Asymmetric Encryption: A Deep Dive - Eli Holderness - NDC Security 2024

Explore the world of asymmetric encryption, including public-key cryptography, elliptic curve cryptography, and post-quantum cryptography, and learn about the importance of math-based cryptography and secure key exchange.

Key takeaways
  • Asymmetric encryption combines two numbers, one public and one private, to create a secure channel for communication.
  • Small public keys are efficient but can be compromised by classical computers.
  • Quantum computers may break some encryption systems, making post-quantum cryptography necessary.
  • Elliptic curve cryptography is a type of public-key cryptography that uses the mathematical properties of elliptic curves to create a secure key exchange.
  • The private key can be used to decrypt the message, while the public key is used to encrypt the message.
  • A digital signature is a way to authenticate the sender of a message, by signing it with a private key.
  • Groups have a set of elements and a binary operation, and the identity element is the element that leaves all other elements unchanged when combined with it.
  • In cryptography, groups are used to create a set of elements that can be combined using a specific operation, like addition or multiplication.
  • Cryptographic systems rely on certain mathematical problems being difficult to solve, and breaking these systems would require solving these problems.
  • Shamir’s sharing scheme is a method for secure multi-party computation, where a secret is split into shares that are distributed among parties.
  • The ciphers used in cryptography can be based on different mathematical problems, such as factoring large numbers or finding discrete logarithms.
  • Secure communication requires a shared secret key, which is typically generated using a public-key encryption algorithm.
  • Elliptic curve cryptography has been found to be more resistant to quantum attacks than certain other cryptographic systems.
  • Quantum computers can factor large numbers efficiently, making quantum-resilient cryptography necessary to secure communication.