How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi)

Поділитися
Вставка
  • Опубліковано 29 лис 2024

КОМЕНТАРІ • 316

  • @gibsonman507
    @gibsonman507 6 років тому +64

    This is the best RSA explanation I've seen

    • @santaclaus897
      @santaclaus897 4 роки тому

      me too

    • @fnamelname2445
      @fnamelname2445 4 роки тому +2

      Better explained than my professor in college ... for which i pay hefty tuition fee each semester. lol

    • @sharonomonua1747
      @sharonomonua1747 3 роки тому

      @@fnamelname2445the only thing i don't understand is mod how is it used and like what is it

    • @fnamelname2445
      @fnamelname2445 3 роки тому

      @@sharonomonua1747 Mod or modulo only returns the remainder of a division operation. For instance, if you divide 5 into 5, the result is 1. But if you divide 5 into 3, the remainder is 2. Therefore, we write 5 modulo 3 = 2.
      These videos might help:
      1 - ua-cam.com/video/6dZLq77gSGU/v-deo.html
      2 - ua-cam.com/video/4zahvcJ9glg/v-deo.html

    • @lukacavara6254
      @lukacavara6254 3 роки тому

      Cleanly explained without messy hand written scribbles many UA-cam publishers practice

  • @michaelschepens3750
    @michaelschepens3750 8 років тому +21

    I was trying to understand the Wikipedia page on this topic with some difficulty. Your video did an excellent job of explaining it simply. Thanks a lot.

  • @InshuMussu
    @InshuMussu 5 років тому +102

    You spent your time to save our time, double likes from me

  • @zx600e93
    @zx600e93 5 років тому +4

    Nice simple introduction and the slow transitioning of deeper and technical understanding with step by step interactivity in processing the RSA algorithm. Finally, ending with a real life example using Amazon's cart totally amazed me how it all works together. I'm sharing this with one of my Math Faculty members who teaches math for teachers, she'll be impressed to see how cryptography applies in real life and that most people don't know it. Thank you for taking the time out and scripting this too, good job, and an A+!

  • @Blacktouch2000
    @Blacktouch2000 4 роки тому +1

    I spent my life searching for this video. I am eternally grateful.

  • @ianfitchett2768
    @ianfitchett2768 9 років тому +20

    I just wanted to say that the way you showed the extended Euclidean algorithm was not something I had seen before and it made my work SO much easier. You've more-than earned my like.

    • @asfandalikhan6269
      @asfandalikhan6269 7 років тому

      extended euclidean algorithm is far easier than this technique and less time consuming. whereever you go there's just a matter of time and if you are slower then no one cares :)

  • @thebestisyettocome7
    @thebestisyettocome7 4 роки тому +1

    Very good explanation of the RSA algorithm, one of the best I've seen on UA-cam.

  • @chrominox
    @chrominox 9 років тому +39

    The Extended Euclidean Algorithm method you've shown here was absolutely stellar. It made my job very easy. Thanks a ton, mate.

  • @DutchlimitsDesign
    @DutchlimitsDesign 4 роки тому +2

    You have the best explanation from all the video's ive seen regarding RSA. Thanks so much!

  • @dkarthiganesh
    @dkarthiganesh 5 років тому

    This is great explanation. Helped me to solve d for (e,N)=(53,299) and encode(m)=171. Thanks a lot.

  • @OldFilmCameras
    @OldFilmCameras 3 роки тому

    This has to be one of the best if not the very best explanation of the RSA algorithm that i've come across, Thank you!

  • @mohammedusama5869
    @mohammedusama5869 4 роки тому +4

    This video was such a gem that it explained almost everything of the concept clearly in just a couple of minites
    Thanks mate, you made me very happy today

  • @chrisweaver7989
    @chrisweaver7989 3 роки тому +1

    OMG! so I am being taught Maths in uni and its basically everything in this getting me ready for next year. I find it hard to follow the lecturer sometimes and this is amazing! I need to also program a crypto algorithm and this gives me a good base! THANK YOU!

