CryptoClear
CryptoClear
  • Видео 5
  • Просмотров 115 256
Security with Discrete Logarithms (and How to Break It)
A high-level overview of the Number Field Sieve approach used in the Logjam attack described in the "Imperfect Forward Secrecy" paper by Adrian et al., CCS 2015.
We dive into Discrete Logarithms, why it is supposed to be a tough problem, and how the common practice of reusing the same finite fields to avoid weakening the security of Diffie-Hellman key exchange actually results in weakening the security of Diffie-Hellman key exchange.
Continue learning:
- The paper and more material: weakdh.org
- Some criticism: nohats.ca/wordpress/blog/2015/10/17/66-of-vpns-are-not-in-fact-broken/
- Math is Fun has a great introduction to properties of logarithms: www.mathsisfun.com/algebra/logarithms.html
- Fi...
Просмотров: 1 540

Видео

Finite Fields in Cryptography: Why and How
Просмотров 29 тыс.4 года назад
Learn about a practical motivation for using finite fields in cryptography, the boring definition, a slightly more fun example with monsters, and how to create fields out of some sets of integers. Links mentioned in the video: Learn more about floating points: floating-point-gui.de Learn more about the etymology of words in mathematics: jeff560.tripod.com/f.html Learn more about proving that gr...
Basics of Secure Multiparty Computation
Просмотров 23 тыс.6 лет назад
A detailed yet simple introduction to Secure multiparty computation using Shamir's secret sharing scheme. Note: At 08:27 there is an incorrect mention of "degree 3" instead of "degree 2". It's just to keep you alert.
Shamir's Secret Sharing - Solution and alternative to Lagrange
Просмотров 11 тыс.6 лет назад
Following up on ruclips.net/video/kkMps3X_tEE/видео.html this video contains the solution to the exercise in that video and introduces variable elimination as an alternative for Lagrange interpolation to determine the polynomial through the shares of the secret.
Simple introduction to Shamir's Secret Sharing and Lagrange interpolation
Просмотров 51 тыс.8 лет назад
A presentation part of the cryptography course at Chalmers University, 2015. Starting with simple examples, we introduce Shamir's Secret Sharing Scheme and how Lagrange interpolation fits in. I may have misspoken at some points, but that's to keep you alert :) Solution and follow up in ruclips.net/video/rWPZoz0aux4/видео.html

Комментарии

  • @goldride3000
    @goldride3000 Месяц назад

    That’s the clear visual explanation I was looking for. Thank you!!!

  • @0xjuaan
    @0xjuaan 6 месяцев назад

    All the explanations in this video are just perfect. Thanks for this!

  • @Shubham23PFocus
    @Shubham23PFocus 7 месяцев назад

    great vide man , no one on youtube has explained in this depth

  • @guzh
    @guzh 8 месяцев назад

    I thought boo was the monster...

  • @davilim4
    @davilim4 8 месяцев назад

    Excellent explanation. Thank you

  • @MdMamunurRashidAkand1
    @MdMamunurRashidAkand1 10 месяцев назад

    12:41 isn’t prime factorization itself considered a hard problem? do we assume that factorization of h is easy?

  • @teewenhui2717
    @teewenhui2717 10 месяцев назад

    i love the 2nd half with the island example, its so cute and intuitive

  • @codegeek98
    @codegeek98 Год назад

    Definitely interested in the prime power fields. It's impossible to find any online explainer for them that's "accessible" to mortals - people with less than graduate-level math background - I say this as a "mortal" myself... 😭

  • @paologat
    @paologat Год назад

    Nitpick: additive and multiplicative identities need not be distinct, as shown by the existence of the trivial field {0}. Exercise for the reader: prove that the two identities are indeed distinct for all other (nontrivial) fields.

  • @azagogh
    @azagogh Год назад

    YES! I love the example of the creatures, and how elements can be anything,.

  • @bangvu2127
    @bangvu2127 Год назад

    Thanks for the very short but sharp explanation. My prof explained this in 2 lectures and I still didn't understand a thing hahahaha

  • @lherfel
    @lherfel Год назад

    thanks

  • @lherfel
    @lherfel Год назад

    thanks

  • @fjloma
    @fjloma Год назад

    Top quality videos

  • @murilo-r3y
    @murilo-r3y Год назад

    Excellent video! But how to get around when (i - j) has no inverse when working on finite fields?

  • @josephballesteros6698
    @josephballesteros6698 Год назад

    This was very helpful! The use of the delta functions helped clear up some of my confusions, and it made the formula easier to remember. Thanks!

  • @dadadaPhl
    @dadadaPhl Год назад

    thank you for the very nice video but it's very hard focus for me because of the annoying background music.

  • @harirao12345
    @harirao12345 Год назад

    Awesome!!!

  • @MrRyzale
    @MrRyzale Год назад

    I still don't understand

  • @savimcgee7443
    @savimcgee7443 Год назад

    Oh my God... I get it. I understand!

    • @savimcgee7443
      @savimcgee7443 Год назад

      5 videos posted: 1.22k subscribers. Well done.

  • @devsingh1429
    @devsingh1429 Год назад

    Thank you 🙏

  • @paulperegud6000
    @paulperegud6000 2 года назад

    Amazing introduction! Thank you!

  • @chaoyin1263
    @chaoyin1263 2 года назад

    Fantastic!

  • @nahiyanalamgir7056
    @nahiyanalamgir7056 2 года назад

    12:16 You meant x - 12, and not x-13, right?

