Lecture 16: Introduction to Elliptic Curves by Christof Paar

Поділитися
Вставка
  • Опубліковано 29 січ 2014
  • For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com
    (Don't worry, I start in German but at minute 2:00 I am switiching to English for the remainder of the lecture :)

КОМЕНТАРІ • 142

  • @biscofil
    @biscofil 3 роки тому +21

    In case you want to sync the audio up using a chrome extension the delay is -7500 ms

    • @upliftingspirit6873
      @upliftingspirit6873 3 роки тому +2

      you are a god

    • @vaap
      @vaap 10 місяців тому +1

      thank you so much oml

    • @TodiDiang
      @TodiDiang 4 місяці тому

      what is the extension name?

    • @mvcavinato
      @mvcavinato 2 місяці тому

      People like you make me believe again in the manking haha thanks

  • @tomasz-waszczyk
    @tomasz-waszczyk Рік тому +12

    I have fixed delay audio in the lecture: ua-cam.com/video/vIyywOLyA7Y/v-deo.html

    • @ovais217
      @ovais217 7 місяців тому +1

      thanks man, you are a life saver !!

    • @AddisuDesta
      @AddisuDesta 3 місяці тому

      Thanks man .. I suffered for 40 minutes and finally checked the comments :)

  • @ChumX100
    @ChumX100 3 роки тому +5

    You realize how old these lectures are, when he describes blackberries as part of the "sexy new applications" 😂 Great lecture!

  • @zedmed3191
    @zedmed3191 3 роки тому +5

    Thank you very much Christof Paar, you are the best Professor I have ever seen in my life!
    Yes, that's really what I think of you. For me you are very smart, so pedagogical, so clear, so humble (necessary for any teaching) and so funny too!
    I discovered this course in 2014 in Morocco when I started my studies on Cryptography at the University of Rabat, Morocco. I really enjoyed this course at that time, and I can't tell you how it helped me to understand these topics that seemed very complicated (unfortunately due to the lack of explanation by other professors). You made them very easy for me, like magic. Your method is really inspiring and I really appreciate it. And I know if I am now working in this field as a security analyst with a background in cryptography, it is somehow thanks to your wonderful courses!
    After seven years, I still enjoy these courses and now I decided to go back to this elliptic curve course because I am interested in CHESS-2021 this year about white box cryptography based on elliptic curves.
    Thanks again my best professor

  • @abisheikg
    @abisheikg 9 років тому +17

    Best lecture on EC ever. Thanks loads.

  • @yazanshakhshir3049
    @yazanshakhshir3049 7 років тому +10

    Professor Christof Paar, i can't find the words to thank you
    you are one of the best, today this morning it was easy for me to answer my final exam after watching the whole course
    i really adore you Mr.Paar :)
    my regards from Palestine :)

  • @jithinkg9865
    @jithinkg9865 3 роки тому +17

    for anyone worried about the audio sync, install 'UA-cam Audio/Video Sync extension' and set audio delay to -8026 ms.

    • @yihou6433
      @yihou6433 3 роки тому

      -8100 is better for me

    • @kipkor
      @kipkor 3 роки тому +1

      @@yihou6433 actually -6500 ms is better

    • @sizhuoqi1773
      @sizhuoqi1773 3 роки тому +1

      -7950 is perfect

  • @akanshabhardwaj5770
    @akanshabhardwaj5770 9 років тому +2

    Thanks Professor. That is so helpful. Reading all this stuff from slides and books was so much painful. Your videos just made it so clear and simple .. Vielen Dank!

  • @MihaiBarbulescu12
    @MihaiBarbulescu12 9 років тому +9

    Awesome teacher! Awesome lectures! Thank you very much for posting these and I hope you will post the other crypto courses that you teach! I also really really apreciated the fact that he tried to be "a nice teacher" a derive the formulas (in all lectures) and not to throw them on the blackboard, as many of my university teachers did! Again...awesome course! Thanks a lot for making it available to the public!
    Looking forward to look at the lectures of "Implementation of Cryptography" you teach in semester 5!

  • @zhiyizhu3040
    @zhiyizhu3040 5 років тому +1

    you are a very responsible and patient teacher! Thank you for sharing the video!