  • @TechnikMeister2
    @TechnikMeister2 5 років тому +19

    As Edward Snowdon said recently and as Gordon Welchman said 70 years ago, a computer generated algorithm thats creates a cypher can always be decrypted. The only true unbreakable encryption is a non computer generated one time pad. Its still used today. There is a guy in Switzerland who has a barrel with 50,000 dice and it spits out five dice in a row it then grabs them back and the next turn does the same. He will manually create one time pads for you at a cost of $500, good for 10,000 characters. No machine, not even a simple typewriter is used. They are written out by hand and you get both copies. He keeps no records of who buys them. Swiss banks now use them to protect their clients transactions after the US got a court order for computer records of US Taxpayers. Now not even the banks know.

    • @unh0lys0da16
      @unh0lys0da16 4 роки тому +3

      Sure it can be decrypted, it just takes 1000 years

    • @rickyc1991
      @rickyc1991 4 роки тому

      I'm very interested to learn more! Do you know what the non-computer generated method is called? I'm having trouble finding it.

    • @markstephens8423
      @markstephens8423 4 роки тому

      There is an encryption program out there named Vial 7 - Only way to get a copy is if you know the person. Each copy is made to order and it will only work on the users computer. He hard codes the key into the program and puts the location of the file somewhere on the computer at the request of the client. When you try to use the program it looks for the key and if it's not found it will close the program, so everyone that wants to communicate with that program they have to have a custom made version to work on their computer. The encryption math is said to make RSA look like 1+1. If you are not government USA, you will never own it. After it locates the key to use it then the real encryption begins and if you use the same password every time, the encryption out put will always be different, that means there is no standard algorithm with the exception of unlocking the program for use. Estimated bit strength - Unknown because the more text there is the higher the bit strength gets.

    • @Amazing._Games
      @Amazing._Games 5 місяців тому +1

      They can use cryptographic random number generators

    • @BoleDaPole
      @BoleDaPole Місяць тому

      But it's never truly random, that's why it has to he done manually

  • @anandsuralkar2947
    @anandsuralkar2947 5 років тому +3

    Best video on RSA mathematics..so far and finally i am able to get maths behind RSA

  • @samosapakora9086
    @samosapakora9086 9 років тому +2

    I really have to say that was top notch, clear, simple, articulate. Thank You!

  • @TON-vz3pe
    @TON-vz3pe 5 років тому +1

    Fantastic Job. Like others said , "By far the best Explanation of RSA Algorithm" after scraping the entire UA-cam

  • @hqiu6828
    @hqiu6828 6 років тому +1

    Excellent explanation! You reveal the magic behind the RSA encryption-decryption algorithm!

  • @MissNorington
    @MissNorington 2 роки тому +6

    Thank you for making this easy to understand! I am no good with math but I like to be able to use it from time to time! 😀

  • @caitancorreia8379
    @caitancorreia8379 7 років тому

    thanks,
    the way to find 'd' using a short-cut version of the EEA is a life saver :)

  • @suphasitthongniam9082
    @suphasitthongniam9082 9 років тому

    Thank you so much. I have confused about RSA for a while , I just watched your video and now I clearly understand about RSA Algorithm. Thanks so much.

  • @MustafaAlhadi
    @MustafaAlhadi 9 років тому +10

    Dude... you are a time saver, thank you very much for this great and clear video

  • @iycgtptyarvg
    @iycgtptyarvg 7 років тому +2

    Thanks for the video. It helped that I already understood the process, but this is still useful. It would perhaps have been informative to explain to people why we use phi = (p-1)(q-1), but hopefully they will search the Internet to see why that is so.

  • @EMate-vu3ku
    @EMate-vu3ku 7 років тому +2

    Thank you very much for this video! It is of excellent quality and I could understand it easily despite I'm only at secondary school. It is the best explanation I've come across both in print and on the internet. Many thanks!

