|
You are here |
hannes.robur.coop | ||
| | | | |
asecuritysite.com
|
|
| | | | | [AI summary] The provided code demonstrates the implementation of Elliptic Curve Diffie-Hellman (ECDH) key exchange using various elliptic curves. It includes functions for modular arithmetic, point operations on elliptic curves, and key generation. The code generates key pairs for Alice and Bob, computes shared secrets, and prints the results. The shared secret is derived from the x-coordinate of the resulting point. The page also includes references and licensing information for proper citation. | |
| | | | |
blog.robur.coop
|
|
| | | | | How we improved the performance of elliptic curves by only modifying the underlying byte array | |
| | | | |
andrea.corbellini.name
|
|
| | | | | [AI summary] The text discusses the fundamentals of Elliptic Curve Cryptography (ECC), focusing on Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA). It explains how ECDH enables secure key exchange and how ECDSA allows for digital signatures. The text also covers the importance of secure random number generation in ECDSA, highlighting the risks of using a predictable or static secret key, as seen in the PlayStation 3 incident. The discussion includes code examples for ECDH and ECDSA operations and the consequences of poor implementation practices. The text concludes by mentioning future articles on solving discrete logarithms and ECC compared to RSA. | |
| | | | |
www.cesarsotovalero.net
|
|
| | | This article delves into symmetric and asymmetric encryption, as the building blocks of Public Key Infrastructure (PKI). It describes how PKI allows safeguarding the authenticity and security of digital communications across the internet. | ||