Cryptography: Crash Course Computer Science #33

Поділитися
Вставка
  • Опубліковано 1 гру 2024

КОМЕНТАРІ • 338

  • @crashcourse
    @crashcourse  7 років тому +433

    Hey guys, there’s been a ton of news the past week about a vulnerability in the WPA2 protocol that protects our Wi-Fi networks, and since we say that AES is secure in this video, we thought it would be helpful to explain how it all relates. In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: ua-cam.com/video/mYtvjijATa4/v-deo.html

    • @disorganizedorg
      @disorganizedorg 7 років тому +22

      I very much appreciate that posted this update; it again demonstrates that you're more into education than simply getting clicks.

    • @SSGranor
      @SSGranor 7 років тому +6

      Those expression should really have another "mod M".

    • @DreadKyller
      @DreadKyller 7 років тому +8

      +Axyron That was a typo, it should have been "(B^Y mod M)^X mod M" it was missing the second modulus.

    • @DavidChipman
      @DavidChipman 7 років тому +2

      Useless? How so?

    • @DavidChipman
      @DavidChipman 7 років тому +5

      You can slow the playback down, can't you? It's not too fast for me. But I have heard others mentioning changing the speed of playback of youtube videos in general.

  • @samuelisaac2984
    @samuelisaac2984 4 роки тому +208

    I loved cryptography as a kid so much that I actually used to entertain myself with frequency analysis. I had a lot of books on cryptography, and I used to try to crack the examples before the book explained them, the way people try to solve mystery books before they reach the end. Now I'm falling in love with cryptography again, but with a more modern, computerized version. Thanks Crash Course!

  • @KikomochiMendoza
    @KikomochiMendoza 7 років тому +256

    As a total n00b in programming or encryption for some reason I understood the Debbie Hellman explanation over the paint trading analogy. Thanks.

    • @zikomo8913
      @zikomo8913 6 років тому +33

      I was confused due to being color blind and had to re watch that part, lol.

    • @sam-yx8fr
      @sam-yx8fr 4 роки тому +4

      Comrade Dyatlov hows it going so far

  • @vezokpiraka
    @vezokpiraka 7 років тому +37

    This is probably one of the best Crash course videos ever made. Really great explanation and somehow more detailed than other ones while still explaining the concepts easily. This videos deserves praise.

  • @Megamen8x
    @Megamen8x 7 років тому +479

    *_COME ON BRAIN!!!!_*

  • @MrKydaman
    @MrKydaman 7 років тому +176

    The "Thanks cryptography" 👍👍 at the end was pure gold.

  • @brocksprogramming
    @brocksprogramming 7 років тому +136

    I look forward to watching this every week. You guys at crash course are keen on the idea of the feynman technique. Making things as simple as possible. I find these videos on computers to be basically an overview of all the things I've studied over the years. It's a very complete and timely piece. Perhaps you guys may choose to go into more depth on some of these topics in the future. Anyway, these are a great introductory learning tool for those who are interested. Power to male and female programmers and tech nerds! While we ride the wave of the future.

  • @ChungusAm0ngus
    @ChungusAm0ngus 7 років тому +305

    "Adding another level of... complexity" #trolled

  • @ProfessorSyndicateFranklai
    @ProfessorSyndicateFranklai 7 років тому +110

    Just waiting for that quantum computer to mess all of our encryption up.

    • @Baxtexx
      @Baxtexx 7 років тому +20

      We have to invent quantum cryptography then :D

    • @DharmaJannyter
      @DharmaJannyter 7 років тому +8

      Actually, we already did a long time ago.^^
      en.wikipedia.org/wiki/Quantum_cryptography

    • @nibblrrr7124
      @nibblrrr7124 7 років тому +8

      Actually, the most devastating quantum attack (Shor) only breaks asymmetric encryption (RSA, DH key exchange). Grover can weaken AES, but that isn't nearly as bad (speedup by at most the square root). Other algorithms, including some asymmetric ones, might not be affected at all.
      djb & Tanja Lange have a 32C3 talk ua-cam.com/video/-LlkJZJ5DMQ/v-deo.html and a mostly readable 2017 paper, "Post-quantum cryptography".

