V8d: Elliptic Curve Diffie-Hellman (ECDH) (Applied Cryptography 101)

Willkommen zu 'V8d: Elliptic Curve Diffie-Hellman (ECDH)', der vierten Vorlesung in der ECC-Serie von Alfred Menezes.

V8d: Elliptic Curve Diffie-Hellman (ECDH) (Applied Cryptography 101)
Cryptography 101
765 views โ€ข Nov 6, 2024
V8d: Elliptic Curve Diffie-Hellman (ECDH) (Applied Cryptography 101)

About this video

Welcome to "V8d: Elliptic Curve Diffie-Hellman (ECDH)," the fourth lecture in the elliptic curve cryptography (ECC) series from Alfred Menezes's "Crypto 101: Building Blocks" course. In this essential video, youโ€™ll explore the mechanics and applications of ECDH, a crucial protocol for secure key exchange in applied cryptography and widely used across TLS and secure communications. Perfect for computer science students, software engineers, mathematicians, and cybersecurity professionals, this lecture delves deep into how Diffie-Hellman key agreement works on elliptic curves.

Gain a clear understanding of the differences between unauthenticated and authenticated ECDH, along with the potential vulnerabilities such as man-in-the-middle attacks and malicious intruder-in-the-middle threats. Learn how ECDH enables forward secrecy, ensuring that session keys remain secure even if long-term keys are compromisedโ€”a vital feature in modern secure protocols.

This video is ideal for anyone seeking a state-of-the-art, free online course on elliptic curve cryptography and its real-world applications in secure data exchange. Enhance your knowledge and advance your skills in applied cryptography with this foundational ECDH lecture!

Lecture playlist:
https://www.youtube.com/playlist?list=PLA1qgQLL41SRsHMtsb4up5fTytDeHV_yJ

Course web page: https://cryptography101.ca/crypto101-building-blocks/
The slides are available on the course web page.

"Elliptic curve cryptography" chapter from "Textbook of Applied Cryptography": https://drive.google.com/file/d/1y30ccFhMI2_btwzCADyDmwSs8758tqlU/view

Other cryptography courses: https://cryptography101.ca

Slides
00:00 Introduction
00:22 Slide 329: Elliptic Curve Diffie-Hellman (ECDH)
01:55 Slide 330: Unauthenticated ECDH
04:51 Maple ECDH example
06:56 Slide 331: Malicious intruder-in-the-middle attack (MITM)
10:13 Slide 332: Authenticated ECDH
12:13 Slide 333: RSA key transport of ECDH in TLS?
15:23 Slide 334: ECDH and forward secrecy
18:52 Slide 335: The ECDH stack
20:02 Coming up

Video Information

Views

765

Likes

18

Duration

20:19

Published

Nov 6, 2024

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.