryption method that's transforming the cryptography landscape. Discover why encryption is necessary, learn about modern encryption techniques, and understand the concept of asymmetric encryption. Examine the principles of trapdoor functions and their role in cryptography, with a focus on RSA and its limitations. Uncover the advantages of ECC, including its unique properties and implementation as a new trapdoor function. Gain insights into key generation processes and the improved Diffie-Hellman protocol. Analyze common ECC implementations, potential downsides, and the NIST incident. Conclude by weighing the significant benefits of this innovative cryptographic approach.

Elliptic Curve Cryptography - Nick Gonella

White Hat Cal Poly
Add to list