    • @sneakupakashgaur9935
      @sneakupakashgaur9935 6 років тому

      No it won't

    • @christianalbertjahns2577
      @christianalbertjahns2577 5 років тому +2

      If quantum computer come to existence, then One-time Pad will be feasible to use

  • @day_saram
    @day_saram Рік тому +6

    i've been cracking my head open to understand how keys function for the past few weeks since uni started and you just explained it all very clearly with some paint.....insane and amazing, i thank you ALSO finally understanding the math that's behind these encryption techniques thank you so much

  • @banderi002
    @banderi002 7 років тому +254

    Having a blue day? Keep Calm and Carrie Anne!

    • @JM-us3fr
      @JM-us3fr 7 років тому +10

      Seriously, she always cheers me up

    • @Pfhorrest
      @Pfhorrest 7 років тому +2

      They should sell this on a T-shirt.

    • @microbuilder
      @microbuilder 7 років тому +1

      When I read that in my brain, I suddenly realized Carrie Anne does sound like carry on, if you live in the north as I do...soooo Minnesotan, dontcha know eh?!

    • @kyoung21b
      @kyoung21b 7 років тому +1

      Banderi - OK OK you get a big ughhhhh ! for that...

  • @BlueFlash215
    @BlueFlash215 4 роки тому +12

    Wow, this was actually the exact right speed to follow, awesome graphics and amazing good comparisons. I'm actually a little happier now!

  • @ignaciocorrea6594
    @ignaciocorrea6594 7 років тому +37

    I love this course, and I'd like to add a little more information (due to the fact that CC cannot cover everything in just 15 minutes).
    First, when Carrie Ann says that one-way functions are "easy to do in one direction, but hard to reverse", "easy" and "hard" refer to computational complexity, specifically polynomial time problems. This means that the time needed to apply a one-way function must be small (a polynomial in the length of the argument of the function), but the time needed to reverse the computation must be awfully big.
    Second, the existence of one-way functions is an open problem in computer science. Modular exponentiation is a candidate for being a one-way function: indeed, computing the function is easy, even for huge numbers, but the reverse (the modular discrete logarithm) is believed to be difficult (but it has not been proved!).

    • @sneakupakashgaur9935
      @sneakupakashgaur9935 6 років тому

      Ignacio Correa there is error in video

    • @davidporowski9512
      @davidporowski9512 6 років тому

      Ignacio Correa
      NSA (no such agency) spends serious taxpayer money to preserve email
      encryption/decryption using
      the Cypher Chip ( ironically, iirc, proposed by Bill & Hillary
      Clinton while in White House to preserve emails securely )
      Sharing Key Info with NSA (WTF?)

  • @GKS225
    @GKS225 7 років тому +5

    This is the best asymmetrical cryptography analogy I've seen so far! It makes so much sense to me. Thanks CC!

  • @ducksoop.x
    @ducksoop.x 6 років тому +4

    Your Public/Private key explanation was the best I have ever seen, now I understand it! Thank you so much.

  • @Xappreviews
    @Xappreviews 7 років тому +13

    I think it would be a great idea to make a second video where you talk about vulnerabilities of cryptography!
    For example, Diffie-Hellman is only secure against passive attacks; however you can fool both sides into thinking that a secure connection is established by a man-in-the-middle attack. There are different ways to eliminate this problem.
    Also public keys need to be stored in a secure source. If an attacker is able to distribute his own public key, it will lead to problems.
    There are many more examples, which could easily fill another video.
    I loved this one, it was a great introduction, but I wish you would go into more detail, especially since it might give the impression that these algorithms have no flaws :)

    • @mehdibounya
      @mehdibounya 7 років тому

      Xappreviews yeah they didn't cover a really important part, the man in the middle attack, they should've mentioned certificates

  • @jeaniebeanie6
    @jeaniebeanie6 Рік тому +3

    This was such an amazing explanation. Perfectly paced, great graphics, fun analogies, easy to understand, and very well spoken. Thank you so much for this!

