V8d: Elliptic Curve Diffie-Hellman (ECDH) (Applied Cryptography 101)
Willkommen zu 'V8d: Elliptic Curve Diffie-Hellman (ECDH)', der vierten Vorlesung in der ECC-Serie von Alfred Menezes.
About this video
Welcome to "V8d: Elliptic Curve Diffie-Hellman (ECDH)," the fourth lecture in the elliptic curve cryptography (ECC) series from Alfred Menezes's "Crypto 101: Building Blocks" course. In this essential video, you’ll explore the mechanics and applications of ECDH, a crucial protocol for secure key exchange in applied cryptography and widely used across TLS and secure communications. Perfect for computer science students, software engineers, mathematicians, and cybersecurity professionals, this lecture delves deep into how Diffie-Hellman key agreement works on elliptic curves.
Gain a clear understanding of the differences between unauthenticated and authenticated ECDH, along with the potential vulnerabilities such as man-in-the-middle attacks and malicious intruder-in-the-middle threats. Learn how ECDH enables forward secrecy, ensuring that session keys remain secure even if long-term keys are compromised—a vital feature in modern secure protocols.
This video is ideal for anyone seeking a state-of-the-art, free online course on elliptic curve cryptography and its real-world applications in secure data exchange. Enhance your knowledge and advance your skills in applied cryptography with this foundational ECDH lecture!
Lecture playlist:
https://www.youtube.com/playlist?list=PLA1qgQLL41SRsHMtsb4up5fTytDeHV_yJ
Course web page: https://cryptography101.ca/crypto101-building-blocks/
The slides are available on the course web page.
"Elliptic curve cryptography" chapter from "Textbook of Applied Cryptography": https://drive.google.com/file/d/1y30ccFhMI2_btwzCADyDmwSs8758tqlU/view
Other cryptography courses: https://cryptography101.ca
Slides
00:00 Introduction
00:22 Slide 329: Elliptic Curve Diffie-Hellman (ECDH)
01:55 Slide 330: Unauthenticated ECDH
04:51 Maple ECDH example
06:56 Slide 331: Malicious intruder-in-the-middle attack (MITM)
10:13 Slide 332: Authenticated ECDH
12:13 Slide 333: RSA key transport of ECDH in TLS?
15:23 Slide 334: ECDH and forward secrecy
18:52 Slide 335: The ECDH stack
20:02 Coming up
Video Information
Views
765
Total views since publication
Likes
18
User likes and reactions
Duration
20:19
Video length
Published
Nov 6, 2024
Release date
Quality
hd
Video definition
About the Channel
Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Morocco under the topic 'météo demain'.
Share This Video
SOCIAL SHAREShare this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!