What is this? A new video already? It hasn't even been a year yet! Just kidding, I'm really happy that I managed to upload a second video this summer. This one is quite different from my usual style though, but I wanted to participate in SoME2. Please let me know what you think!
Great Video there's only a slight problem I have with it. Namely that you say that the private key is for encryption and the public key for description, while this is probably the most common use case it can lead to confusion when thinking about digital signatures since there the roles are reversed. Just something that took me a while when first learning about public key crypto
You're absolutely right. I should have pointed out that there are usecases where the keys' roles are reversed. I didn't think about it because I only talked about RSA in the context of message encryption, but the math I showed also works for private key encryption.
A new video of name pointer :O Edit: Man, this is such an interesting topic, after watching this video, I can say, I learn something new, and I understand most of it, I live this chanell and the guy that make this videos, keep the good work :D
What would happen if the man in the middle just send it's own key instead of proxy the public key of person b so he could be able to decrypt the messages and reencrypt them using the public key of person b so nobody would notice anything?
Although modifying and injecting messages is a lot more difficult than just reading them, what you describe could be a significant security threat if an attacker succeeded to do so. Luckily, there is something called "Signing" to combat that. You can learn more about it on the RSA Wikipedia page.
But you already know Bob’s public key. That’s the starting state of the algorithm. No one sends their public keys. This is because RSA is a secure encryption algorithm, not secure communication algorithm.
@@NamePointer true but in the use case of https that is done through a chain of trust and the DNS servers since one public key is enough to start a secure conversation. And you shouldn't be using RSA for communication since it's way to inefficient compared to a symmetric encryption like AES so most of the time RSA is simply used as a method to securely establish an AES tunnel
Very Interesting and informative Great Job. Quick note p and q don't have to be prime numbers. They need to prime to each other! This is one of the reasons the Riemann hypothesis and prime numbers theories are super important.
Thank you for the feedback! However, if p and q are not primes, the proof of correctness wouldn't be valid anymore, as it used Fermat's little theorem which requires them to be primes, or am I missing something?
The irony is that the video shows that you don't actually need a VPN to have an encrypted internet connection, you just have to use secure apps and only access HTTPS websites!
@@brendawilliams8062 the quantum mainframe can obliterate rsa, good luck prime numbers, you bout to be cyber cracked by the triangulations of the quantum spherical nature of the encrypted 4-dimensional realms
6:10 Your definition of prime numbers is not quite correct. Specifically, you need to replace your use of the word “integer” with “positive integer.” If you were trying to allow for negative primes, then you can’t say “greater than one” and “…product of _smaller_ positive integers…” You would have to say “Nonzero” and “Can’t be written as the product of two nonunits (e.g. not +1 or -1)” respectively.
@@NamePointer Yes, but you didn’t say that the _two factors_ had to be greater than one or even positive. Just “smaller integers.” Thus, a factorization like 7=(-1)(-7) would rule out 7 from being prime, by your definition.
What is this? A new video already? It hasn't even been a year yet!
Just kidding, I'm really happy that I managed to upload a second video this summer. This one is quite different from my usual style though, but I wanted to participate in SoME2.
Please let me know what you think!
it was a great video, a nice refresher of the topic
It was very helpful to understand these concepts mathematically. Thanks for the video!!
Great Video there's only a slight problem I have with it. Namely that you say that the private key is for encryption and the public key for description, while this is probably the most common use case it can lead to confusion when thinking about digital signatures since there the roles are reversed. Just something that took me a while when first learning about public key crypto
You're absolutely right. I should have pointed out that there are usecases where the keys' roles are reversed. I didn't think about it because I only talked about RSA in the context of message encryption, but the math I showed also works for private key encryption.
This was great! Hope you're able to put out more explainers one day!
A new video of name pointer :O
Edit: Man, this is such an interesting topic, after watching this video, I can say, I learn something new, and I understand most of it, I live this chanell and the guy that make this videos, keep the good work :D
glad you are still around keep up the good work
Absolutely amazing video! Subscribed.
