V8d: Elliptic Curve Diffie-Hellman (ECDH) (Applied Cryptography 101)

Willkommen zu 'V8d: Elliptic Curve Diffie-Hellman (ECDH)', der vierten Vorlesung in der ECC-Serie von Alfred Menezes.

Cryptography 101765 views20:19

About this video

Welcome to "V8d: Elliptic Curve Diffie-Hellman (ECDH)," the fourth lecture in the elliptic curve cryptography (ECC) series from Alfred Menezes's "Crypto 101: Building Blocks" course. In this essential video, you’ll explore the mechanics and applications of ECDH, a crucial protocol for secure key exchange in applied cryptography and widely used across TLS and secure communications. Perfect for computer science students, software engineers, mathematicians, and cybersecurity professionals, this lecture delves deep into how Diffie-Hellman key agreement works on elliptic curves. Gain a clear understanding of the differences between unauthenticated and authenticated ECDH, along with the potential vulnerabilities such as man-in-the-middle attacks and malicious intruder-in-the-middle threats. Learn how ECDH enables forward secrecy, ensuring that session keys remain secure even if long-term keys are compromised—a vital feature in modern secure protocols. This video is ideal for anyone seeking a state-of-the-art, free online course on elliptic curve cryptography and its real-world applications in secure data exchange. Enhance your knowledge and advance your skills in applied cryptography with this foundational ECDH lecture! Lecture playlist: https://www.youtube.com/playlist?list=PLA1qgQLL41SRsHMtsb4up5fTytDeHV_yJ Course web page: https://cryptography101.ca/crypto101-building-blocks/ The slides are available on the course web page. "Elliptic curve cryptography" chapter from "Textbook of Applied Cryptography": https://drive.google.com/file/d/1y30ccFhMI2_btwzCADyDmwSs8758tqlU/view Other cryptography courses: https://cryptography101.ca Slides 00:00 Introduction 00:22 Slide 329: Elliptic Curve Diffie-Hellman (ECDH) 01:55 Slide 330: Unauthenticated ECDH 04:51 Maple ECDH example 06:56 Slide 331: Malicious intruder-in-the-middle attack (MITM) 10:13 Slide 332: Authenticated ECDH 12:13 Slide 333: RSA key transport of ECDH in TLS? 15:23 Slide 334: ECDH and forward secrecy 18:52 Slide 335: The ECDH stack 20:02 Coming up

Video Information

Views
765

Total views since publication

Likes
18

User likes and reactions

Duration
20:19

Video length

Published
Nov 6, 2024

Release date

Quality
hd

Video definition

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Morocco under the topic 'météo demain'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!