CONFidence 2014: Simplified Guide to Breaking RSA & ECDH Encryption 🔓
Discover how NSA experts approach breaking email encryption methods like RSA and ECDH in this insightful talk. Perfect for beginners wanting to understand cryptography vulnerabilities!
About this video
This talk is meant to show the possibilities of breaking eMail encryption based on ECDH RSA.
Part I:
What is crypto?
Y = {e(x, k) | x ∈ X, k ∈ K}
a short recap of the RSA theorem (xed = x(xϕ(n))z ≡x mod n) and the Diffie Hellman sheme, DSA and how it works in practice.
Part II:
Linear algebra
Euler's totient theorem
Number theory computation
What is factoring?
Trial Division
Pollard p-1 method
Pollard roh
Lenstra's elyptic curve methode
Quadratic sive
Part III
Breaking keys using lattices
Lattices low exponents
Partial keys
Coppersmith's method
Conclusion:
So how far can a 3 letter service use that? Where are the computational limitations?
4.0
2 user reviews
Write a Review
User Reviews
0 reviewsBe the first to comment...
Video Information
Views
2.0K
Total views since publication
Likes
11
User likes and reactions
Duration
43:41
Video length
Published
Jun 24, 2014
Release date
Quality
hd
Video definition
About the Channel
Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Spain under the topic 'g'.
Share This Video
SOCIAL SHAREShare this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!