The Reality of Cryptographic Deployments on the Internet

The Reality of Cryptographic Deployments on the Internet

TheIACR via YouTube Direct link

NSA

31 of 41

31 of 41

NSA

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Reality of Cryptographic Deployments on the Internet

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Reality on the Internet
  3. 3 Scanners
  4. 4 DiffieHellman
  5. 5 Bruce Schneier
  6. 6 What is DiffieHellman
  7. 7 Cody the Coder
  8. 8 Whats wrong with this
  9. 9 Modular exponentiation
  10. 10 Chinese remainder theorem
  11. 11 Who screwed it up
  12. 12 Countermeasures
  13. 13 Primes
  14. 14 Prime Standards
  15. 15 Lemmle
  16. 16 Small subgroup confinement attacks
  17. 17 Countermeasure
  18. 18 Are you good
  19. 19 Bad implementation behavior
  20. 20 Crypto implementation flaws
  21. 21 Policy makers
  22. 22 US export controls
  23. 23 Backwards compatibility
  24. 24 Freak attack
  25. 25 Logjam
  26. 26 Why it works
  27. 27 The number field sieve algorithm
  28. 28 How long does it take
  29. 29 Lessons
  30. 30 Policy
  31. 31 NSA
  32. 32 Diffie Hellman
  33. 33 Snowden Documents
  34. 34 NSA Passive Decryption
  35. 35 NSA Decryption Requirements
  36. 36 DiffieHellman Key Sizes
  37. 37 Poor Users
  38. 38 The Good
  39. 39 The Problem
  40. 40 Free Speech
  41. 41 Open Internet

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.