How RSA Encryption Works

How RSA Encryption Works

Mental Outlaw

3 года назад

92,744 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

lee herfel
lee herfel - 21.09.2023 11:00

thanks

Ответить
XH39Z9
XH39Z9 - 22.06.2023 05:01

yeah yeah but still having the key they can still use it to decrypt it, by calculating the key, yeah i know, compute power, sure, goverment has the compute power, universities, and this is still really insecure, public and private keys my ass.

Ответить
Fit & Virile
Fit & Virile - 18.05.2023 11:51

an example would have been so useful

Ответить
vidyadhar deodhar
vidyadhar deodhar - 05.05.2023 09:14

Great explanation

Ответить
Ben Mahpekah
Ben Mahpekah - 04.04.2023 04:55

Nothing here

Ответить
Michael Macha
Michael Macha - 22.03.2023 02:28

Factoring primes is tough, but I think the greatest security the RSA algorithm provides isn't that. It's the incredible dullness of all known explanations of how it encrypts things.

Ответить
severn kariuki
severn kariuki - 21.03.2023 18:21

The relationship between private and public keys remains a mystery me.

Ответить
Xtree
Xtree - 03.12.2022 16:24

Adi shamir by his face looks jewish.

Ответить
ItsJan
ItsJan - 25.11.2022 15:45

diffie heilmann is so damn cool

Ответить
Marcus Medina
Marcus Medina - 23.11.2022 10:48

LMAO, literally watch your videos for fun. I never thought id see one of your videos when studying for classes.

Ответить
Thegamecheats
Thegamecheats - 09.10.2022 23:43

absolute dog crap explanation. didn't even go through any of the specifics.

Ответить
Sharooz Asghar
Sharooz Asghar - 22.05.2022 20:38

Not sure, i thought private was to decrypt, and public to encrypt. So you can encrypt using private as well?

Ответить
Krissten Martínez
Krissten Martínez - 11.04.2022 21:35

thanks for this video

Ответить
🌼Ioana🌼
🌼Ioana🌼 - 23.03.2022 13:46

Hi , if somethink is crypted with rsa its mean can is have crypto ? I have some old hard driver from 2014 and at roming where is crypto file is show rsa and 3 file system with letter and numbers

Ответить
SimpleManPlayingGame
SimpleManPlayingGame - 12.03.2022 04:04

So basically in coding like c#, when the user 1 sends message, it uses its own public key to encrypt the data. User 2 which is receiver got private key of user 1 and use that to decrypt the data. If user 2 wants to send response back, jt uses its own public key to encrypt the data and user 1 would use the user 2 private key to decrypt the data.

Is this how it works??? But How both users get the keys???

Ответить
Adel 22
Adel 22 - 28.02.2022 22:14

thanx, i hope you do a video about SIT encryption for IOT it would be very helpful

Ответить
Jim Pouwels
Jim Pouwels - 09.02.2022 11:56

I like the reference to "Mean Girls"

Ответить
Yurii Lebid
Yurii Lebid - 08.02.2022 20:42

Finally I understand it!!! Great Thanks!

Ответить
Abdus Samad
Abdus Samad - 06.02.2022 12:18

Thanks for explaining this easy!

Ответить
H Sharma
H Sharma - 13.11.2021 02:53

Spot on.
You’d encrypt outgoing messages with the recipient’s public key

You’d encrypt with your private key for signature purposes. I’m not aware of any other reasons.

The whole idea with both encryption and hashing in general is that they’re easy to perform in one direction and exceedingly difficult in the other.

Ответить
thomas leong
thomas leong - 31.10.2021 13:16

if the attacker got the alice public key, means attacker also can use it private key to decrypt ?