  • @drewlyton
    @drewlyton 7 років тому +62

    It is uncanny how much this series is aligning with what I'm learning in my Defense Against the Dark Arts class haha! Sharing all of these with my professor! Keep 'em coming!

  • @watchit387
    @watchit387 4 роки тому +16

    "For a 128-bit keys, you'd need trillions of years to try every combination, even if you used every single computer on the planet today. So you better get started" XD

  • @donsample1002
    @donsample1002 7 років тому +35

    I've always thought there was something shifty about that Hank guy.

  • @eriksatterqvist6027
    @eriksatterqvist6027 7 років тому +2

    In practical modular exponantiation you don't calculate the B^n before taking mod m since this number would be stupidly big and probably wont fit into memory. Instead you divide it into a series of taking power 2.
    If n = 2k is even, then B^n = (B^2)^k.
    If n = 2k+1 is odd, then B^n = B(B^2)^k.
    If B^2 > m, let C = B^2 mod m, then and (B^2)^k mod m = (B^2 mod m)^k = C^k (Also B(B^2)^k mod m = B(B^2 mod m)^k = BC^k). It is quite easy to code this if you want to give it a try.

  • @dcstone
    @dcstone 7 років тому +13

    I did not realize there was so much to a secure connection... Amazing! Thanks for the explanation!

  • @hokageenergy9599
    @hokageenergy9599 5 років тому +53

    Tip: if you want to learn something, change the speed to .75

  • @jackkraus6948
    @jackkraus6948 8 місяців тому +1

    I'm taking a software engineering technical interview and wanted to brush up quickly on this stuff, thanks Crash Course 👍

  • @davidsweeney111
    @davidsweeney111 7 років тому +333

    the wife has got the best cryptography, I dont understand her at all!

    • @the80386
      @the80386 7 років тому +2

      don't they all?

    • @chasepablo5222
      @chasepablo5222 7 років тому +28

      The real question is, who is she encrypting it for? 😏😏😏

    • @NeedForMadnessSVK
      @NeedForMadnessSVK 6 років тому +6

      She is hashing, not encrypting

    • @rickh3714
      @rickh3714 6 років тому +17

      Well a brute force attack will get you divorced I think so I don't recommend that!
      How about taking her on a phishing​ trip with you- If you promise to cook the catch and clean the dishes afterwards you may net that critical algorithm!

    • @markzucc3277
      @markzucc3277 5 років тому +19

      Boomer humor

  • @ratgreen
    @ratgreen 7 років тому +47

    I have learnt more from a few Crash course videos than I did my entire XX years spent at school. Just goes to show education is not education its just there to make you pass tests, not to learn. Thanks CC. Thanks Alan Turing

    • @Hofftari
      @Hofftari 7 років тому +7

      It's not that simple. Sure, this is explained in an easy way, but our brains aren't capable of storing this information in a way that you can remember it easily in the future. These videos should in my opinion instead be seen as a support for the subject which you then learn through a more conventional way.

    • @lutze5086
      @lutze5086 7 років тому +4

      ratgreen no, you just don't recognise the skills you learnt in school

    • @AthanasiosGrigoroudis
      @AthanasiosGrigoroudis 7 років тому +7

      The videos give you a taste of these subjects, just a scratch on the surface. You need education to learn how to study properly and get as much knowledge as you need. Don't hate school, it's normal to feel that way, but it's a lot more important than you think :)

  • @alwync3253
    @alwync3253 4 роки тому +1

    That's by far the best explanation of asymmetric encryption (in particular, Diffie-Hellman key exchange) I've come across.

