Загрузка страницы

Basics of Cryptology – Part 12 (Modern Asymmetric Cryptography – Diffie-Hellman Key Exchange)

#cryptology, #cryptography, #cryptanalysis, #lecture, #course, #tutorial

In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).

This video here gives an introduction to a very special part of modern asymmetric cryptography: We discuss the Diffie-Hellman-(Merkle) key exchange. First, we give an introdiction to the key exchange paradox. After that, we give a brief introduction in the history of the Diffie-Hellman key exchange. Then, we explain the basic idea with colors. After that, we give an introduction into the needed mathematics and we explain the Diffie-Hellman key exchange in detail. Finally, we show different templates in CrypTool 2 that interactively present the Diffie-Hellman key exchange.

Hint: This video here uses as finite group the cyclic multiplicative group built by the powers of a primitiv root r modulo n. This is an easy to understand example of a group which can be used for
DH key exchange. We also want to add, that finite groups can also be built with the points on elliptic curves. This is visualized in JavaCrypTool (https://www.cryptool.org/en/jct-downloads).

To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt

If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8

Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads

Видео Basics of Cryptology – Part 12 (Modern Asymmetric Cryptography – Diffie-Hellman Key Exchange) канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
19 июня 2020 г. 13:57:27
00:26:02
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With ExcelZodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 -  Automatic Translation of CrypTool 2 To a New Language10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalLet's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)Basics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedThe Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Let's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBreak an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)Basics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookAn Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsLet's Program a Hash Preimage Searcher to Break PasswordsBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)Basics of Cryptology – Part 14 (Modern Cryptography – Passwords)
Яндекс.Метрика