Completed
Modular exponentiation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Reality of Cryptographic Deployments on the Internet
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Reality on the Internet
- 3 Scanners
- 4 DiffieHellman
- 5 Bruce Schneier
- 6 What is DiffieHellman
- 7 Cody the Coder
- 8 Whats wrong with this
- 9 Modular exponentiation
- 10 Chinese remainder theorem
- 11 Who screwed it up
- 12 Countermeasures
- 13 Primes
- 14 Prime Standards
- 15 Lemmle
- 16 Small subgroup confinement attacks
- 17 Countermeasure
- 18 Are you good
- 19 Bad implementation behavior
- 20 Crypto implementation flaws
- 21 Policy makers
- 22 US export controls
- 23 Backwards compatibility
- 24 Freak attack
- 25 Logjam
- 26 Why it works
- 27 The number field sieve algorithm
- 28 How long does it take
- 29 Lessons
- 30 Policy
- 31 NSA
- 32 Diffie Hellman
- 33 Snowden Documents
- 34 NSA Passive Decryption
- 35 NSA Decryption Requirements
- 36 DiffieHellman Key Sizes
- 37 Poor Users
- 38 The Good
- 39 The Problem
- 40 Free Speech
- 41 Open Internet