Elliptic Curve Cryptography Explained in Under 5 Minutes ๐
Discover the essentials of ECC, the cutting-edge cryptography method that offers top security in a quick and easy-to-understand video. Perfect for beginners!

Practical Networking
23.8K views โข Oct 21, 2024

About this video
ECC, or Elliptic Curve Cryptography, is the most secure and modern way of doing Cryptography. But what is it really? What are the most important parts of understanding ECC? In this video, we give you the framework for seeing that ECC is really not all that different from the Cryptography you might already be familiar with.
// CHAPTERS
0:00 - Intro
0:25 - Review of Asymmetric Cryptography
1:03 - What is an Elliptic Curve?
1:45 - Points on a Curve as values in Math formulas
2:09 - RSA, DSA, and DH
3:02 - ECRSA, ECDSA, and ECDH
3:27 - ECC is more secure, and require smaller keys
3:58 - Outro / Summary
// FULL SERIES - Cryptography Essentials //
This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply, and technically accurate.
The full series is available here:
๐ https://www.youtube.com/playlist?list=PLIFyRwBY_4bQvq5PuJASilkHSVGLZtceZ
( or use the shortcut pracnet.net/ce )
00 Series Introduction
01 Hashing
02 Keys / Secret Keys
03 Symmetric Cryptography
04 Encryption
05 MAC / HMAC
06 Pseudo Random Function
07 Asymmetric Cryptography
08 Asymmetric Encryption (RSA)
09 Signatures
10 RSA Signatures
11 DSA Signatures
12 Key Exchanges
13 RSA Key Exchanges
14 DH Key Exchanges
15 Elliptic Curve Cryptography
// ADDITIONAL RESOURCES //
Asymmetric Cryptography:
https://www.youtube.com/watch?v=QToJvh7M62o
Practical TLS - free lessons:
https://www.youtube.com/playlist?list=PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY
Practical TLS - full course:
https://pracnet.net/tls
// SUPPORT PRACTICAL NETWORKING //
If this content benefited you, then here are TOTALLY FREE ways to show your appreciation:
- ๐ Like to help this video reach more viewers
- ๐ฌ Comment to boost the channel's visibility
- ๐ Subscribe to help me attract sponsors (this is the number they care about)
// CHAPTERS
0:00 - Intro
0:25 - Review of Asymmetric Cryptography
1:03 - What is an Elliptic Curve?
1:45 - Points on a Curve as values in Math formulas
2:09 - RSA, DSA, and DH
3:02 - ECRSA, ECDSA, and ECDH
3:27 - ECC is more secure, and require smaller keys
3:58 - Outro / Summary
// FULL SERIES - Cryptography Essentials //
This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply, and technically accurate.
The full series is available here:
๐ https://www.youtube.com/playlist?list=PLIFyRwBY_4bQvq5PuJASilkHSVGLZtceZ
( or use the shortcut pracnet.net/ce )
00 Series Introduction
01 Hashing
02 Keys / Secret Keys
03 Symmetric Cryptography
04 Encryption
05 MAC / HMAC
06 Pseudo Random Function
07 Asymmetric Cryptography
08 Asymmetric Encryption (RSA)
09 Signatures
10 RSA Signatures
11 DSA Signatures
12 Key Exchanges
13 RSA Key Exchanges
14 DH Key Exchanges
15 Elliptic Curve Cryptography
// ADDITIONAL RESOURCES //
Asymmetric Cryptography:
https://www.youtube.com/watch?v=QToJvh7M62o
Practical TLS - free lessons:
https://www.youtube.com/playlist?list=PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY
Practical TLS - full course:
https://pracnet.net/tls
// SUPPORT PRACTICAL NETWORKING //
If this content benefited you, then here are TOTALLY FREE ways to show your appreciation:
- ๐ Like to help this video reach more viewers
- ๐ฌ Comment to boost the channel's visibility
- ๐ Subscribe to help me attract sponsors (this is the number they care about)
Video Information
Views
23.8K
Likes
631
Duration
4:44
Published
Oct 21, 2024
User Reviews
4.6
(4) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.