RSA algorithm step by step example

  Рет қаралды 104,821

Programming w/ Professor Sluiter

Programming w/ Professor Sluiter

Күн бұрын

Go to StudyCoding.org to subscribe to the full list of courses and get source code for projects.
RSA example step by step shows how RSA encryption works mathematically as well as with data encryption tools such as GPG. RSA encryption is used in many public and private key encryption systems. This video will show public and private key examples and then the mechanics of using the RSA algorithm.
Information Security playlist • Information Security 1...
Web Development Security playlist • 00 Web and Database Se...
Index
0:00 What is RSA Encryption?
0:17 Who are Ronald Rivest Adi Shamir and Adelman?
0:35 Public and Private Keys
0:50 GPG encryption example
2:10 Example of factors of numbers
2:45 William Stanley Jevons prime number challenge
3:15 Examples of finding prime factors
4:25 How to make a public RSA key
5:50 Simple example of a public and private key
11:20 How to encrypt a letter with the public key
13:45 Decrypt a letter using the private key
15:50 What are RSA number challenges?

Пікірлер: 151
@jessycagonzalez2666
@jessycagonzalez2666 2 жыл бұрын
Finally. A good explanation on this topic with no skipped steps nor assumption about the viewers' previous knowledge. Amazing professor!
@ANGOLARICK
@ANGOLARICK Жыл бұрын
Minus the use of excel to complete mod and the explanation of figuring out mod.
@brandonm5295
@brandonm5295 3 жыл бұрын
I've watched and looked at so much for someone to finally break it down for a smooth brain like myself. Thanks for actually breaking things down into simple steps, with a simple example.
@eliaswachira5381
@eliaswachira5381 3 жыл бұрын
This guy is super easy to understand and teaches clearly with no skipped steps. Thanks Shad. If there was no covid and you lived close by I'd take you to lunch
@gagadaddy8713
@gagadaddy8713 Жыл бұрын
Euler Totient ...... why every thing name after Euler in Math arena ..... 😝
@gagadaddy8713
@gagadaddy8713 Жыл бұрын
@Elias , By the way, if you really have lunch with Professor, make sure you pay cash, no credit card. You know that he keep both the public and private key 😂😂😂
@vengeance3102
@vengeance3102 Жыл бұрын
@@gagadaddy8713 stop talking please
@gagadaddy8713
@gagadaddy8713 Жыл бұрын
@@vengeance3102 WTF you are doing here ....
@vimcfy5216
@vimcfy5216 2 жыл бұрын
this is the way to teach !!!!!!!!!! lovely system of visuals ,clear speech ,clear reppresentation etc etc this is paradise after watching loads of other videos that are messy, jumbled up and only fit as a reminder for people that already know the stuff!
@NGUYENTHIKIMNGAN_
@NGUYENTHIKIMNGAN_ Жыл бұрын
This one so far is the best explanation on RSA I have come across. Thank you, Prof!
@zgb3l
@zgb3l Жыл бұрын
This video is so underrated, but the best on this topic I've seen. And I've seen A LOT. Thank you so much for this.
@elenesokhadze255
@elenesokhadze255 3 жыл бұрын
The best tutorial on this encryption method. Thank you
@alexhope77
@alexhope77 2 жыл бұрын
Brilliant, so easy to understand. Amazing. Thank you so much!
@chakalonzote
@chakalonzote 2 жыл бұрын
Sir, my hat off to you. Nor my book or my professor was able to explain this with such simplicity!
@marianaaa24
@marianaaa24 2 жыл бұрын
Hands down the best video and explanation I’ve seen thus far! Thank you!!!! 🥲
@danielrozanski9594
@danielrozanski9594 2 жыл бұрын
THANK YOU!!....went to 5 other sources and they were crap! You are a life saver!
@paulotcj
@paulotcj Жыл бұрын
Now that's a good explanation. Unless one is able to encrypt and decrypt (with pen and paper) they will not really understand it. And this example doesn't skip any steps. Best explanation so far!
