CONFidence 2014: Simplified Guide to Breaking RSA & ECDH Encryption 🔓
Discover how NSA experts approach breaking email encryption methods like RSA and ECDH in this insightful talk. Perfect for beginners wanting to understand cryptography vulnerabilities!

PROIDEA Events
2.0K views • Jun 24, 2014

About this video
This talk is meant to show the possibilities of breaking eMail encryption based on ECDH RSA.
Part I:
What is crypto?
Y = {e(x, k) | x ∈ X, k ∈ K}
a short recap of the RSA theorem (xed = x(xϕ(n))z ≡x mod n) and the Diffie Hellman sheme, DSA and how it works in practice.
Part II:
Linear algebra
Euler's totient theorem
Number theory computation
What is factoring?
Trial Division
Pollard p-1 method
Pollard roh
Lenstra's elyptic curve methode
Quadratic sive
Part III
Breaking keys using lattices
Lattices low exponents
Partial keys
Coppersmith's method
Conclusion:
So how far can a 3 letter service use that? Where are the computational limitations?
Part I:
What is crypto?
Y = {e(x, k) | x ∈ X, k ∈ K}
a short recap of the RSA theorem (xed = x(xϕ(n))z ≡x mod n) and the Diffie Hellman sheme, DSA and how it works in practice.
Part II:
Linear algebra
Euler's totient theorem
Number theory computation
What is factoring?
Trial Division
Pollard p-1 method
Pollard roh
Lenstra's elyptic curve methode
Quadratic sive
Part III
Breaking keys using lattices
Lattices low exponents
Partial keys
Coppersmith's method
Conclusion:
So how far can a 3 letter service use that? Where are the computational limitations?
Video Information
Views
2.0K
Likes
11
Duration
43:41
Published
Jun 24, 2014
User Reviews
4.0
(2) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now