  • @jsw060943
    @jsw060943 8 років тому

    Prof. Paar: Great lecture. I am so inspired that I am going to start with lecture 1 (after lecture 17 - where you build the EC crypto system) and really learn about the crypto that I have been using as a programmer. Your English is excellent, and I am happy to say that I am picking up bits of German (important for mathematical heritage). Thank you for making these excellent lectures publicly available.

  • @khurramali4664
    @khurramali4664 6 років тому

    I haven't seen such kind of professor wordless jxt great man and i love the moment when u called nxt 60 second or so u awake

  • @Mr_Oszy
    @Mr_Oszy 6 років тому +12

    1:59 english starts... :) I was worry..

  • @mr.shanegao
    @mr.shanegao 3 роки тому +5

    Intro to Elliptic Curves 7:00
    Group operation 36:00

  • @manand19821
    @manand19821 6 років тому

    Today I learned ECC thoroughly thanks to Prof.Paar

  • @adityajadhavar9675
    @adityajadhavar9675 4 роки тому +7

    Your actions in this video are lagging with your sound sir.so it's hectic to understand.While other videos are quite good and ur awesome professor

  • @bahadirozkan3871
    @bahadirozkan3871 4 роки тому +3

    6 days to the final so switching to x1.5 playback speed. Great course by the way!

  • @codex8538
    @codex8538 3 роки тому +3

    Free advice:
    Download the clip
    Delay the audio by 0.1s using vlc
    continue watching

  • @pgodbole
    @pgodbole 10 років тому

    Prof. Paar is a good teacher.

  • @KAYODESAKARIYAHADEWOLE
    @KAYODESAKARIYAHADEWOLE Рік тому

    Great lecture Prof. It is highly inspiring.

  • @anoopramakrishna
    @anoopramakrishna 7 років тому

    Great lecture professor, It might help to refer to the inverse of P as P' to avoid the confusion of the signs. Also perhaps referring to the group operation as addition causes some confusion, since it is really just an arbitrarily defined operation. One question I had, is the geometric interpretation in R the source of the definition of the group operation, or was the group operation defined in Zp and the geometric interpretation in R just emerged from that?

  • @Nimyzz
    @Nimyzz 9 років тому

    Excellent lecture, thanks!

  • @DrivethisBK7
    @DrivethisBK7 10 років тому +1

    Good Course and Good Teacher

  • @aliceanderson5154
    @aliceanderson5154 6 років тому +1

    Thank you Prof. Paar.
    I am trying to find a deeper explanation for the exclusion of "4a cubed + 27b squared mod p = 0". I thought perhaps the curve might intersect itself or otherwise create an ambiguity but I was unsuccessful in finding a consistent definable problem. Can you point me to a reference? I have your textbook in kindle format and the search function fails me.
    "I'm awake ! I'm awake!"
    Alice

    • @ChumX100
      @ChumX100 3 роки тому

      The requirement for the group construction to work is that the curve doesn't have singularities like sharp corners or self-intersections (imagine trying to make sense of the group operation on those!). Now it turns out, this requirement is equivalent to the discriminant of the curve being non-zero. That seemingly arbitrary polynomial is the discriminant of the polynomial defining the elliptical curve. It's nice to use this fact to quickly check if our choice of parameters will work or not.

    • @aliceanderson5154
      @aliceanderson5154 3 роки тому

      @@ChumX100 thank you.

  • @Arjunsiva
    @Arjunsiva 3 роки тому +1

    Copy the URL and play it in VLC media player. It will solve the audio lag problem automatically.

  • @bendono
    @bendono Рік тому +1

    @48:55: In English, the equation of a line is usually denoted as "y = mx + b", where m is the slope and b in the y-intercept.

  • @srinivasr3893
    @srinivasr3893 2 роки тому

    Hello Professor,
    In this lecture, while calculating "s" in case of doubling (P+P), wats a?
    Is it a constant or to be calculated?