Ответить
Ejsa fara
Ejsa fara - 20.10.2021 23:18

thank u sir i have understood :3 <3

Ответить
Olena Bodnar
Olena Bodnar - 26.06.2021 02:57

How can enable encryption in Archer Control Panel

Ответить
deidara _
deidara _ - 26.02.2021 15:55

Should be noted: DO NOT USE RSA. ESPECIALLY DO NOT ROLL YOUR OWN RSA IMPLEMENTATION. A large portion of modern crypto vulnerablities today are the result of programmers with no formal background in number theory using their own RSA because its math is deceptively simple to implement. The fact is that RSA is a minefield of mistakes waiting to happen be it not padding your ciphertext, using a too small public exponent, choosing primes that are too close or using primes that aren't securely generated, sending the same or similar messages encrypted with different keys, using the same prime for two different keys, the list goes on.

For asymetric encryption, it is strongly adviced that you use Elliptic curves, in particular Curve25519. The parameters of which have been carefully chosen by experienced cryptographers who know what they're doing.

Ответить
Juanjo CG
Juanjo CG - 14.02.2021 00:05

Now normally what is used is diffie hellman key exange / eliptic curve to get a key, and with that key we use AES to encrypt the communications. RSA is used for certificates

Ответить
uiop uiop
uiop uiop - 12.02.2021 04:17

i always thought rsa stood for rosallosynthetic saedric almanation process

Ответить
glitchy_weasel
glitchy_weasel - 11.02.2021 02:43

PGP (GPG) next please !! 😆

Ответить
John Jeffo
John Jeffo - 11.02.2021 00:48

So, the private and public keys are interchangeable (math-wise) before you declare that one as private and one as public - correct?

Ответить
Boy
Boy - 11.02.2021 00:24

next gpg

Ответить
passord1 d
passord1 d - 10.02.2021 23:23

i like your "Works" series

Ответить
Yadobler
Yadobler - 10.02.2021 22:01

I like to think of the public key as a Lockable padlock, those kind in lockers that you can push in the shackle and it locks, but then you need the key to unlock it. thus the private key is the key, the padlock is that public one that anyone can use to lock their parcel in a cage with, and send it to you to open it

Ответить
Andrei Popescu
Andrei Popescu - 10.02.2021 21:17

Awesome! 2 likes for the video, a dislike for not including the lecture in the description.
- You total is 1 like, sir, have a nice day

Ответить
Moai u
Moai u - 10.02.2021 20:58

Bro do you even calculate the area under elliptical curve?

Ответить
Nidhi Raut
Nidhi Raut - 10.02.2021 19:37

love from india bro 🇮🇳☮️

Ответить
ㆍ
- 10.02.2021 18:11

I feel like one of my teachers will use this video in the future

Ответить
Matěj Zátko
Matěj Zátko - 10.02.2021 18:04

I would appreciate more visual aid in these videos. In my opinion it would make the videos more understandable and it would be easier to follow what you're talking about. Btw thanks for the educational content 👍

Ответить
The Handsome Life
The Handsome Life - 10.02.2021 16:40

Do a tutorial on how to encrypt your email with pgp. More people using it, the better.

Ответить
Comics by wolf of world
Comics by wolf of world - 10.02.2021 16:24

Yup bro a little demostration on terminal would also make this more understandable

Ответить
Piotr Masłowski
Piotr Masłowski - 10.02.2021 15:36

It's important to remember that you still have to be sure you got the right public key!

Maybe a video on roots of trust (for websites, secure boot, …) and their alternatives (safety number in Signal, networks of trust, etc.)?

Ответить
Libor Tinka
Libor Tinka - 10.02.2021 14:32

If you want full understanding of the RSA cryptosystem (to the point of being able to program it), I advice reading "Introduction to Algorithms" (Cormen, Leiserson, Rivest, Stein) - the book also explains many related algorithms, like the Pollard Rho Method (generation of large, high-probability prime numbers).

Ответить
cherubin7th
cherubin7th - 10.02.2021 13:03

While AES is somewhat robust against quantum computers, RSA would be totally broken by it.

Ответить
Thales Catão
Thales Catão - 10.02.2021 12:58

Now I understand

Ответить
Andrea Vergani
Andrea Vergani - 10.02.2021 12:12

Thanks. Apriciate your work. Support from Italy

Ответить
SniperOwl
SniperOwl - 10.02.2021 12:00

Very good video.

Ответить