    • @freewheelburning8834
      @freewheelburning8834 2 роки тому

      what other reads have you found in print that's this intuitive? (just curious)

    • @EMate-vu3ku
      @EMate-vu3ku Рік тому +1

      @@freewheelburning8834 There was a section about this in Marcus du Sautoy's book, The Music of Primes. I recommend it, a fascinating read!:)

  • @muhammadlawal6719
    @muhammadlawal6719 6 років тому

    thank you very much . i was confuse before about how to get d bt i am now satisfied with explanation.

  • @tehownerer1547
    @tehownerer1547 9 років тому +13

    Amazing video.
    TO ANYONE CONFUSED: LEARN ABOUT THE EUCLIDEAN ALGORITHM AND THEN STUDY THE EXTENDED EUCLIDEAN ALGORITHM INDEPENDENT OF RSA.
    That might help.

    • @Ali-mi9up
      @Ali-mi9up 5 років тому

      more importantly the eulers theorem

  • @bennetbraune2513
    @bennetbraune2513 3 роки тому

    Thank you, I got stuck implementing the RSA in Python at "d". your calculation path was easy to implement.

    • @vishalmishra3046
      @vishalmishra3046 3 роки тому

      Use d = pow( e, -1, (p-1)*(q-1) ) in Python3.8 built in function (not math.pow).

  • @davidhedin-abreu4426
    @davidhedin-abreu4426 7 років тому

    Terrific video Anthony, I used it to teach the mathematics of RSA and to write an example Java program for encryption and decryption.

  • @marciocastro7101
    @marciocastro7101 4 роки тому +5

    Good explanation, but is important to point that e must be coprime with phi and N. With small numbers, it's relatively easy to pick a value for e, but if p and q have 30 digits each...

    • @nafiz1938
      @nafiz1938 2 роки тому

      no need to coprime with N, just coprime to phi

    • @marciocastro7101
      @marciocastro7101 2 роки тому

      @@nafiz1938 whatever, same problem because of big numbers.

    • @kimkarlson7820
      @kimkarlson7820 2 роки тому

      @@marciocastro7101 Ever heard of Fermat primes? It shouldn't take you longer than a fraction of a millisecond to find a suitable e.

  • @cdemetriad
    @cdemetriad 6 років тому +1

    Very well explained, it helped me a lot. Good, simple graphics and good, timed voice. THANKS!

  • @crypticnomad
    @crypticnomad 5 років тому +1

    This is actually super useful for what I am currently working on. I'm attempting to generate rsa keys using a seeded rng which uses bitcoin's bip39 seed or "mnemonic phrase".

  • @deepakrai6353
    @deepakrai6353 8 років тому

    Its very good description of RSA .I am became fan.................

  • @andrewlittle9569
    @andrewlittle9569 7 років тому +1

    This video makes it much easier to understand. Thanks a lot!

  • @davidr.flores2043
    @davidr.flores2043 9 років тому +1

    Anthony, great work sir. I appreciate your effort, very well done and you know the topic inside-out. Kudos to you man!

  • @gaastonsr
    @gaastonsr 4 роки тому

    Best explanation I could find on UA-cam. Thanks!

  • @mariomax2960
    @mariomax2960 6 років тому

    the best course I've ever seen about rsa !!!!

  • @Lucaemar
    @Lucaemar 8 років тому

    Finally got it, now I can complete my math's paper. Hallelujah & thank you

  • @kf4426
    @kf4426 4 роки тому

    This is hands down the best RSA video out there. Too bad it took me so long to find it >.

  • @madhabahlal-madinah4309
    @madhabahlal-madinah4309 Рік тому +1

    A simple trick to get the d as well: d = e-1 mod φ(n). Let's take the example in the video:
    e = 7
    φ(n) = 40
    7^-1 mod 40 = 23
    and that's how you can get it without going through the steps of the Extended Euclidean Algorithm

  • @ariayang2980
    @ariayang2980 5 років тому

    My mind is blown, the shortcut method. Nice 👍

  • @raghuma1
    @raghuma1 9 років тому

    wow awesome video...i finally found short and clear cut explanation of algorithm to find d.
    thank u so much for this awesome video

  • @JWentu
    @JWentu 9 років тому

    One of the best explanations that i found on the topic. thankx a lot

  • @Chaya-uv6oq
    @Chaya-uv6oq 4 роки тому

    u made my day & saved my time & I love you
    not rly but great video & u explained everything so well & simply that even I could follow & now I wrote a working python script & I'm happy ^^

  • @An.Individual
    @An.Individual 4 роки тому

    Thanks for this terrific explanation.