  • @2NormalHuman
    @2NormalHuman 2 года назад

    really good explanation, thank you for spending your time to make this

  • @shrugalic
    @shrugalic 2 года назад

    Did anyone try to solve the exercise (find f(0) for points f(3) = 2, f(4) = 1, f(5) = 2) in a GF(2^8) field? I got 108 and wonder if that's correct. ;)

  • @oviaseshadri6120
    @oviaseshadri6120 2 года назад

    I found this video extremely entertaining! thank you so much for your content :)

  • @serophots7589
    @serophots7589 2 года назад

    Incredibly helpful approach to the problem

  • @muslimmurtazaliyev2942
    @muslimmurtazaliyev2942 2 года назад

    Thank you for this!!!

  • @ahmedelmallah2390
    @ahmedelmallah2390 2 года назад

    Such a nice explanation man. Thanks 🙏🏻

  • @dfkjbdfondfngg
    @dfkjbdfondfngg 2 года назад

    Thank you!

  • @leesweets4110
    @leesweets4110 2 года назад

    How do you ensure that the secret shares are integer pairs? Or do you? Obviously a share constitutes an (x,y) coordinate pair on an arbitrary polynomial curve. Im just curious how many decimal values are required and how secrets are expressed for digital storage. Should I assume that the secret is expressed as an integer and so too are the shares? Introducing new members n to the scheme and giving them their own share is done easily enough, but how do you extend the number k of required shareholders to unlock the secret, for a scheme thats already in the field? Since any k-members can agree to bring new shareholders into the mix, why do we call it a (k,n) scheme and not just a k-scheme? The n seems to be meaningless to the mathematics since it is arbitrarily extendible at any time by any k of the members. Does the sharing algorithm extend well to surfaces in 3D space, or do we only ever talk about 2D curves? Im wondering if there is a practical value in this extension.

    • @CryptoClear
      @CryptoClear 2 года назад

      Great questions! 1) The video is mostly on the mathematical concept and theory, in practice you would indeed only use integers (for secret, secret parameters and the shares) by using a finite field rater than real numbers (see my other video on the topic of finite fields -- ruclips.net/video/ColSUxhpn6A/видео.html). 2) I do not believe it is possible to increase "k" after you have already released k shares. The first k participants will be able to reconstruct the secret. You could lower "k" if the number of shares given out ("p") is strictly less than k, to any number k' between p and k. You'd do this taking the p shares already shared, generating more shares to get a total of k'-1 shares (these you can keep private), and then add the secret at f(0) to these, making a total of k' shares. You then compute the polynomial that goes through these k' points exactly and replace the old polynomial with this new one. 3) I think you are right that it is mostly k that is the true parameter here. Perhaps the name reflects some envisioned use case where both k and n are static. E.g. a country has 5 military leaders, at least 3 of them have to agree to reveal the nuclear launch codes. When using finite fields, there is the technical constraint that "n" must be smaller than the size of your field, but I doubt this would often be a real issue. 4) Interesting idea. There might be some practical value to it but I'm not sure right away what it would be.

  • @rami4933
    @rami4933 2 года назад

    I'm only 3 minutes in and I can tell this video will be very helpful. Thanks for your effort and keep going 🙌

  • @barricuda5
    @barricuda5 2 года назад

    Programming Bitcoin by Jimmy Song brought me here

  • @kotozna
    @kotozna 2 года назад

    At 6mins, why is "a" used as the exponent in the top line then in the second line "y" is used?

    • @CryptoClear
      @CryptoClear 2 года назад

      That's an inconsistency on my part, sorry about that!

  • @sachuabraham6516
    @sachuabraham6516 2 года назад

    Really nice explanation, Hoping to see more videos

  • @ezohn
    @ezohn 2 года назад

    thanks for sharing. For a non-computer scientist like me, a very clear explanation why FFs are used in cryptography!

  • @tylorbrennen
    @tylorbrennen 2 года назад

    Amazing job explaining the best video on this topic I've seen

  • @susanyoung9349
    @susanyoung9349 2 года назад

    Please do a video on BUSDX, Everyone is talking about xPay virtual crypto payment card

  • @Mohammad0906025
    @Mohammad0906025 2 года назад

    Cool explaination.

  • @python360
    @python360 2 года назад

    Subscribed! - really nice presentation, especially liked the graphs showing perfect secrecy.

  • @AhmedAli-jt1qy
    @AhmedAli-jt1qy 2 года назад

    You are a great instructor

  • @SaidVSMath
    @SaidVSMath 2 года назад

    Great video, I'm interested in learning about cryptography and this opened my eyes! Thanks!

  • @FitVibhav
    @FitVibhav 2 года назад

    Actually, I was Looking Video for my frnd But, when I saw whole Video really its awesome☺☺

  • @LeCaNiVideos
    @LeCaNiVideos 2 года назад

    Thank you, this helped me a lot! I'm taking the exam on Chalmers the day after tomorrow!

  • @NXVIINXVII
    @NXVIINXVII 2 года назад

    Magic! This is fantastic

  • @intelchen6435
    @intelchen6435 3 года назад

    Amazing video! Too bad the topic is too niche and doesn't attract enough traffic

  • @utilizator1701
    @utilizator1701 3 года назад

    The exercise answer: f(x)=10*(x^2+x+1) (mod 11). Then f(0)=10 mod 11. Edit: True it is that f(x)=x^2+3*x+6 (mod 11). Then f(0)=6 mod 11.

  • @markandmelbamford
    @markandmelbamford 3 года назад

    Agree with other reviewers- best explanation of fields rings groups. I’ll look for other videos too

  • @JohnAlanWoods
    @JohnAlanWoods 3 года назад

    You need to produce more videos, these are super accessible! great job.