@quochuybui4693
@quochuybui4693 3 жыл бұрын
It's very easy to understand, thank you very much for your work!
@user-ogdbalsuzf6
@user-ogdbalsuzf6 Жыл бұрын
Awesone explanation, Thanks so much! I'm not sure what I would've done without this tutorial
@jeffreycanipe1936
@jeffreycanipe1936 Жыл бұрын
Great job explaining this!!! I would take a class under this professor anytime.
@terryloo
@terryloo 2 жыл бұрын
What a clear presentation of RSA. THANKS so much.
@becool1270
@becool1270 Жыл бұрын
I simply loved the explanation, this was great. Your way of explaining the algo was quite smooth and smile. Thank you.
@ahmedaj2000
@ahmedaj2000 3 жыл бұрын
thank you! helping me study for my cryptography final
@attilaguba856
@attilaguba856 Жыл бұрын
Professional as usual! Thanks!
@lmaoty
@lmaoty 3 жыл бұрын
Very simple to understand! Keep up the great job!
@shadsluiter
@shadsluiter 3 жыл бұрын
Glad it helped!
@shashikantdivekar7839
@shashikantdivekar7839 2 жыл бұрын
Very informative and useful. Also explained in simple terms. Thank you very much Sir.
@egorutkin6347
@egorutkin6347 Жыл бұрын
omg so simple and comprehensive explanation great job!
@kennguyen6802
@kennguyen6802 2 жыл бұрын
great teacher, now I can solve my assignment after watching your video
@rosannaisaksson3579
@rosannaisaksson3579 9 ай бұрын
Thank you for the thorough explanation of RSA. Very helpful.
@ricp
@ricp Жыл бұрын
Great explanation, thanks a lot!
@rajabhattacharjee6982
@rajabhattacharjee6982 2 жыл бұрын
Illuminating! Thank you
@dimitarkostov8301
@dimitarkostov8301 2 жыл бұрын
Your walkthrough in excell was very helpful. Thank you for the effort!
@pewpewwepwep9296
@pewpewwepwep9296 Жыл бұрын
Brilliant explanation !!
@rob651
@rob651 Жыл бұрын
Amazing! Thank you very much
@FagneTReges
@FagneTReges Жыл бұрын
Thanks for your video Professor Sluiter! I'am a brazilian student, and yours videos helpe me study!!
@netlogis
@netlogis 4 ай бұрын
Step by Step makes sense!!
@laxmirajani1876
@laxmirajani1876 3 жыл бұрын
Great Work Shad!!
@fe4000
@fe4000 2 жыл бұрын
Great lecture, thanks!
@YeloPartyHat
@YeloPartyHat 2 жыл бұрын
Great stuff Professor!
@kartz2010
@kartz2010 3 жыл бұрын
Fantastic!
@jeffvolini2186
@jeffvolini2186 2 жыл бұрын
Very good explanation, thanks!
@An.Individual
@An.Individual 3 жыл бұрын
Nice video. FYI Rivest, Sharmir & Adelman only patented RSA, they were not the first to discover it
@Jarjarbean75
@Jarjarbean75 3 жыл бұрын
thanks for teaching, very clear now.
@dickybear
@dickybear 2 жыл бұрын
Thank you sir! Comprehensible lecture!
@spongebobsquarepants4576
@spongebobsquarepants4576 Жыл бұрын
Best explanation on the internet 🎉
@aimatters5600
@aimatters5600 Жыл бұрын
really helpful man thank you
@McBhayan
@McBhayan Жыл бұрын
You are such a genius creature on the planet earth Prof Sluiter. Hats off!
@the_wizard_exe
@the_wizard_exe 6 ай бұрын
teacher thank's very much for having explained them carefully and well-deatiled, everything was clear ! , break a leg with your videos !