  • @kirkouimet
    @kirkouimet 10 років тому +2

    This is awesome Tony! Thanks for creating and sharing! Hope to see more like it :)

  • @zholud
    @zholud 6 років тому

    I wish you have explained 1) how does one generate 2048 bit primes p and q and 2) how computationally expensive it is to raise large m to the power large d mod large n when decrypting? How do you compute 5634644664688854133766886678^7754467997556567 mod 344346456654567776554345667885677777779 for example? Apart from that the explanation is clear, thanks for the video!

    • @vishalmishra3046
      @vishalmishra3046 3 роки тому

      Use built-in pow() function in Python3.8 (takes milli-seconds to answer for huge numbers)
      >>> pow(5634644664688854133766886678, 7754467997556567, 344346456654567776554345667885677777779)
      216531167112280961897015422503817866282

  • @brandondupuis8243
    @brandondupuis8243 8 років тому +5

    to find d : (k*PHI(N) + 1)/e. increment k by 1 until the answer is a round number. EX:
    ((1x1872) + 1 )/7 = 267.571... (not working, not a round number) ---> increment k by 1--->
    ((2x1872) + 1)/7 = 535 .... so d = 535 in that case.
    now you can build a simple program to find d , using this concept and loops

    • @asddsaaassddd
      @asddsaaassddd 6 років тому

      wouldnt this take very long if ur numbers are huge?

    • @zayedzihan6594
      @zayedzihan6594 6 років тому

      thank u, it helped...

    • @vishalmishra3046
      @vishalmishra3046 3 роки тому

      Use Python3.8 built-in function d = pow(e, -1, phi) for mod inverse calculations if you don't want to implement on your own.

  • @TheMrVogue
    @TheMrVogue 8 років тому +3

    Minor mistake at 6:28, you said the result is two thousand five hundred seven, and we can see it is 2557. Cheers though, this is the best RSA tutorial I've found to date.

  • @Melrix
    @Melrix 9 років тому +1

    Thank you very much! It was awesome. Nice and clear explanation.

  • @conanalbrecht5157
    @conanalbrecht5157 10 років тому +1

    Very descriptive of the mathematics. Awesome.

  • @tomay3000
    @tomay3000 9 років тому +3

    Nice, this is a very nice and clear explanation.
    Well done (y)

  • @teus1500
    @teus1500 7 років тому +2

    Hello, very nice explanation. Now, I read somewhere that if I want to have a 8bits key, my 'n' needs to be less than 2^(8), but I saw many resolutions where they use a 'n' that is > 2^(key lenght that they want). Could someone light me up?

  • @wramarante
    @wramarante 5 років тому

    Useful ^ 4096 = A better word to be used at the end of the video. Thanks for sharing.

  • @ahmedghazii4964
    @ahmedghazii4964 9 років тому

    THANKSS A LOT
    its working with all
    except p=11 q=3
    gives d=2 and the right answer is d=3 :)

    • @fmaleknia
      @fmaleknia 5 років тому

      for p=11 and q=3, then n=33 and Phi=20, if e=3 then d=7.
      you may not choose e=2 as it has co-factor with Phi=20.

  • @cybotx3872
    @cybotx3872 9 років тому

    That was Excellent, Anthony !
    Great Work !

  • @pobg807
    @pobg807 4 роки тому

    this video is PERFECTION

  • @finestinlondon8837
    @finestinlondon8837 8 років тому +2

    Dude, this has helped amounts that you can't even imagine - thank you so much! 'Liked' the video too. I'm trying to write a bit of code to replicate RSA's encryption method, but was struggling to work out how to calculate 'd', and this worked wonders. Thank you again.
    Just a quick query though, how did you get -34 MOD 40 to equal 6? Mathematically, doesn't this equal -34? When I get a negative number, should I be adding the value of phi (until the value becomes positive) instead of MOD'ing the value by phi?

