Overview
Syllabus
Intro
Why are we here
New attacks
MD5 attacks
Why do we have this disconnect
Why are we expensive
Math section
Asymmetric cryptography
What is asymmetric cryptography
What iselliptic curve cryptography
DiffieHellman key exchange
Discrete logarithm problem
The Mathematical Problem
Elliptic Curve Cryptography
Discrete logarithm
NIST recommended key sizes
Next section
Discrete logarithm algorithms
Algorithmic complexity
Discrete logarithm research
Discrete logarithm algorithm
Discrete logarithm progress
Antwon Joes algorithm
Current implications
Linear Algebra
RSA Public Keys
Factoring RSA Public Keys
Factoring Discrete Logs
Sneakers
Perfect Forward Sec
Failure of Trust
Make a Move
The ECC is Secure
Other Trapdoor Functions
Why arent we using ECC
Whats Sweetpea
Sweetpea
We didnt listen
RIM
Blackberry
Patent trolling
ECC support
Android ECC support
External libraries
TLS
Crypto Ecosystem
DNSSEC
OpenVPN
Browsers
Other software
Certificates
Global License
Use ECC
Survey your exposure
Summary
Taught by
Black Hat