@mirsyedabdulhadi6912
@mirsyedabdulhadi6912 2 жыл бұрын
best video till now
@khanthein1740
@khanthein1740 2 жыл бұрын
THANK YOU SO MUCH YOU ARE A LIFE SAVER
@VehlaEngineer_
@VehlaEngineer_ Жыл бұрын
A great video.
@albanec4702
@albanec4702 2 жыл бұрын
Thank you so much, now everythig become clear)
@CO-wd3pc
@CO-wd3pc 2 жыл бұрын
Best teacher 🙌
@hotbird3
@hotbird3 Жыл бұрын
How come these smart people not have millions of views. Thank you so much , very clear an precise explaination
@marianopatino-paul5062
@marianopatino-paul5062 2 жыл бұрын
Great video
@user-pt9yu8ll8m
@user-pt9yu8ll8m 9 ай бұрын
Thank you very much. You help me solve the issue bothering me for a long time
@shadsluiter
@shadsluiter 9 ай бұрын
You are most welcome
@KnowledgeThroughScholars
@KnowledgeThroughScholars 3 жыл бұрын
Thanks for thr nice explanation. One of the best and easy to understand
@shadsluiter
@shadsluiter 3 жыл бұрын
Glad it was helpful!
@Velvet_hippo
@Velvet_hippo 3 жыл бұрын
Great explanation
@Reroutmd5
@Reroutmd5 3 жыл бұрын
Amazing... keep it up
@natisnotanerd
@natisnotanerd Ай бұрын
I love you Professor Sluiter
@jason54953
@jason54953 2 жыл бұрын
Thank you so much. I'm taking a class for this same topic and you break it down so easily.
@eclypze_
@eclypze_ 3 жыл бұрын
Nice video dude
@Woktavius
@Woktavius Жыл бұрын
confused during the explanation of the decryption where does the 32 mod 14 come from?
@MobilTemp
@MobilTemp 3 жыл бұрын
Amazing
@dubiousinsights4008
@dubiousinsights4008 2 жыл бұрын
So I get that we are calling message "B" as 2, but what's the typical way of converting a longer message to a numeric value ? If I wanted the send the message "Hi" how would I get an "m" to feed into the algorithm
@daboyz6106
@daboyz6106 8 ай бұрын
Really good.
@shadsluiter
@shadsluiter 8 ай бұрын
Glad you think so!
@KrassIankov
@KrassIankov 3 жыл бұрын
Thanks!
@shadsluiter
@shadsluiter 3 жыл бұрын
You bet! Are you studying computer science?
@authenticknowledge9349
@authenticknowledge9349 Жыл бұрын
So as far as I understand there can be more than 1 private keys d that work the exact same way to decrypt a message.Isn't that a vulnerability?
@charliemelga7445
@charliemelga7445 2 жыл бұрын
Thanks very much for posting very helpful , I have a few questions please as there are a few things about the video I do not quite grasp. Can you please explain the follows: In Column 'A' of the spreadsheet the rule is 'must be a coprime of 6 and 14' when I look up the definition of coprime it says "Co-prime numbers are the numbers whose common factor is only 1" You rules out the number 2 and 4, I can see why you rule out 2 because 6 / 2 = 3 and 14 / 2 = 7 (so their only factor is not 1). However taking the 4, 6 /4 = 1.5 and 14 /4 = 3.5 (in other words not pure integers, and I though the result had to be a pure integer i.e. not remainder)? or do you always remove even numbers before starting the maths? Can you please explain/clarify the above for me. One a related note, I did not realise the private / public keys are actually 2 numbers (e.g. two numbers each key) working together. Given a public key do not know of a script (preferably using PoweShell) where I can split the representation of a public key (e.g. byte array) into the two distant values to see that they are ? Thank you very much again for posting :)
@lezmkasd
@lezmkasd 2 жыл бұрын
I was stuck on this too and had to do some googling. When he mentioned the rule that the numbers must be a coprime of 6 AND 14, he meant that 2,3,4,5 has to be coprime with BOTH 6 and 14, or they must share a greatest common factor of only 1. In the case of 4, it will never have a greatest common factor of only 1 because 2 is a factor of 4. It is not asking if 4 is a factor of 6 and 14, which is where I think you were confused about. In the case of 3, its only factor is 1 and itself, but 3 is a factor of 6, which is ruled out. 5 is the only coprime of both 6 and 14, where they all share a greatest common factor of only 1. For your second question, it is extremely hard to find the private key based on the public key because you would need to find two large prime numbers just like he mentioned in the beginning of the video. Modern computers today are not capable of finding those primes but maybe someday when we reach quantum computing. Hope this helped.