  • @gnollins
    @gnollins 2 роки тому

    Hands down the best video on cryptography on UA-cam. 12 minutes for expert level 😀

  • @starryk79
    @starryk79 7 років тому +2

    Fantastic Video. I finally understand how key exchange works. i always wondered how it can be secure if the keys need to be known to both parties. Now i know that! Thank you Carie-Anne!

  • @VitorVelosoSA
    @VitorVelosoSA 5 років тому +3

    Finally I understand the key exchange, thanks to your color explanation. Very nice :)

  • @shalop5614
    @shalop5614 6 років тому +1

    B^Y mod M to the X is not equivelent to B^X mod M to the Y. You have to take the modulo afterwards, and it only works for very specific bases and modulos.

  • @flopped3419
    @flopped3419 7 років тому +7

    "so now you know all the _key_ parts of modern cryptography" , this woman makes me crease omg im dying thanks cryptography for bringing this woman to me the puns are fantastic

  • @gasquakestudios
    @gasquakestudios 7 років тому +2

    Really good explanation of how the fact that no secret key needs to be exchanged!

  • @Mr_Creasy_
    @Mr_Creasy_ 7 років тому +80

    Very informative video!

  • @christomapher
    @christomapher 6 років тому +1

    I love the flying toasters! Obscure reference that brings me back to the 90s PC computing world!

  • @sedthh
    @sedthh 7 років тому +2

    wow this is the first time I got my head around how public keys work, please do more videos on the subject!

  • @yuvaldolev7969
    @yuvaldolev7969 7 років тому +6

    Something you should have mentioned is that cryptography is only perfectly secure in theory - in the real world there are side channel attacks. Id explain it but I think that people who read this comment will have more fun researching this themselves ;)

    • @shalop5614
      @shalop5614 6 років тому

      Yep and side channel attacks are the only crypanalysis attacks out there. There isn't a single other more common attack.

  • @RichyMaths
    @RichyMaths Рік тому

    I did a course on Cryptography and Information Security in my degree. I remember we touched upon DES and AES, and other advanced topics such as elliptic curves.

  • @Lycz
    @Lycz 7 років тому +2

    An interesting addition:
    The first version of Enigma, the one which had only 3 rotors has been cracked even before the beginning of WWII by 3 Polish mathematicians. Unfortunately their methods became obsolete the moment the 2 additional rotors have been added to the machine, making it again impossible do decipher Enigma until the Turing's breakthrough. (A commemorative memorial of the Polish input was placed in 2002 at Bletchley Park).

  • @SoulDragonWithFlow
    @SoulDragonWithFlow 7 років тому +3

    Wow, I knew a few basics of encryption but was always quite hazy on the details. This was so informative! Thanks! :D

  • @fabiomarsiaj8172
    @fabiomarsiaj8172 4 роки тому +4

    I just love the way you explain everything!! Amazing course.

  • @Ni7ram
    @Ni7ram Рік тому

    ive watched a GAZILLION videos on cryptography... and i always had the sensation that some part was missing, that it didnt make total sense.. i thought i was just dumb, but FINALLY someone explained it completely and clearly! best explanation EVER. all other videos forget to tell the public key is used in conjunction to the private to create something new. thats key! (pun intended)
    awesome job! this crash course is truly a masterpiece

  • @k54ltyd28
    @k54ltyd28 7 років тому +46

    You forgot to show the part where John has to call Daniel Biss and ask what an exponent is.

  • @gustavlarsson1785
    @gustavlarsson1785 7 років тому +2

    I really liked both the video's content and the narrator - She's great! Good job! :)

  • @FedJimSmith
    @FedJimSmith 7 років тому

    We can more appreciate this by citing non-electronic ciphering/deciphering.. Good job mentioning Ceasar and Columnar

  • @tenow
    @tenow 7 років тому

    Finally! An understandable explanation how prime numbers work in cryptography with color metaphor.

