Тёмный

Lecture 19: Elgamal Digital Signature by Christof Paar 

Introduction to Cryptography by Christof Paar
Подписаться 62 тыс.
Просмотров 38 тыс.
50% 1

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com

Опубликовано:

 

29 янв 2014

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 17   
@den1fednu
@den1fednu 3 года назад
To fix audio sync use -2100ms delay
@pianostein7590
@pianostein7590 5 лет назад
I think, one should also fix an integer representative for r. If r is only defined modulo p, s is not well-defined.
@steven4158
@steven4158 6 лет назад
Does anybody have any feedback on why r is computed to mod p but s is computed to mod p-1. I know it is related to Fermat's little theorem of course but what are the specifics? Thx
@steven4158
@steven4158 6 лет назад
I believe I clearly understand the attack at the beginning of the video however in the real world wouldn't PKI with certs signed by a CA preempt such an attack. Thanks again for such a great course
@JoseRomero-wp4ij
@JoseRomero-wp4ij 5 лет назад
Thanks for these lectures
@danieledwin5754
@danieledwin5754 4 года назад
I don't think we have to worry about the possibility of any scary attacks until L.36
@balkierode
@balkierode 9 лет назад
Given than same KE cannot be chosen more than once, how does this digital signature work in practise? I assume the setup phase happens only once and the public key is published to key servers. So everytime the key is used to sign, the random number(for KE) chosen should be remembered to not use again. If more than one device is used to sign using the same key, they should somehow sync the list of KEs chosen to sign. Am I missing something here?
@zekathembinkosi48
@zekathembinkosi48 9 лет назад
ja i also had the same problem i mean that tricked my mind,coz if the same KE is used more than once than it can be synced,i think thats why larger numbers are used so as to have a large scope of such values to choose
@beback_
@beback_ 7 лет назад
Balakrishnan B I think they assume that if you sample KE randomly, it will never be the same.
@ceyhunugur1907
@ceyhunugur1907 Год назад
Guys, I wonder what are you doing now? Your comments were 8 years ago, you should be professor for now :D
@slaozeren8742
@slaozeren8742 3 года назад
This lecture was a little bit hard but thank you so much, Prof. Christof Paar.
@ceyhunugur1907
@ceyhunugur1907 Год назад
14:30 What if Oscar firstly choose x and then he try to calculate s? Is it gonna be the discrete logarithm problem?
@introductiontocryptography4223
exactly!
@ceyhunugur1907
@ceyhunugur1907 Год назад
@@introductiontocryptography4223 Thank you for answering dear professor, but the general representation of dlp is; g^x ≡ β (mod p) and the variable that we are trying to find is 'x', the computation in this video is; x ≡ s^e (mod n) and if Oscar choose x firstly, the variable that we are trying to find is 's', These equations do not look similar. How can it be discrete logarithm problem? Do we need to take logarithm to find s from x?
@dpraajz
@dpraajz 4 года назад
2:20 Attack against RSA D.S.
@An.Individual
@An.Individual 3 года назад
thanks, that is what i was looking for
@An.Individual
@An.Individual 3 года назад
Oscar sounds like a nice guy compared to Eve
Далее
Копия iPhone с WildBerries
01:00
Просмотров 197 тыс.
НОВАЯ ПАСХАЛКА В ЯНДЕКСЕ
00:20
Просмотров 233 тыс.
Lecture 15: Elgamal Encryption Scheme by Christof Paar
1:17:51
Elliptic curves and modular forms
41:02
Просмотров 31 тыс.
GEOMETRIC DEEP LEARNING BLUEPRINT
3:33:23
Просмотров 173 тыс.
1v1 Coding Lockout Championship Finals
3:37:39
Просмотров 77 тыс.
Deep Learning: A Crash Course (2018) | SIGGRAPH Courses
3:33:03