@ishimweeric7399
@ishimweeric7399 3 жыл бұрын
thanks mn
@XXBrunX
@XXBrunX 2 жыл бұрын
I don't get one thing, the decrypt number "d" can be 5, 11 and 17. And 5 is the same as the encryption key. What stops an attacker from using 5 instead of 11 to decrypt the message, since all of these 3 values can decrypt it?
@captainnemo6873
@captainnemo6873 Жыл бұрын
I have the same question, using the public key(5,14) can also decrypt the letter "D" out to "B", looking forward to an answer too.
@samlitwin6117
@samlitwin6117 2 жыл бұрын
Can anyone explain why the decrypt step works or where to find that information? I understand the steps but what rules in modular arithmetic lead to the original data being the result of the equation.
@east4205
@east4205 2 жыл бұрын
Hi, question. How would you encrypted a message that is a word or even a sentence e.g. "hello"?
@triquangnguyen7579
@triquangnguyen7579 Жыл бұрын
i am still lost on how to find the e and d. at the part where you choose a co-prime, and the entire process for d.
@lionel4450
@lionel4450 3 жыл бұрын
Does anyone know how to get the d variable as fast as possible in python?
@updatedotexe
@updatedotexe 3 жыл бұрын
Nice video. Must e and d be integers? Are there special rules that these two numbers need to follow? In Excel you said that e < T and e must be coprime with T and N. But you didn't say that in the beginning.
@eggtimer2
@eggtimer2 2 жыл бұрын
This is for entertainment. Not a msth course.
@KDmadness18
@KDmadness18 Жыл бұрын
for finding e, whyd you choose 14?? and how is 4 coprime for 6 and 14???
@crowforcast3583
@crowforcast3583 3 жыл бұрын
Hi, do the primes you encrypt with have to be much larger than the values you are encrypting? I am trying to encrypt the number 77 with your cipher: m = 77 77^5 mod14 = 7 (encrypting) C = 7 7^11 mod14 = 7 (decrypting) M = 7
@robbywelch4716
@robbywelch4716 3 жыл бұрын
hello felix I feel your pain!! I don't know for sure, however this should always work. My theory is that the larger the number you used the more accurate that your calculator or whatever you are using has to be before rounding.
@gd44481
@gd44481 2 жыл бұрын
Hello, m can not be bigger than n
@zeropain9319
@zeropain9319 3 жыл бұрын
why does "de (modN) =1" - what's the basis of this?
@enoname3091
@enoname3091 2 жыл бұрын
yoo does someone know how would u do it with actual text? I've read that you must convert it into numbers and in the video he says that u must use ASCII but how? I would appreciate if u had some material about how to do it without the B=2 thing ( min 11:30 ) .
@gd44481
@gd44481 2 жыл бұрын
There are countless text to ascii converters on the internet. But rsa can only encrypt up to the size of the key, so you would have to generate huge primes to encrypt any meaningful message. (What you can do is encrypt the text with AES and then encrypt the AES key with rsa)
@gd44481
@gd44481 2 жыл бұрын
Also, you dont have to use ASCII. If you really want to encrypt with only rsa then convert every letter of the text to ascii and encrypt each one and maybe store them in an array or something.
@natuu4648
@natuu4648 3 жыл бұрын
This was so easy to understand. Can you do one for elliptical curves primarily for Bitcoin?