    • @introductiontocryptography4223
      @introductiontocryptography4223  2 роки тому +2

      "a" is the coefficient in the equation of the elliptic curve itself:
      y^2 = x^3 + a x + b mod p
      cheers, christof

  • @dr.mohamedaitnouh4501
    @dr.mohamedaitnouh4501 7 років тому

    great lecture! do you know by any chance any basic reference for "Elliptic curves on the complex numbers C"? instead of Z_p
    Thank you very much

    • @introductiontocryptography4223
      @introductiontocryptography4223  7 років тому +3

      You probably have to use one of the mathematical texts on elliptic curves. Two standard books are the one by Neal Koblitz and Joe Silverman's, both published by Springer. Again, both are quite heavy on math but otherwise recommended. regards, christof

  • @hannahjp1505
    @hannahjp1505 9 років тому +5

    If it enables me understand Prof. Christof Paar's lecture, I really do not mind taking extra efforts to learn German.
    Prof., After listening to your lectures only, I understand the advanced topics in Cryptology like ECC, DH, DLP etc. Thanks and Regards. - Hannah.

  • @msaufy
    @msaufy 10 років тому

    means the definition of generator for EC is when the order plus itself until it find point of infinity?

  • @creativegiant148
    @creativegiant148 2 роки тому +1

    The voice matching algorithm messed up a little.

  • @jerrymahone335
    @jerrymahone335 4 роки тому +1

    why didn't you show how to find points on the elliptic curve using perfect squares.of x in mod p.

  • @Efferto93
    @Efferto93 8 років тому

    Well, I was holding well throughout all of these lectures, but while trying to understand O (point in infinity), with proving property 3 and, 4 my head finally exploded. Now I'm cleaning my floor of confetti, popcorn and some brain nuggets.

  • @sathyamurthisadhasivan6275
    @sathyamurthisadhasivan6275 8 років тому +1

    Prof. Paar, Excellent videos....
    Do you also have videos of your 5th semester class "Implementation of Cryptography" which you mentioned about in this video lecture? That will be a great continuation to the classes in this series.
    Thanks again, for your outreach to help us all learn and understand.

    • @introductiontocryptography4223
      @introductiontocryptography4223  8 років тому +6

      +Sathyamurthi Sadhasivan Unfortunately, I do not have videos from my course "Implementation of Cryptographic Schemes". However, the lecture notes for the course, which are similar in style to our book Understanding
      Cryptography, are available here: emsec.rub.de/teaching/literature/
      regards, christof

  • @remyaunnikrishnan2037
    @remyaunnikrishnan2037 4 роки тому

    Sir y do v take the mirror image after addition?

  • @ayoubmerzak1733
    @ayoubmerzak1733 7 років тому +1

    Thank you Professor for this great lecture on EC and wish you a happy new year as well. I have a question though. In @1:18:25 it's mentioned that P = (5, 1) is generator for E and that |E| = 19. My question is how could one determine the cardinality of such a group (i.e. Elliptic Curve) and the generators of the group as well since we are dealing here with points (i.e. a pair of integers) and not only integers?

    • @introductiontocryptography4223
      @introductiontocryptography4223  7 років тому +2

      For such toy examples, just keep additing P to itself using the point addition or point doubling formulae and check when you reach the neutral element, i.e., the point at infinity.That means you compute:
      2P = ...
      3P = ...
      Before each computation i * P + P you check whether i*P is equal to -P. If so, i*P + P = O (point at infinity) and the group cardinality is i+1.
      In practice, however, the curve is almost always given together with the cardinality of the group that is being used.
      regards, christof

    • @ayoubmerzak1733
      @ayoubmerzak1733 7 років тому

      Thank you Sir for your reply. I still can not see though how could one figure out the generator element P = (5, 1) or any other primitive element of such a group G(E, +). I will be so pleased to have an answer for this particular question.

    • @martinpattara
      @martinpattara 7 років тому

      Thanks Professor,
      One question on the same topic - How we assumed (5,1) is the generator.If we had chosen some other pair as "P" and if we had hit (i*p +p =0) when i = 10. why we don't conclude p is the generator and the cardinality of the group is 11

  • @Eddie-oz8nq
    @Eddie-oz8nq 7 місяців тому

    Anyway we could get a fixed version so the audio is in sync?

  • @ChandraSekhar-co3hw
    @ChandraSekhar-co3hw 8 років тому +3

    Professor - at 1.14.30 - How does (2) -1 become 9 ? (2 inverse becomes 9)

    • @dimitarpetrunov3596
      @dimitarpetrunov3596 6 років тому +1

      The inverse of 2 with respect to mod 17 is 9 since 2 * 9 = 1 mod 17 hence 9 is the inverse of 2.