    • @JimVekemans
      @JimVekemans 8 років тому

      39 MOD 40 = 39
      100 MOD 40 = 20 because there's 20 LEFT! after subtracting 40 two times.
      so, you don't try to see how much less -34 is than 0, you try to find out how much MORE -34 is than -40. Which is 6.

    • @finestinlondon8837
      @finestinlondon8837 8 років тому

      +Jim Vekemans ah, this makes complete sense. So you simply just take the absolute value - thank you for your help!

  • @Ha1ization
    @Ha1ization 8 років тому

    Great work Anthony. Thank you kindly.

  • @chaitanyavinnakota9909
    @chaitanyavinnakota9909 5 років тому +1

    Thanks a ton. Immensely helpful explanation.

  • @wabafethacker1552
    @wabafethacker1552 5 років тому

    I really liked your explanation

  • @bharathnayakb
    @bharathnayakb 4 роки тому

    Best explanation 👍

  • @SkelleRok
    @SkelleRok 5 років тому

    Thank you for this awesome and clear tutorial.

  • @AhmadShahwaiz
    @AhmadShahwaiz 9 років тому

    Hey ++Anthony The only confusion I'm getting is that d value is not the greatest common divisor. Check with these values
    p=5 q=7, e=5, n=35. The value of 'd' I get is 5. But in another solution it is 29.

    • @vishalmishra3046
      @vishalmishra3046 3 роки тому

      phi = (p-1)x(q-1) = 4x6=24. So, d = 5 (mod 24) = [5, 29, 53, 77, 101, 125, 149, 173, 197, 221, ...]. Hence infinite solutions > 24.

  • @minomino200
    @minomino200 5 років тому

    Thanx bro......it help me a lot

  • @karimbarakat7732
    @karimbarakat7732 4 роки тому

    thank you, your explanation was just great.

  • @sigmaK9
    @sigmaK9 7 років тому

    There's a significant disadvantage to your swift method of finding d. Not many people do it this way, which means if a student doesn't understand your method, he's hosed if he searches elsewhere. Also, when you mentioned the Euclidean and Extended Euclidean, you only assured we'll be getting to that later. But you never actually pointed out that we have gotten there once we started up on finding d. I happen to recognize where the EucAlgorithms came in but only because I've spent the last three weeks or so studying the damn stupid formula and falling FURTHER behind in my class as a result. I would remedy this if I were you.
    That said, however, this is a very good tutorial. At last, at fucking LAST I understand what all these formulas are for in RSA. Even with all the UA-cam videos available, up until this point, I had been bashing my head against the wall, trying to figure out, "Euler! Phi! Totient! GCD! Extended GCD! Euclidean! Extended Euclidean! What in the fuck am I studying this shit for?!?!"
    So thank you for clearing this up.

    • @vishalmishra3046
      @vishalmishra3046 3 роки тому

      Use pow() the built-in function in Python3.8 - e.g. d = pow(e, -1, (p-1)*(q-1) )

  • @alvianibnuburhan2484
    @alvianibnuburhan2484 7 років тому

    You are the best brohh big thanks

  • @AkumaRaion
    @AkumaRaion 9 років тому

    this is a great explanation of rsa. thanks a lot.

  • @michaelmcgoldrick5241
    @michaelmcgoldrick5241 3 роки тому

    Thank you this was very helpful

  • @tiyasharma441
    @tiyasharma441 6 років тому

    So clear and crisp

  • @Magicsquarepuzzles
    @Magicsquarepuzzles 4 роки тому

    Very well explained

  • @abderrahmanghorfy3281
    @abderrahmanghorfy3281 9 років тому

    Excellente video and explication, GREAT JOB!!!!