@shadsluiter
@shadsluiter 3 жыл бұрын
Thank you. Not planning on the elliptical curves. However, can you suggest a resource?
@ayeshaali6462
@ayeshaali6462 Жыл бұрын
encypting o with (5,14) give a, and decrypting a with (11,14) gives a. how to get o instead of a after decryption?
@MrHardrocker98
@MrHardrocker98 3 жыл бұрын
Is it a problem the decrypted “2” is not exactly integer?
@wadallat2
@wadallat2 3 жыл бұрын
32 mod 4 is exactly 2. In the video what you see is a an approximation since the calculator can not be that precise. Another way of calculating that is that 299,593 x 14 = 4,194,302 which is exactly 2 less than the number in question (4,194,304).
@fablefallen
@fablefallen Жыл бұрын
Im lost how on how 5 is a number co prime with 6 and 14?
@Kevin-kk2rx
@Kevin-kk2rx 2 жыл бұрын
I tried some different messages using the keys you used here and found any message that exceeds n(14 in this case) will not decrypt correctly. Is this an error on my part or is this a normal limitation of rsa?
@gd44481
@gd44481 2 жыл бұрын
Thats a limitation
@aurelio4601
@aurelio4601 Жыл бұрын
good explanation, however from your example you could have chosen multiple keys. This means that for each public key there are multiple private keys?
@Astro-Markus
@Astro-Markus Жыл бұрын
I understand what's happening here, however nobody encrypts anything just to decrypt it again afterwards. You want to send the encrypted message to someone who can decrypt it. And you certainly don't send them your private key. And the receiver has their own private key, which is most probably based on different prime numbers. So, how does that work together with the public key?
@shashikiranburugala9141
@shashikiranburugala9141 2 жыл бұрын
Can any one please reply me..? I've got d value as 0 , what to do if we get as such... Please reply faster no time... 😭
@otooleger
@otooleger 3 жыл бұрын
very interesting. I wonder how many 'secret' documents from the 1990's are now unsecure?
@shadsluiter
@shadsluiter 3 жыл бұрын
Probably most of them by now.
@kartibok001
@kartibok001 3 жыл бұрын
Great video - Could some one explain - at 8.08 he mentions you can't use 4 because it is even, leaving us with 5. In my head though the factors of 6 and 14 are 1,2,7,14 and 1,2,3,6. Why not even?
@Jamie-ef9dl
@Jamie-ef9dl 2 жыл бұрын
Bit late but the requirement is they need to be Coprime, so they cannot share factors, as 4 has factors 1,2,4 they all share a factor of 2 which is why
@kartibok001
@kartibok001 2 жыл бұрын
@@Jamie-ef9dl Much appreciated.
@_i_m_
@_i_m_ 2 жыл бұрын
buy how does an computer decides which two huge prime numbers to chose? How does he know they are prime?
@stevenshrii
@stevenshrii Жыл бұрын
For I = 2 to (amount - 1): if (( amount mod I) = 0) then print I :next i
@rohanhasani807
@rohanhasani807 2 жыл бұрын
but when the message is encrypted using the public key and once we have the encrypted message, one can always reverse engineer to breakdown the message. This method of encryption is only useful when the public key generates different encryption text even after giving it the same input message.
@davep8221
@davep8221 Жыл бұрын
In the real world, don't you need to make sure that N is large enough to cover the symbol range you wish to encrypt? E.g. for alpha text, 1.. 26 --> T >= 27. And then you need two primes whose multiple is >= 27, say (3,11), (5,7). Of course it'll be (Yuge prime, Bigly prime), but I'm just asking about the "min" value for p, q. Would 0.. 25 be allowed? It would handle the number of symbols, but I'm not sure if 0 would break any of the math.
@oliviervanlier4947
@oliviervanlier4947 3 жыл бұрын
Very well explained sir, but if you use the encoding as A=1 , it will not get encrypted since 1^e mod N = 1 ... so i guess just using normal ascii code is a better way of doing things?