  • @agha5158
    @agha5158 7 місяців тому

    The content is perfect, but there is a delay in voice, to avoid this, one may open the video on another tab and play it 6-7 seconds after. Keep its voice open and the main one's closed, by doing that it will sound like real time.

  • @steven4158
    @steven4158 3 роки тому

    It would be great if you can add a lecture on ECDSA after the ECC lecture

  • @alkareetesh8193
    @alkareetesh8193 6 років тому

    You are really amazing...

  • @RoboBeaver6
    @RoboBeaver6 4 роки тому +8

    Excellent lecture. the audio sync was a little distracting

    • @ravard4336
      @ravard4336 3 роки тому +3

      I downloaded it in mp4 format from an online tool and the audio offset disappeared without doing anything else!
      If not, just open it with VLC and adjust the audio delay with the first chalk stroke on the board ;)

    • @glebignites5278
      @glebignites5278 3 роки тому +1

      @@ravard4336 Thanks for your suggestion!

  • @mervemlaz61
    @mervemlaz61 5 років тому

    i am good at english but i don't understand german and i wonder what he says when you start to speak german :?

  • @chrism7574
    @chrism7574 Рік тому

    In English, at least American English, we use y = mx + b for the line equation. Where m and b comes from, I haven't the slighted idea.
    Can any of my UK brethren chime in if this is shared with the King's math?

  • @gmcenroe
    @gmcenroe 10 років тому +3

    good lecture, in english we use y = mx + b for equation for line

    • @XozZzo
      @XozZzo 6 років тому +2

      As a German (Bavaria), we used y = mx + t for lines :D

    • @saradiazcardell7830
      @saradiazcardell7830 3 роки тому +1

      @@XozZzo As a Spanish we use y=mx+n XD

  • @jeanboyable
    @jeanboyable 7 років тому

    Professor, I want to learn this theory where can I start

    • @XozZzo
      @XozZzo 6 років тому

      I'm not a professor, but do you mean number theory (which is the general concept of all this)?
      I suggest studying maths, but you can try to read books on number theory as well (if you're like super motivated) :D

  • @BRUMTOON
    @BRUMTOON 9 років тому

    Mr Paar Thank you for your lectures they very useful and I just wanted to know what year students in that your teaching

    • @introductiontocryptography4223
      @introductiontocryptography4223  9 років тому

      Rajae Hamma Thanks for your interest. I am mainly teaching to 1st year students in our B.Sc. program "Bachelor in IT Security". There are also a few M.Sc. students.

  • @aliceanderson5154
    @aliceanderson5154 6 років тому +1

    Please disregard my previous questions, I found the reasoning I was looking for.

  • @ahmedfelifl958
    @ahmedfelifl958 7 років тому +4

    It would be nice if you add subtitles for German speaking part than all of understand what is the professor saying in his native tongue

    • @chloea1939
      @chloea1939 7 років тому +7

      It's something to the effect of "wake up and pay attention now because it's going to be a bitch to learn this by yourself". Source: am german

    • @yazanshakhshir3049
      @yazanshakhshir3049 7 років тому +3

      i have nearly watched the whole course
      he rarely speaks in German
      he often speaks in german whenever he wants to ask the students to be silent :D

  • @MikeKoss
    @MikeKoss 3 роки тому +2

    The audio and video are several seconds out of synch for me. Anyone else?

  • @creativegiant148
    @creativegiant148 2 роки тому +2

    Everyone in the comments section is learning for their exams and I am learning for starting into Blockchain. I just want to know if this much cryptography is needed in blockchain I mean should I go more advance?

  • @mmm763
    @mmm763 5 років тому

    professor, how P+Q=R?

  • @mdmazharulislam6504
    @mdmazharulislam6504 9 років тому +1

    guys, what's the name of the text book he use in this class? Any download or amazon link will be helpful!

    • @introductiontocryptography4223
      @introductiontocryptography4223  9 років тому +1

      The book is "Understanding Cryptography" and it is closely linked to the material in the videos. You find a link to Amazon on the companion web page: www.crypto-textbook.com
      Regards, Christof

    • @mdmazharulislam6504
      @mdmazharulislam6504 9 років тому

      Introduction to Cryptography by Christof Paar Thank you sir!