  • @duniajamma6031
    @duniajamma6031 7 років тому +1

    In the last example, if you calculate 3 * 6219 mod 2328 = 33 not 1

  • @justincaseOne
    @justincaseOne 5 років тому

    thank you very much...Very useful nd very clear

  • @LivingVacuum
    @LivingVacuum 6 років тому

    I will decompose the RSA of any complexity into multipliers. Fast and not expensive.

  • @fruney_x
    @fruney_x 9 років тому

    Thank you, that was clear and to the point.

  • @ajithkumar6787
    @ajithkumar6787 3 роки тому

    Best explanation ever.. Thank you.
    Can I get the video for Elliptic Curve Cryptography, from you, please?

  • @AK-fb9ry
    @AK-fb9ry 9 років тому

    The initial 8-bit LFSR 10101010 and the feedback tabs polynomial is x5+x3+x1+1. Use Excel to generate a keystream of a sufficient length to encrypt your name “space”, showing all the steps?

  • @راجيةرحمةالله-ز6م
    @راجيةرحمةالله-ز6م 5 років тому +1

    Thanks a lot, I have a question "Can I used same the way to generate the key to steganography for embedding data in an image?"

  • @glitchy_weasel
    @glitchy_weasel 4 роки тому

    Excellent video, I've read some resources about RSA but there is still something that confuses me: what do you all mean to "choose" e, can I choose any value for e? Which usually is 3 or 65537 on modern applications. I mean, is "3" always going to be coprime with any phi? Like in the example in 10:15 how did you found that e=7 ?

    • @vishalmishra3046
      @vishalmishra3046 3 роки тому +1

      e can be any Prime, since primes are co-primes with any PHI. Should be large with very few 1 bits - so 0x10001 = 65537 is one of the best choice for fast encryption (during key exchange) and signature verification.

  • @ananamz
    @ananamz 5 років тому

    Love you man! Thanks for the video.

  • @Nada-yc8uo
    @Nada-yc8uo 4 роки тому

    you are amazing!!! good work, you got a new sub

  • @heramban85
    @heramban85 9 років тому

    Hi, I have a few quires... What would be the maximum message length would it go up to.?... How would you perform (X power Y) certainly I cant define it as Integer or float when I perform a small C program?...How can I perform division same problem as before.... Overall the processor available is either 32 bit or 64 bit processor how will it compute such a big algorithm...?....

    • @PopeLando
      @PopeLando 9 років тому

      +Heramban S There are libraries which handle big integers for most languages (called BigInt or similar). These generally include a function called something like PowerMod, for performing raising a number to a large exponent, mod x. In PHP 5 there is a library called BCMath which performs math operations on any number expressed as a string of any length, hundreds or thousands of digits long. Once you've realised that this is possible, you can easily write your own functions for arbitrary size number math.

  • @hutaospunchableface7381
    @hutaospunchableface7381 3 роки тому

    Thank the lords for this video!

  • @SANDEEPSINGH_9
    @SANDEEPSINGH_9 8 років тому

    Good work Anthony...

  • @cycletechsa
    @cycletechsa 5 років тому

    Thanks,......
    you are a life saver

  • @rrr00bb1
    @rrr00bb1 2 роки тому

    I would make a big distinction in RSA between asymmetric encryption and public-key encryption. If you use a well-known and small 'e', you have public key, but can't support 'asymmetric' key encryption. With 'asymmetric' key encryption, 'e' and 'd' have the same properties; and are equally secret.
    I use it to make digitally signed tokens such that you don't know the plaintext until you produce a witness that you performed verify to extract a secret to decrypt the signed claims. That way, the signer distribute the verify key to those who are allowed to VERIFY. It's not totally public, because it's (n,e), but signer has (n,d,e). This allows tokens to be passed around so that man-in-the middle can't decode the claims, and the verifier can only extract verified claims. ie: the current way of checking signatures (plaintext,Sign(H(plaintexty))=sig) has security problems. The main one being that you allow people to not verify the signatures; something that is very common in the hands of web developers. And the other is in leaking the tokens to intermediate proxies.

  • @HelloWorld-tn1tl
    @HelloWorld-tn1tl Рік тому

    How to choose e, just a small prime that doesn't share a factor with φ(n) ?

