Asymmetric Key Cryptography: The RSA Algorithm by Hand

Поділитися
Вставка
  • Опубліковано 4 січ 2025

КОМЕНТАРІ • 27

  • @TekCroach
    @TekCroach 6 місяців тому +1

    very clearly explained. This is the best explanation on the subject. Anybody now can understand what is very abstruse for the most.

  • @eveninrose
    @eveninrose 5 років тому +5

    Enjoying this little series from you, as it’s particularly well timed for my needs. :) love the range of content as always~

  • @HandsomeOrHandy
    @HandsomeOrHandy Рік тому +2

    Thank you for the explanation that I could understand.

  • @inarisound
    @inarisound 4 роки тому +2

    Mr. Kevin, thank you *very much* for putting together such beautiful tutorials!

    • @ComputerScienceLessons
      @ComputerScienceLessons  4 роки тому +1

      You are very welcome. Thanks for the lovely comment. Your channel is fascinating :)KD

    • @inarisound
      @inarisound 4 роки тому

      @@ComputerScienceLessons Hahaha xD I saw notification for my email first, that Mr.Kevin subscribed. I chuckled since my content is 'a bit' off from Computer Science subject (no pun intended). It's a great honor for me. And once again, I want to say how I can't thank you enough for your hard and invaluable work

  • @d.w.714
    @d.w.714 Рік тому +2

    That is MIND BLOWING! bravo

  • @egornashilov5449
    @egornashilov5449 5 років тому +2

    thank you so much for this video - I really like the demonstration!

  • @mustaffaqasim
    @mustaffaqasim 5 років тому

    Nice series next time pls do make a video on PERT Chart for cambridge Alevel calculating slacktime etc etc

  • @mikelwrnc
    @mikelwrnc 2 роки тому

    Do you have a video on what is done to use larger primes and not encounter the representation errors you hit at the end of this one?

    • @ComputerScienceLessons
      @ComputerScienceLessons  2 роки тому

      I'm afraid not. Typically, you would not do this on a spreadsheet (I wanted to lay it out visually). Rather, you would do it programmatically. Most high level programming languages support very big numbers one way or another. :)KD

    • @mikelwrnc
      @mikelwrnc 2 роки тому

      @@ComputerScienceLessons after some digging it seems the key is en.m.wikipedia.org/wiki/Modular_exponentiation

  • @MrDhawal29
    @MrDhawal29 4 роки тому +1

    Amazingly explained, is it posssible for you to share excel sheet

  • @chaemelion
    @chaemelion 5 років тому +1

    Excellent overview. It seems as though the ciphertext is vulnerable to frequency analysis and more, however. I'm assuming RSA is normally used in conjunction with other algorithms and techniques that effectively prevent such attacks?

    • @williamsmith255
      @williamsmith255 5 років тому

      Hashing

    • @chaemelion
      @chaemelion 5 років тому

      @@williamsmith255 Hashing the plaintext prior to encryption or the ciphertext post encryption would help prevent frequency analysis of the ciphertext, but it would also render the decryption theoretically impossible. Hashing is largely used for proofs as I understand it, not direct encryption. Care to elaborate?

    • @superpb600
      @superpb600 5 років тому

      Isaac cypher

    • @fredjenkins5069
      @fredjenkins5069 3 роки тому

      I don't know if I missed something or what, but I was able to decrypt the message without the private key by simply taking the publicly known information and generating a lookup table.
      If my analysis is correct, then this encryption method is little more than a keyed Ceasar Cipher?
      Can someone enlighten me?

    • @mikelwrnc
      @mikelwrnc 2 роки тому +1

      In practice, the rsa keys are used to transmit a truly random one-time-pad, which has no frequency content to attack with frequency analysis. Once both sender & receiver have the one-time-pad, they use that to encrypt a real message, and frequency analysis has no leverage against the resulting encrypted message

  • @Wolfeur
    @Wolfeur 5 років тому

    So, if I get it right, the difficult part to break it is to find the totient of n, which requires to find the factors of n.

  • @DivinityPurity
    @DivinityPurity 7 місяців тому

    nice

  • @MrDhawal29
    @MrDhawal29 3 роки тому

    can you share the excel sheet

    • @ComputerScienceLessons
      @ComputerScienceLessons  3 роки тому +1

      I'll see if I can track it down :)KD

    • @KamiK4ze
      @KamiK4ze 3 роки тому +2

      @@ComputerScienceLessons did you manage to track it down?

  • @jamesmatthews2751
    @jamesmatthews2751 3 роки тому

    he picked 7 because it was cool ig