  • @przemyslawkisielewski1602
    @przemyslawkisielewski1602 6 років тому

    What happens when P not = Q but x1=x2 so that slope s is not defined?

    • @conformist
      @conformist 5 років тому +1

      Well, if you pick x1=x2, then you get a straight line.
      So if the second point Q = (x2, -y1), then you get the inverse of P, i.e. -P.
      If Q is not -P, then the point by definition of your chosen elliptic curve, won't be on the curve.
      Good question, had to think this through too.

  • @nisoking4153
    @nisoking4153 2 роки тому

    Thanks alot.

  • @awesomegamedev
    @awesomegamedev 4 роки тому

    This (and the next video) is a nice introduction to Eliptic Curves.
    Unfortunately, some important details are skipped.
    Most importantly:
    1) Why is the defined group operation associative?
    2) How to do encryption/decryption with it?
    (Or do we never do encryption/decryption with it because it's cheaper to do key exchange and then use AES?)
    If anyone knows nice but also detailed/in-depth explanation of the subject, it would be highly appreciated!

    • @introductiontocryptography4223
      @introductiontocryptography4223  4 роки тому +5

      Here are brief replies to your questions:
      1) Showing associativity for elliptic curves is quite involved. You can find resources online, e.g. www.uni-regensburg.de/Fakultaeten/nat_Fak_I/friedl/papers/elliptic_2017.pdf
      2) One can encrypt with ECC. There are various schemes, most of them are variants of Elgamal encryption. BUT, as you said, it is rarely used in practice because symmetric cryptography (AES; 3DES, ...) are about 100-1000 times faster.
      regards, christof

    • @awesomegamedev
      @awesomegamedev 4 роки тому

      @@introductiontocryptography4223
      Thanks for the info and the link!
      Checked the paper. Yeah, longer than I suspected.
      I'll have to return to it a bit later, when I can dedicate some time.
      > symmetric cryptography (AES; 3DES, ...) are about 100-1000 times faster
      Wow, I knew it's faster, but I didn't know it's that much faster!

  • @IIIMajesty
    @IIIMajesty 8 років тому

    Why do we need the group to be cyclic? The subgroup generated by a base element that we choose to be part of the public key is always cyclic.

    • @introductiontocryptography4223
      @introductiontocryptography4223  8 років тому +2

      +Road Kamelot You need a cyclic group for constructing a discrete logarithm problem. Please have a look at Lectures 13 and 14 of this series. Regards, christof

  • @aliceanderson5154
    @aliceanderson5154 6 років тому +1

    There are two points on every elliptic curve that have no other intersection points. Its tangent never intersects the curve again. They are where the curve changes from convex to concave. At these points, does (P + P) = P ?? Or are these points never part of the group? Is this the equivalent of a cycle with order one?
    Alice

  • @skarootz
    @skarootz 4 роки тому +3

    Audio isn't in sync for you too?.

    • @grover-
      @grover- 4 роки тому

      Audio is out of sync for me too

    • @tomasz-waszczyk
      @tomasz-waszczyk Рік тому

      @@grover- ua-cam.com/video/vIyywOLyA7Y/v-deo.html

  • @ihhazmi
    @ihhazmi 9 років тому +3

    Thank you very much for your very helpful lecture.
    I'm just wondering, when you talk about the identity property of EC group, why didn't you consider that the mirror point is -P : P + 0 = P ==> P + (-P) = 0.
    such that if P = (x, y), then -P = (x, -y)
    Similarly, when add two points P (x1, y1) and Q (x2, y2), the result we get, by extending the line, before taking the mirror is presumably - (P+Q) ; (x3, -y3)!

    • @ihhazmi
      @ihhazmi 9 років тому +1

      Then, the line between P and -P is the vertical line which does not intersect with EC at a third point, thus we say the third point is infinity, which is part of the parallelism definition in the first place :)

    • @introductiontocryptography4223
      @introductiontocryptography4223  9 років тому +3

      Ibrahim Hejab
      Yes, it is perfectly fine to explain it this way! I sometimes do this way too in my lecture. Thanks for your input, Christof

    • @ihhazmi
      @ihhazmi 9 років тому

      Introduction to Cryptography by Christof Paar
      Thank you for your reply and concern. By the way, your book "Understanding Cryptography" and the lectures in this channel, made it super easy for me to understand cryptography.