  • @mekaramu
    @mekaramu 8 років тому

    Super Explanation!!!!! Great Thank you

  • @nooeloone5408
    @nooeloone5408 5 років тому

    How did you find your own rsa public number? Which as result of both of your private prime numbers multiplication?

  • @avatekmuhammed5013
    @avatekmuhammed5013 6 років тому

    Very very very nice. Thank you so much

  • @edzeppelin1984
    @edzeppelin1984 4 роки тому +1

    I've knocked together a primitive Python implementation of this and I've got two problems so far. One is that the algorithm to derive d occasionally results in a divide-by-zero error, which I've solved simply by scrapping it and starting over with a new value of e. It's still quick but there must be a more elegant solution to avoid the error in the first place?
    The second problem is that, for anything more than three-digit values for p and q, the actual encryption and decryption is incredibly slow. For four-digit values it clocks in at almost a minute and a half. Why is it so slow when this process happens routinely for much larger primes than anything I'm using?

    • @leathernluv
      @leathernluv 4 роки тому +1

      My guess is that you may need to watch ua-cam.com/video/EHUgNLN8F1Y/v-deo.html
      (Modular Exponentiation video, much faster method)
      Also, encrypt data in chunks that will not exceed n in value if not done that way already. I'm pretty much doing the same thing that you are doing, writing in python.

    • @vishalmishra3046
      @vishalmishra3046 3 роки тому +1

      Use python3.8 built in functions like d == pow( e, -1, (p-1)*(q-1) ) and they are pretty fast even with 2048 bit RSA keys.

  • @Zuschauerquaeler
    @Zuschauerquaeler 4 роки тому +1

    Can somebody please explain to me how the message doesn't lose information when you calculate modulo n? As modulo is not an injective function?

    • @edzeppelin1984
      @edzeppelin1984 4 роки тому

      It does lose information I think - as I understand it, the limit of RSA is that the message can't be larger than N. In a real example, N is so huge that the message would have to be very long indeed for that to be a problem.

  • @wompaper
    @wompaper 7 років тому

    I guess I'm getting something wrong but 5:27 - you want to calculate x^2753 ?

  • @db18022
    @db18022 4 роки тому

    You're the best!

  • @feliperodrigo7445
    @feliperodrigo7445 7 років тому +1

    Hi! I love your video and it is helping me a lot with my Internal Assessment from IB Maths HL. I really need to do something original with RSA encryption (or look at it at a different way), so I was wondering if you (or anyone reading this comment) could have any idea about an original idea or a further step to RSA encryption.
    Thanks ;)

  • @mahmoud-ibrahim
    @mahmoud-ibrahim 7 років тому

    great video. many thanks.

  • @Michaels0184
    @Michaels0184 8 років тому

    I had a problem when applying the extended euclids theorom to my example. One one occasion i was left with such a high minus number, that when mod it with my Phi number, it returned another -minus number, therefore i could not continue the algorithm, as yours provided in the xample returned a positive after

    • @ragnorucca6637
      @ragnorucca6637 8 років тому

      +michael 0184 did you try putting the mod calculation into that wolfram site? Also the answer i got from modulus at the end of the calculation was negative also, but if you mod it again or a few times depending on the number your modding by, eventually you get the positive, which explains the answer i got from the wolfram site. For the record my final inputs for the Euclid algorithm to find d was -617 mod 360. which would give me - 257, but if you mod it again it gives 103, which matches the answer wolframAlpha gives :)

  • @jupiterjones3246
    @jupiterjones3246 8 років тому

    When you calculate d, what happens if you get 0 instead of 1? e.g. p=11 q=13. Thanks.

    • @mallxs
      @mallxs 8 років тому +1

      I think you picked e=3 which is wrong because GCD 120, 3 != 1 e.o.w 120 and 3 are not co-prime
      the first e you can choose with 11,13 to use is 7

  • @muffinspuffinsEE
    @muffinspuffinsEE 9 років тому +1

    You sir, just got yourself a sub!