@albertroswell
@albertroswell 3 жыл бұрын
it IS encrypted, it just happens to be encrypted to the same value but that is unknown to the public, next letters will be encoded to something different
@abeladerese8593
@abeladerese8593 2 жыл бұрын
tankes pro
@orhanaygun7298
@orhanaygun7298 2 жыл бұрын
bilale anlatır gibi anlatmış. helal olsun!
@najeebbenawa
@najeebbenawa 3 жыл бұрын
1. for the part of choosing e and d, we got the 6 is T and the 14 is N. Is this correct? 2. how was 5 coprime with 6 and 14? Can you elaborate this 2, 3, 4 removal process and reasons?
@elisavetkonstantopoulou5386
@elisavetkonstantopoulou5386 3 жыл бұрын
1. N=14 and T=6, that is correct, yes 2. Two numbers are co prime if they have no positive integer that can divide both, except for 1. - we remove 2 because the factors of 2 are: 1, 2 , the factors of 6 are: 1, 2, 3 and the factors of 14 are: 1, 2, 7, 14. We can see that 2 and 6 are not co prime, since the have two common factors (1 and 2). For the same reason 2 and 14 are not co prime. - we remove 3 because the factors of 3 are: 1, 3. We can see that 3 and 6 are not co prime, since the have two common factors (1 and 3). Even though 3 is co prime with 14, we need a number that is co prime with both 6 and 14. - we remove 4 because the factors of 4 are: 1, 2, 4. We can see that 4 and 6 are co prime, since the only common factor is 1 and the same thing goes for 14. But 4 is an even number and if we choose even numbers there is a possibility that (e x d) mod T will not be 1. (the same logic could be applied to 2) - we are left with 5 and we keep it, because 5 has no common factors with either 6 or 14, except 1, so 5 and 6 are co prime and 5 and 14 are co prime. I hope this cleared things out for you!
@KnowledgeThroughScholars
@KnowledgeThroughScholars 3 жыл бұрын
Thanks, i was also this question in my mind. Now it clear to me
@stupossibleify
@stupossibleify 3 жыл бұрын
Can you explain why decrypting RSA without knowing the privately held prime factor is difficult?
@wadallat2
@wadallat2 3 жыл бұрын
Without that prime factor you can not decrypt. Find that factor is not at all simple, there isn't a simple and efficient way of doing that. While it may not be apparent when working with small numbers it becomes very difficult with numbers that are hundreds digits long. There is a section in the video starting from 15:37 which is related to that. For example a 232 decimal digits number was factored in 2009 and an "only" 8 digits longer (240 digits) were factored in 2019. Adding 8 digits took another 10 years to solve. Now, the most recent RSA numbers have hundreds more digits. Unless something revolutionary happens (e.g. success of quantum computers) I think we are safe.
@bakobaxtyar8453
@bakobaxtyar8453 Жыл бұрын
where does 14 came from ??????
@dominiquerossignol2212
@dominiquerossignol2212 2 жыл бұрын
Great content sir, but let me try coding the letter m by its code ASCII=109 Coding RSA gives 109^5(mod 14) = 9 Decoding RSA gives 9^11(mod 14) = 11 We know that 109 (mod 14) = 11 Decoding gives multiple solutions, so we cannot retreive only original number that is 109 Could you clarify ? Regards
@gd44481
@gd44481 2 жыл бұрын
Hey i might be late but you cant encrypt where n < message
@ryklin1
@ryklin1 2 жыл бұрын
@@gd44481 in my experience, when implementing any hash function, the mod value must be > than the length of the array holding the data.
@ayeshaali6462
@ayeshaali6462 Жыл бұрын
@@ryklin1 encypting o with (5,14) give a, and decrypting a with (11,14) gives a. how to get o instead of a after decryption?
@learnwithcode4211
@learnwithcode4211 3 жыл бұрын
why dislike?