  • @Gem-gi7km
    @Gem-gi7km 5 років тому

    1:12:26 Example 9.4: isn't the point P=(5,1) NOT on the curve y^2=x^3+2x+2(mod17) ? To do 'point doubling', shouldn't the point be on the curve?

    • @introductiontocryptography4223
      @introductiontocryptography4223  5 років тому +1

      The point (5,1) is on the curve. To see this, insert the x coordinate in the elliptic curve equation:
      y = x^3 + 2 x + 2 mod 17
      5^3 + 2*5 + 2 mod 17
      125 + 10 + 2 mod 17
      137 mod 17
      8 * 17 + 1 mod 17
      1 mod 17
      As you can see, the y coordinate that belongs to x=5 is in fact 1. Hence,
      (x=5, y = 1) is a point on the curve. cheers, christof

    • @Gem-gi7km
      @Gem-gi7km 5 років тому

      @@introductiontocryptography4223 but isn't the function y^2 = x^3 + 2 x + 2 ?
      So it would look like this?:
      y^2 = x^3 + 2x + 2 mod(17)
      y^2 = 5^3 + 2*5 + 2 mod(17)
      y^2 = 137 mod(17)
      y = √137 mod(17) (note: √137 < 17)
      www.desmos.com/calculator/ilrmxnucrw
      Best Regards,

    • @introductiontocryptography4223
      @introductiontocryptography4223  5 років тому +1

      Sorry, I forgot to write y^2 on the left hand side of my calculation above. Correct is:
      y^2 = x^3 + 2 x + 2 mod 17
      = 5^3 + 2*5 + 2 mod 17
      = 125 + 10 + 2 mod 17
      = 137 mod 17 8 * 17 + 1 mod 17
      y^2 = 1 mod 17
      This equation is fulfilled for y=1 since 1^2 = 1 mod 17.
      I would not recommend to compute the square root. Computing square roots in finite fields (this is what you have if you do arithmetic modulo a prime number) needs a special algorithm. For our purpose here, it is sufficient to square y and to check whether the results is equal to the right side of the equation, cf. above. cheers, christof
      @@Gem-gi7km

  • @samahawad2168
    @samahawad2168 8 років тому

    how to calculate 101(2, 2) ??

    • @philipschloesser
      @philipschloesser 6 років тому

      Doubling the (2,2) six times and then adding 64(2,2) + 32(2,2) + 4(2,2) + (2,2) seems like the most efficient method

  • @reinoudschuijers933
    @reinoudschuijers933 3 роки тому +1

    Is it me or is the audio wildly out of sync?

  • @franzscheerer
    @franzscheerer 2 роки тому

    Ich schaue es mir noch einmal an, denn ellpitische Kurven sind viel interessanter als ich dachte. Es gibt nämlich ein Faktorisierungsverfahren auf Basis der elliptischen Kurven, das offenbar fast niemand verstanden hat.
    Es hat fast niemand verstanden. Wer es verstanden hat, erkennt sofort, dass der Geheimdienst RSA schon immer knacken konnte.

  • @ZalaBhai
    @ZalaBhai 4 роки тому +1

    Sound and video is not synchronised

  • @johnlilburne737
    @johnlilburne737 7 років тому +1

    Why choose your own P and Q for EC? Why not let the NSA do all the hard work and choose P and Q for you?

  • @azzteke
    @azzteke 2 роки тому

    encrüption?

  • @franzscheerer
    @franzscheerer 2 роки тому

    Warum wird RSA immer noch verwendet?

    • @franzscheerer
      @franzscheerer 2 роки тому

      Es gibt keinen Grund, außer Hintertüren für den Gehemdienst zu schaffen.

  • @h3llphish111
    @h3llphish111 8 років тому

    From this picoCTF 2014 problem:
    Cryptosystem:
    Elliptic Curve: y^2 ≡ x^3 + ax + b mod n
    a = 0
    b = 268892790095131465246420
    n = 928669833265826932708591
    Encryption: C = e * M mod n
    Decryption: M = d * C mod n
    e = 141597355687225811174313
    d = 87441340171043308346177
    C = (236857987845294655469221, 12418605208975891779391)
    For this particular Elliptic Curve based cryptosystem, e is the encryption key and d is the decryption key. The original base-point C is reached as a result of e * d * C mod n, so I'm guessing that "e" and "d" have to be related in some way. If they are, how are the integers "e" and "d" related, and how do I generate two such integers that are related in this manner?

