CONFidence 2014: Simplified Guide to Breaking RSA & ECDH Encryption 🔓

Discover how NSA experts approach breaking email encryption methods like RSA and ECDH in this insightful talk. Perfect for beginners wanting to understand cryptography vulnerabilities!

CONFidence 2014: Simplified Guide to Breaking RSA & ECDH Encryption 🔓
PROIDEA Events
2.0K views • Jun 24, 2014
CONFidence 2014: Simplified Guide to Breaking RSA & ECDH Encryption 🔓

About this video

This talk is meant to show the possibilities of breaking eMail encryption based on ECDH RSA.

Part I:

What is crypto?
Y = {e(x, k) | x ∈ X, k ∈ K}
a short recap of the RSA theorem (xed = x(xϕ(n))z ≡x mod n) and the Diffie Hellman sheme, DSA and how it works in practice.
Part II:

Linear algebra
Euler's totient theorem
Number theory computation
What is factoring?
Trial Division
Pollard p-1 method
Pollard roh
Lenstra's elyptic curve methode
Quadratic sive
Part III

Breaking keys using lattices
Lattices low exponents
Partial keys
Coppersmith's method
Conclusion:

So how far can a 3 letter service use that? Where are the computational limitations?

Video Information

Views

2.0K

Likes

11

Duration

43:41

Published

Jun 24, 2014

User Reviews

4.0
(2)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.