Breaking RSA - Computerphile

Breaking RSA - Computerphile

Computerphile

2 года назад

357,369 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@Leeengold
@Leeengold - 28.11.2023 13:56

Can someone give a proper intuitive explanation for this? I just tried it myself, randomising the last 512 bits and it found the result in the first step of ceil(sqrt(n)). How can it pinpoint to the solution so easily.

Ответить
@Lampe2020
@Lampe2020 - 05.11.2023 08:35

Interesting that you only have <d> in the private key, all the reference implementations I've found (and the one ChatGPT spat out) all have a two-part private key, made of (<n>, <d>) and also using both…

Ответить
@napukapu
@napukapu - 03.07.2023 04:07

Why is 65537 the best integer?

Ответить
@zizo1998aaa
@zizo1998aaa - 30.05.2023 00:35

please make a cryptography playlist of Dr. Mike Pound videos

Ответить
@7darkgames764
@7darkgames764 - 30.05.2023 00:28

You explained very well for a person that doesn't know anything about math

Ответить
@galloe
@galloe - 18.05.2023 02:23

Not sure if anyone has mentioned this, but I love how you've repurposed continuous feed (dot matrix) paper! Also, your writing is so clean and legible, which makes it perfect for this application!

Ответить
@AndrasBuday
@AndrasBuday - 20.04.2023 12:01

Whilst it is true in practical terms, as any odd number can indeed be written as a2-b2, if N is divisible by 2 and not 4 (6 = 3 * 2, or 14 = 7 * 2), the statement that "any composite number N can be written as the difference of two square numbers" is not true. Again, in the case of RSA, this is a non issue since for this not to work, p or q must be 2 (the only even prime), which is obviously a terrible idea.

Ответить
@edwardkent1503
@edwardkent1503 - 28.03.2023 05:32

A side note - any modulo with a prime base creates a group under multiplication, which is why you mentioned finding the inverse of phi_n - I think this is an awesome example of pure maths such as group theory actually being used in action! :)

Ответить
@joaovernieri8409
@joaovernieri8409 - 26.02.2023 18:36

Awesome video, however u cant apply this formula u made (N = a² - b²) for all cases... just the one you picked ;)

Ответить
@dripcode2600
@dripcode2600 - 17.02.2023 09:59

Wow! There should be some software that confirms a public key is strong.... I'm guessing this already exists.

Ответить
@richardhunter132
@richardhunter132 - 24.12.2022 00:35

so the lesson here is to mind your Ps and Qs

Ответить
@davidjohnston1799
@davidjohnston1799 - 09.12.2022 09:41

That dot matrix printer paper though.

Ответить
@GrandMarkimus
@GrandMarkimus - 03.12.2022 01:05

"I'm not a genius, it just wasn't difficult". I'm using this

Ответить
@johnholly6280
@johnholly6280 - 02.12.2022 11:08

Definitely stealing this method for CTFs. I've been using a number field sieve to factor low-bit modulo numbers. This is awesome!

Ответить
@Mostlyharmless1985
@Mostlyharmless1985 - 14.11.2022 23:13

The good news is since getting the weak primes out of the keys is so trivial, it's equally trivial to make a test at key creation and just reject the keys and start over.

Ответить
@miraculixxs
@miraculixxs - 10.11.2022 15:28

So. How is openssl generating p, q?

Ответить
@mrme488
@mrme488 - 06.11.2022 22:53

plz ! i hope you make a video about chacha20/xchacha20 cipher with more details !!

Ответить
@-parrrate
@-parrrate - 30.10.2022 19:18

put your key away, waltuh; I don't wanna exchange with you, waltuh;

Ответить
@mastermati773
@mastermati773 - 07.08.2022 19:41

Not good tutorial. Don’t explain how to break internet.

Ответить
@moradan81
@moradan81 - 26.07.2022 06:14

When I started following Numberphile I couldn't understand what was all the fuss about with the primes. Then I started following computerphile and it slowly started to make sense.