    • @introductiontocryptography4223
      @introductiontocryptography4223  8 років тому

      +Tom Lasky I am not aware of this problem. However, C = e * M mod n is NOT an ECC operation. Perhaps there is a misunderstanding of the problem?? Please check out ehsandev.com/pico2014/cryptography/ecc.html. regards, christof

    • @h3llphish111
      @h3llphish111 8 років тому

      +Introduction to Cryptography by Christof Paar Thank you for your help. It turns out that e and d were modular multiplicative inverses, and when multiplied together and divided by the cardinality of the curve, yielded a remainder of 1.

  • @CarloLavezzari
    @CarloLavezzari 4 роки тому

    Deep mistery

  • @DrunkenHamster7
    @DrunkenHamster7 5 років тому +1

    7:13

  • @okashkhawaja2664
    @okashkhawaja2664 Рік тому

    Looks like audio encrypted with ECC whole video with RSA

  • @codex8538
    @codex8538 3 роки тому

    18P + P = 19P = Identity. so 18P is the inverse of P?, But the co-ordinates of 18P is different from -P

    • @introductiontocryptography4223
      @introductiontocryptography4223  3 роки тому

      Good question. Please note that the inverse of a point P=(x,y) is defined as:
      -P = (x, -y)
      The tricky part: "-y" is defined with respect to modulo p arithmetic. Let's look at the example in the video:
      P=(5,1)
      18P=(5,16)
      We have to check wethere 16 is really -1 WRT mod 17 arithmetic. This is actually the case since:
      1 + 16 = 0 mod 17
      hope this helps. regards, christof

    • @codex8538
      @codex8538 3 роки тому

      @@introductiontocryptography4223 Got it!, Thanks a lot sir!

  • @friendlystar
    @friendlystar 6 років тому

    nice work sir., can u please send me the matlab code for elliptical curve cryptography....it will be very useful for my project....thank you

  • @AKTSR444
    @AKTSR444 4 роки тому

    fix it

  • @coshvjicujmlqef6047
    @coshvjicujmlqef6047 3 роки тому +1

    enjoy the homework lol

  • @franzscheerer
    @franzscheerer 3 роки тому

    y^2 = x^3 -x modulo p, (p+1)/4 ist eine Primzahl, mindestens 160 Bits.
    Mit G' = 4 * G haben wir eine Untergruppe deren Ordnung eine Primzahl ist.
    Es gibt praktisch unendlich viele Primzahlen p mit diesen Eigenschaften, die wir wählen können.
    Perfekt - besser geht es nicht!
    Mehr brauchen wir nicht. Wir drehen uns nur im Kreis, wenn wir nach weiteren Verfahren suchen, denn es kann keine besseren geben. Es gibt ja auch bereits genügend Primzahlen p, die wir wählen können.
    Standardkurven? Blödsinn - brauchen wir nicht. Je weniger der Hacker weiss, um so besser.

  • @mybitcoinacademy
    @mybitcoinacademy 6 років тому +19

    Bitcoin brought me here.

  • @spdx1
    @spdx1 5 років тому

    "What the heck"

  • @chonchjohnch
    @chonchjohnch 4 роки тому +1

    >title and tags in English
    >video in german

    • @introductiontocryptography4223
      @introductiontocryptography4223  4 роки тому

      Don't worry, only the first two minutes are in German, after that I switch to English :)

    • @chonchjohnch
      @chonchjohnch 4 роки тому

      Introduction to Cryptography by Christof Paar thank you! I was a bit confused lol

  • @gabbe5206
    @gabbe5206 5 років тому +1

    Prof. in advanced cryptography talks about security... and then he uses Windows XP.

    • @tazicke
      @tazicke 4 роки тому +1

      this is done in 2011

  • @sharonrizvi5310
    @sharonrizvi5310 Рік тому

    iS HE SPEAKING GERMAN?