  • @moritzmakowski9422
    @moritzmakowski9422 7 років тому +1

    9:43 That is not mathematically equivalent... See for example: b = 4, x = 3, y = 7, m = 18
    You need to take the modulo M of the result to get the same key. In the wikipedia article about that topic they say, that b needs to be a generator of the group of m , but I haven't tried it out yet.

  • @jeremybailey262
    @jeremybailey262 5 років тому +1

    Hot oil in the medieval ages wasn't used like you see it in Hollywood.
    Oil was an expensive resources so what they would actually do is pour boiling water or extremely hot sand. Yes there was some occasions where it happened but that's an exception not the norm as it's portrayed.

  • @max500k
    @max500k 4 роки тому

    I love simple explanations of complicated things, awesome video

  • @What_was_wrong_w_jst_our_names
    @What_was_wrong_w_jst_our_names 5 років тому +1

    The paint analogy was very useful

  • @tellingfoxtales
    @tellingfoxtales 7 років тому

    The bit about key exchange was very informational.

  • @TravelTrivia
    @TravelTrivia 7 років тому +12

    I love this channel! Awesome videos

  • @phantomapprentice6749
    @phantomapprentice6749 Рік тому

    I'm pretty bad at math and could understand this , well done. Although it does beg the question of why people consider math a requirement when the principles have more to do with logic than mathematics.

  • @kareemrshaidat1794
    @kareemrshaidat1794 6 років тому +1

    Have a good day everyone!

  • @souvikcseiitk
    @souvikcseiitk Рік тому +3

    3:20, nueral network 😅

  • @collinsmilgo8869
    @collinsmilgo8869 5 років тому +9

    The amount of times hank has been attacked lmao

  • @LeO-hm3tj
    @LeO-hm3tj 5 років тому +2

    I fall in love at the end of the video~

  • @milestone2852
    @milestone2852 7 років тому +3

    thanks for the awesome videos. this is one of my favourite channels on youtube.
    can you please do a series on Criminology and also Linguistics? thanks :)

  • @dabay200
    @dabay200 6 років тому

    With the modular exponent example if somebody in the middle intercepts both sides of the communication they get the same value for the shared key - i'm sure the NSA is already doing this, they already compromised RSA security and functions with backdoors to decrypt without using brute force.

  • @cmilkau
    @cmilkau 6 років тому +1

    Amazing video!
    Can you also make a video on modern cryptography, focusing more on all the cool things not directly related to encryption? Hardly anyone knows there's so much more to cryptography than that.
    Only one minor objection: please don't reiterate the myth of million-year cryptoanalysis. Assuming Moore's law to continue, even the strongest encryptions in use today can be broken within decades.

  • @tommrutherford
    @tommrutherford 7 років тому +1

    This series is so awesome!

  • @gavin5861
    @gavin5861 7 років тому +1

    Love these videos!

  • @NickShvelidze
    @NickShvelidze 7 років тому +1

    Awesome video, thank you!
    I can finally understand a little bit of cryptography.

  • @AJVainio
    @AJVainio 7 років тому

    If my understanding is correct, it is crucial to the color-analogy that even if an eavesdropper has the shared color, and could theoretically "subtract" it from the two transmitted mixed colors to get the two secret colors, this subtraction-process is what would be prohibitively cumbersome?

    • @wilfredevertsz1915
      @wilfredevertsz1915 4 роки тому

      I have this same question in mind. It seems simple enough to solve. Let me know if you find the answer to your question.

  • @annayapaymah7352
    @annayapaymah7352 6 років тому

    Perfect description

  • @just_jimmy
    @just_jimmy 6 років тому +1

    You have very good videos, however i suggest you either decrease the amount or info or make a longer video. It’s a bit difficult following you with normal playback speed

  • @ArjunSutar
    @ArjunSutar 6 років тому

    This nice explanation you have given. Hope all needs to watch it.

  • @DuluthTW
    @DuluthTW 7 років тому +1

    Thanks, this episode really helped me.