What would happen if the man in the middle just send it's own key instead of proxy the public key of person b so he could be able to decrypt the messages and reencrypt them using the public key of person b so nobody would notice anything?
Although modifying and injecting messages is a lot more difficult than just reading them, what you describe could be a significant security threat if an attacker succeeded to do so. Luckily, there is something called "Signing" to combat that. You can learn more about it on the RSA Wikipedia page.
But you already know Bob’s public key.
That’s the starting state of the algorithm.
No one sends their public keys.
This is because RSA is a secure encryption algorithm, not secure communication algorithm.
@Fullfungo actually, the public keys have to be sent once after having been generated, otherwise, how is the other person supposed to know it?
@@NamePointer true but in the use case of https that is done through a chain of trust and the DNS servers since one public key is enough to start a secure conversation. And you shouldn't be using RSA for communication since it's way to inefficient compared to a symmetric encryption like AES so most of the time RSA is simply used as a method to securely establish an AES tunnel
@@conando025 you're right about its usage.
Very Interesting and informative Great Job. Quick note p and q don't have to be prime numbers. They need to prime to each other! This is one of the reasons the Riemann hypothesis and prime numbers theories are super important.
Thank you for the feedback! However, if p and q are not primes, the proof of correctness wouldn't be valid anymore, as it used Fermat's little theorem which requires them to be primes, or am I missing something?
@@NamePointer The proof can be amended with Euler's theorem, which generalizes Fermat's little theorem.
good explanation
Cool video, would be cool to see you remake discord lol
Bro I was expecting a NordVPN ad the whole video🤣
The irony is that the video shows that you don't actually need a VPN to have an encrypted internet connection, you just have to use secure apps and only access HTTPS websites!
Super cool and well-made video, I still have no idea what I just watched though.
It seems to me a bunch of different triangulations that you don’t want to step on toes with. I never investigated computers.
@@brendawilliams8062 the quantum mainframe can obliterate rsa, good luck prime numbers, you bout to be cyber cracked by the triangulations of the quantum spherical nature of the encrypted 4-dimensional realms
@@Baezor I just can’t get it. All I can figure is prime numbers are dangerous.
@@brendawilliams8062 exactly! prime numbers are actually evil!
@@Baezor that is what I thought. You can’t work on anything that’s been bought and sold.
Nice video can you make a tutorial channel where you implement the topics in one program
Great video! Subbed
Oof, that opening sentence stung.
Great educational video!
Alice and bob definitely didnt touch grass for the last 6 months, lol
Thankyou.
namepointer its been 11 months please make a new video im getting so bored in my basement
Ok
@@NamePointerhuh
Yes lads
@@NamePointerits been almost 2 years now please new video
its been 2 years now
gotta love cryptography
Luckly I had it in school
halo?
I think you're not very happy with the channel, have you decided to take a break? (the ratio between views and likes is visible.)
Huh suddenly you seem like Nas daily :|
U quit again aye?
No
Where are you
6:10 Your definition of prime numbers is not quite correct. Specifically, you need to replace your use of the word “integer” with “positive integer.”
If you were trying to allow for negative primes, then you can’t say “greater than one” and “…product of _smaller_ positive integers…” You would have to say “Nonzero” and “Can’t be written as the product of two nonunits (e.g. not +1 or -1)” respectively.
Thanks for the feedback, however I explicitly said "greater than one" to account for that
@@NamePointer Yes, but you didn’t say that the _two factors_ had to be greater than one or even positive. Just “smaller integers.” Thus, a factorization like 7=(-1)(-7) would rule out 7 from being prime, by your definition.
Oh yes I understand you now. Thanks for pointing that out!
@@NamePointer No problem.
i dont even remember subscribing to this guy
Same lol
I hope you enjoyed the video though :)
@@NamePointer didn’t watch it though
no hard feelings
@@portalguy1432 that is rude man...
@@portalguy1432 lets go find who asked