@romansiry637
@romansiry637 3 жыл бұрын
I presume this video explains RSA simple way but this method crypts letters always into same number, which makes it valuable to letter frequency decryption (extremely easy to solve). How is it sorted?
@samueldomb110
@samueldomb110 9 ай бұрын
where the 14 came from ? minute 7.58
@shadsluiter
@shadsluiter 8 ай бұрын
N = 2 * 7.. See 6:10
@ardaakyigit7939
@ardaakyigit7939 3 жыл бұрын
I think there is a mistake in your example. (kzfaq.info/get/bejne/oJh-ddySm6eog40.html) When I send an encrypted message (encrypted with his public key) to a friend, he doesn't need my public key to decrypt it. Because he can only decrypt it with his private key. So there is not any relation between my public key and the message which I send to him. What do you think about it?
@wadallat2
@wadallat2 3 жыл бұрын
I think you are right. If I send a message to you I would need your public key so I can encrypt the message and you will need your own private key to decrypt that.
@MichaelApproved
@MichaelApproved 3 жыл бұрын
You’re right, he mixed up examples in his explanation. He was referring to a cryptographic signature. The signature process is a way of proving the message came from you. To sign a message, you encrypt it with your private key. That encrypted message can be decrypted by your public key, which everyone should have. The point of that encryption isn't to hide the contents, it's to prove that it was written by you. If the message gets decrypted properly with your public key, then it must've come from you because only you (should) have the private key it was encrypted with. Getting back to this mixup. When you send someone a message, you want to encrypt it with their public key but you ALSO want to sign it with your private key, so your friend knows it really came from you and not an imposter. That's why your friend would need their private key and your public key. Their private key would be used to decrypt and your public key would be used to authenticate the encrypted signature you included.
@adrianvmois9426
@adrianvmois9426 Жыл бұрын
@@MichaelApproved for digital signature is not about the encryption of the whole document, is about obtaining a hash (a short string of the document) and that is signature and is obtained with the use of the private key (the sender uses his private key to create the digital signature hash). Then the receiver use sender's public key to verify that the hash is autentic, to confirm the signature was created with the real private key.
Breaking RSA - Computerphile
14:50
Computerphile
Рет қаралды 355 М.
How does AES encryption work? Advanced Encryption Standard
12:50
Programming w/ Professor Sluiter
Рет қаралды 108 М.
Жайдарман | Туған күн 2024 | Алматы
2:22:55
Jaidarman OFFICIAL / JCI
Рет қаралды 1,7 МЛН
아이스크림으로 체감되는 요즘 물가
00:16
진영민yeongmin
Рет қаралды 43 МЛН
Мы никогда не были так напуганы!
00:15
Аришнев
Рет қаралды 6 МЛН
I Can't Believe We Did This...
00:38
Stokes Twins
Рет қаралды 88 МЛН
Hashing vs Encryption Differences
19:38
Programming w/ Professor Sluiter
Рет қаралды 164 М.
RSA Encryption From Scratch - Math & Python Code
43:30
NeuralNine
Рет қаралды 27 М.
RSA-129 - Numberphile
9:40
Numberphile
Рет қаралды 514 М.
What is Public and Private Key Encryption?
6:55
Programming w/ Professor Sluiter
Рет қаралды 87 М.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
Prime Numbers & RSA Encryption Algorithm - Computerphile
15:06
Computerphile
Рет қаралды 172 М.
Digital Signature Algorithm (DSA) - Cryptography - Practical TLS
5:47
Practical Networking
Рет қаралды 62 М.
How does RSA Cryptography work?
19:40
Tom Rocks Maths
Рет қаралды 61 М.
Extended Euclidean Algorithm Example
14:50
John Bowers
Рет қаралды 306 М.
Собери ПК и Получи 10,000₽
1:00
build monsters
Рет қаралды 2,3 МЛН
Опять съемные крышки в смартфонах? #cmf
0:50
Mastering Picture Editing: Zoom Tools Tutorial
0:52
Photoo Edit
Рет қаралды 503 М.