  • @SergioBobillierC
    @SergioBobillierC 7 років тому +1

    Great episode!

  • @Wielki48
    @Wielki48 6 років тому

    The first person to break the enigma code was Marian Rejewski and his colleagues, Polish mathematician, and he did it in 1932 ! Before outbreak of WW2 and certainly before Alan Turing. That's sad you don't mention it.

  • @cholten99
    @cholten99 7 років тому

    Nice Code Club shout-out - Claire and Linda will be happy :-).

  • @Danny_Boel
    @Danny_Boel 7 років тому +2

    0:30 Wilhelm scream!

  • @roidrage420
    @roidrage420 6 років тому +7

    "There will always be bugs..." (shows jQuery)

  • @tgeo2880
    @tgeo2880 6 років тому +1

    great video!

  • @letylek
    @letylek 5 років тому +2

    4 minutes in and my head already hurts, this ain't for me

  • @philward2098
    @philward2098 5 років тому +1

    Love the Shirts

  • @michelleschultze4641
    @michelleschultze4641 7 років тому +2

    This is so interesting, wow!

  • @PierreThierryKPH
    @PierreThierryKPH 6 років тому

    OK, managing to get the Wilhelm Scream into a cryptography is an accomplishment in itself… \o/

  • @hyunjinpark5086
    @hyunjinpark5086 7 років тому

    Cracking open the code book with the bois

  • @jameshoe1750
    @jameshoe1750 7 років тому +1

    big fans of this series of videos, currently pursuing a diploma in IT.
    'd to know if there is any plan for making a video about quantum computing?

  • @lolatomroflsinnlos
    @lolatomroflsinnlos 7 років тому +1

    3^x mod 31 = 7 is solved by:
    x = 28
    x = 65
    x = 70
    x = 74
    x = 119
    x = 210
    x = 236
    x = 353
    x = 371
    x = 474
    x = 594
    x = 611
    x = 613
    x = 626
    x = 637

    • @hciprof
      @hciprof 7 років тому +1

      Can you figure out X for our longer example? :)

    • @lolatomroflsinnlos
      @lolatomroflsinnlos 7 років тому

      Brute forcing it right now, I'll get back to you in a billion years.

    • @hciprof
      @hciprof 7 років тому +1

      We sized it so it can be done in maybe a week.

    • @lolatomroflsinnlos
      @lolatomroflsinnlos 7 років тому +1

      Should have listened more closely. She says it's nearly impossible if it's hundreds of digits long. I just heard "nearly impossible" and gave up. Well, in that case I'll actually get back to you!

  • @tilinapple
    @tilinapple 6 років тому

    so proud when turing came up :)

  • @1035TheIce
    @1035TheIce 4 роки тому +1

    I like how Hank is the bad guy here 😂

  • @Tharindusri91
    @Tharindusri91 6 років тому

    Thank you very very very much for this great video. It helped me a lot for understanding the fundamentals and history of Cryptography. :)

  • @nascomfub
    @nascomfub 2 роки тому

    I love this!

  • @sneakupakashgaur9935
    @sneakupakashgaur9935 6 років тому

    There should be one more modulas after the results in getting key.

  • @electroninja8768
    @electroninja8768 7 років тому

    Nice video, I was really hoping for an illustration of one time pads though.

  • @vikaskadel3005
    @vikaskadel3005 4 роки тому

    Alan Turing blinking on the bug of engima was hilarious

  • @nthgreen87
    @nthgreen87 7 років тому +11

    Guys, at 0:35 you used the picture of the monument dedicated to the 3 Polish mathematicians who first broke the Enigma cipher in 1932, making it possible for Turing et al. at Bletchley Park to proceed. Yet you didn't breathe a word of their contribution, nor did you even credit the photo (here it is on Wikipedia, recognizable by the digit order at the top: commons.wikimedia.org/wiki/File:Polish_cryptologists_breaking_Enigma_ciphers_monument_01.JPG ). I can understand that the English speaking world may be unwilling to break their tongues on names such as Różycki, but the complete erasure of the Polish contribution in ANY account of the Enigma-breaking is more than a little unfair.

