CONFidence 2014: Simplified Guide to Breaking RSA & ECDH Encryption 🔓

Discover how NSA experts approach breaking email encryption methods like RSA and ECDH in this insightful talk. Perfect for beginners wanting to understand cryptography vulnerabilities!

PROIDEA Events2.0K views43:41

About this video

This talk is meant to show the possibilities of breaking eMail encryption based on ECDH RSA. Part I: What is crypto? Y = {e(x, k) | x ∈ X, k ∈ K} a short recap of the RSA theorem (xed = x(xϕ(n))z ≡x mod n) and the Diffie Hellman sheme, DSA and how it works in practice. Part II: Linear algebra Euler's totient theorem Number theory computation What is factoring? Trial Division Pollard p-1 method Pollard roh Lenstra's elyptic curve methode Quadratic sive Part III Breaking keys using lattices Lattices low exponents Partial keys Coppersmith's method Conclusion: So how far can a 3 letter service use that? Where are the computational limitations?
4.0

2 user reviews

Write a Review

0/1000 characters

User Reviews

0 reviews

Be the first to comment...

Video Information

Views
2.0K

Total views since publication

Likes
11

User likes and reactions

Duration
43:41

Video length

Published
Jun 24, 2014

Release date

Quality
hd

Video definition

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Spain under the topic 'g'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!