We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
Asymmetric Encryption: A Deep Dive - Eli Holderness - NDC Security 2024
Explore the world of asymmetric encryption, including public-key cryptography, elliptic curve cryptography, and post-quantum cryptography, and learn about the importance of math-based cryptography and secure key exchange.
- Asymmetric encryption combines two numbers, one public and one private, to create a secure channel for communication.
- Small public keys are efficient but can be compromised by classical computers.
- Quantum computers may break some encryption systems, making post-quantum cryptography necessary.
- Elliptic curve cryptography is a type of public-key cryptography that uses the mathematical properties of elliptic curves to create a secure key exchange.
- The private key can be used to decrypt the message, while the public key is used to encrypt the message.
- A digital signature is a way to authenticate the sender of a message, by signing it with a private key.
- Groups have a set of elements and a binary operation, and the identity element is the element that leaves all other elements unchanged when combined with it.
- In cryptography, groups are used to create a set of elements that can be combined using a specific operation, like addition or multiplication.
- Cryptographic systems rely on certain mathematical problems being difficult to solve, and breaking these systems would require solving these problems.
- Shamir’s sharing scheme is a method for secure multi-party computation, where a secret is split into shares that are distributed among parties.
- The ciphers used in cryptography can be based on different mathematical problems, such as factoring large numbers or finding discrete logarithms.
- Secure communication requires a shared secret key, which is typically generated using a public-key encryption algorithm.
- Elliptic curve cryptography has been found to be more resistant to quantum attacks than certain other cryptographic systems.
- Quantum computers can factor large numbers efficiently, making quantum-resilient cryptography necessary to secure communication.