  • @Utkarshkharb
    @Utkarshkharb 2 роки тому

    So well explained ! Thanks a lot !

  • @Sonicsis
    @Sonicsis 7 років тому +6

    I never knew E was the most common letter used.

    • @IceMetalPunk
      @IceMetalPunk 7 років тому +5

      You just used it 8 times in your comment. The two second-most common letters in your comment are T and N, both of which show up only 3 times each. It works! :D

    • @JosephDavies
      @JosephDavies 7 років тому +4

      Watch a few episodes of Wheel of Fortune and you'll see them using letter frequency as the base strategy to solve the puzzles.

    • @MihiraTheAce
      @MihiraTheAce 7 років тому +1

      I nxvxr knxw X was thx most common lxttxr usxd.

    • @MisokoFukumoto
      @MisokoFukumoto 6 років тому

      I had a challenge once to not use letter e in my introduction, I had to search up synonyms of every word that had e in it and reworded my sentence. I nailed it in the end.

    • @MisokoFukumoto
      @MisokoFukumoto 6 років тому +2

      In that paragraph, a particular syllabrary writing building block tally up to 17 counts, by its own.
      But, in this paragraph, it holds no display of it, as you may hold count.

  • @anshsachdeva2013
    @anshsachdeva2013 5 років тому

    hey carrie (or anyone else if you would like to help) , I wanted to understand that private key sharing( at 10:00) , so i thought of making myself a simple practical example out of it, but my calculations say your equation from 10:00 is not correct . can you please have a look?
    So If i have to transmit character '"P' (ascii 80 )from Boy A to B:
    >> I assumed x=2 would be private key of A and y=3 would be private key of B)
    >> I assumed my public key function as cipher(x,y)= (3^x % 7)^y
    Thus:
    - A would first Transfer cipher_a = 3^2%7 = 2 to B
    - B would first Transfer cipher_ a= 3^3%7 = 6 to A
    >> I assumed my publically available encryptor function as encrypted_text = cipher(B) ^x
    + ascii(character)
    - Thus, A would transfer the encrypted character 'P' to be as e_t = (6)^2+80 = 106
    >> I assumed my publically available decryptor function as ascii(character) = encrypted_text - cipher(A) ^y
    - Thus, B would recieve the value as val = 106- (2)^3 = 97 , which is not equal to our original value of 80
    Thus (B^y mod M)^x != (B^x mod M)^y != (B^xy mod M)
    But rather
    (B^yx mod M^x) == (B^xy mod M^y) but != B^xy %M
    Is this right?

    • @brucelee7782
      @brucelee7782 5 років тому +1

      She forgot to add a extra mod on both sides 🙄

  • @griffdog8233
    @griffdog8233 7 років тому +1

    Do you have any plans to do a future of computing video . Maybe have something about AI?

  • @brocksprogramming
    @brocksprogramming 7 років тому +1

    Way to go Carrie Anne!

  • @loversdiscovers5099
    @loversdiscovers5099 5 років тому

    Great video guys!

  • @andrewgrebenisan6141
    @andrewgrebenisan6141 7 років тому

    Absolutely beautiful

  • @harshitpandey4027
    @harshitpandey4027 5 років тому

    It's very nicely presented with animation. Just one problem your Rate of speech is too fast/high. Very difficult to understand if the person is not a native English speaker

  • @apucterio
    @apucterio 6 років тому

    Green padlock showing "secure" connection doesn't always mean "safe", and often phishing sites has it. Take care.

  • @AmanSingh-xc6xv
    @AmanSingh-xc6xv 6 років тому

    Great video. Thanks

  • @sarielreigns777
    @sarielreigns777 5 років тому

    Thank you for making me understand