Ответить
@c3ll401
@c3ll401 - 07.07.2022 06:40

Thanks Peter Parker

Ответить
@abnrmlmind
@abnrmlmind - 28.06.2022 02:25

I thought it was Elijah Wood explaining rsa

Ответить
@kdhlkjhdlk
@kdhlkjhdlk - 26.06.2022 06:58

Fermat is pronounced "Fer-mah"

Ответить
@terrabys
@terrabys - 23.06.2022 18:19

Wow YT video compression hates ur sweater.

Ответить
@squirrelpatrick3670
@squirrelpatrick3670 - 17.06.2022 08:22

that is so clever! omg

Ответить
@macktheripper7454
@macktheripper7454 - 15.06.2022 10:31

Protect this man at all costs.

Ответить
@jaivanthmelanaturu4589
@jaivanthmelanaturu4589 - 13.06.2022 10:22

I don't understand one thing though, 1 mod anything is always 1 right? So what's the point of writing 1 mod (euler totient (n))?

Ответить
@kentw.england2305
@kentw.england2305 - 11.06.2022 22:47

How do we know if our RSA implementation avoids this? Could NSA sneak something in that causes this weakness?

Ответить
@passivehouseaustralia4406
@passivehouseaustralia4406 - 08.06.2022 09:32

Generate the primes.... do this test to 100 iterations. if it fails throw them out, if it passes keep them. ???

Ответить
@ForcefighterX2
@ForcefighterX2 - 02.06.2022 15:35

This is exactly the reason why one must never implement cryptographic algorithms as they are explained in textbooks. They lack all these real world tweaks which are necessary to prevent very specialized attacks for specific cases.

There even have been smartphone apps in the past (sorry for not remembering the names - they were short lived), where cryptographers essentially criticized exactly that: It was a textbook implementation which does not hold up against real world scenarios, resulting from specific hardware, bad random number generators, limited memory, similar user mindsets, etc...

Ответить
@Zorgoban
@Zorgoban - 01.06.2022 11:09

Very nice! A video with a practical example! Not only dry theory as most of your videos.

Ответить
@topquark22
@topquark22 - 31.05.2022 17:16

Common factor attack: Given two private keys n1 = p * q1, n2 = p * q2, using the same p, then p = gcd(n1, n2), which is easy to compute with Euclid's algorithm, then q = n / p.

This actually happened for a large number of public keys in the wild, that had been generated using a faulty prime number generator. This finding was revealed in a paper from February 2012.

Ответить
@noir371
@noir371 - 31.05.2022 06:31

I have no idea what he’s talking about but I can’t stop watching

Ответить
@krissam7791
@krissam7791 - 28.05.2022 19:38

The hilarious part is that, unless it was some clever editing, it took longer to verify that p and q were primes than it did to derive them.

Ответить
@THE16THPHANTOM
@THE16THPHANTOM - 28.05.2022 01:17

clickbait title.

Ответить
@PauxloE
@PauxloE - 24.05.2022 00:59

This demo program would have better when it also printed the number of iterations needed.

Ответить
@youngprogrammer5258
@youngprogrammer5258 - 22.05.2022 08:01

I tried many ways, I even modified my iptables rules, firewall restrictions, and all the possible ways, but still I cant get reverse shell. Netcat doesn't listen to my reverse shell, so I stucked in the root me room for more than a week. I need help, please anyone suggest me any ideas to overcome this.

Ответить
@fslurrehman
@fslurrehman - 21.05.2022 14:30

Hence P = NP

Ответить
@savorerguru
@savorerguru - 20.05.2022 10:13

I cannot watch another second while that marker is making those sounds on that paper. An annoying phobia of mine, don't know why. Even though I really want to watch this well explained, super interesting video.

Ответить
@patrickjackman8688
@patrickjackman8688 - 19.05.2022 23:50

Is it time to go back to the one time pad, but that of course depends on truly random numbers……

Ответить
@TorATB
@TorATB - 19.05.2022 21:13

How fast could you calculate 'd' (public key) when using optimized code for QBit Processor? Even when 'p' and 'q' are "difficult" numbers?

Ответить
@legostory33
@legostory33 - 19.05.2022 01:58

please post more computerphile. I find my computer science classes incredibly boring, but these videos I cant stop watching. Makes me love computers!

Ответить
@allliquid6320
@allliquid6320 - 18.05.2022 14:12

When you realize it's a coding thing and not about RSA (Republic of South Africa)

Ответить