Recover RSA private key from public keys - rhme2 Key Server (crypto 200)

  Рет қаралды 116,642

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 154
@jb13611
@jb13611 5 жыл бұрын
For anyone using python 3+ you will want to do q = n//p since one division operator results in an approximated float and will lose some precision resulting in a wrong q.
@cyancoyote7366
@cyancoyote7366 7 жыл бұрын
It's so unbeliveable that people are smart enough to create things like this that just work. It always blows my mind...
@varkokonyi
@varkokonyi 6 жыл бұрын
LiveOverFlow is smart, but he said several times that he doesn't just write a script that works the first try, he spends at least a few hours on each video. He has a vid on making a vid, check it out
@sunburststratocaster
@sunburststratocaster 6 жыл бұрын
@@varkokonyi I think OP was referring to the hashes and algorithms originally, not just finding the flag
@lilp4p1
@lilp4p1 7 жыл бұрын
this episode was really impressive, well done!!
@Mindflayer86
@Mindflayer86 3 жыл бұрын
Ironic. For my job, I watched a lot of videos about why and how RSA works. Some more mathematic - some less. But the best explanation comes from a video about how to break RSA... Thanks LiveOverflow
@erythsea
@erythsea 2 жыл бұрын
what is your job?
@rafid1998
@rafid1998 7 жыл бұрын
Seccon 2017 had a same type of ctf problem, and it was the first ctf problem i had solved on my own, your videos is where i started my journey into RE and ctf and stuff. Keep up the good work.
@raf22nd
@raf22nd 7 жыл бұрын
The technical aspects still go over my head, I'm new to this. But your thought process man, that's gold. Thanks for sharing and keep it up!
@silverzero9524
@silverzero9524 6 жыл бұрын
I agree
@mynewrandomhandle
@mynewrandomhandle 7 жыл бұрын
This challenge was based on CVE-2008-0166 (Debian Security Advisory DSA-1571-1).
@EdwinBalani
@EdwinBalani 7 жыл бұрын
Explains the name "Ebian Corp" ;)
@hexsec2011
@hexsec2011 4 жыл бұрын
@@EdwinBalani watch dogs
@nirmalthapa8093
@nirmalthapa8093 7 жыл бұрын
Reminds me of RSA challenge which I faced in a CTF and I had no idea how was this RSA thing working but thanks to you. I got clear concept about RSA 😃
@LiveOverflow
@LiveOverflow 7 жыл бұрын
+4 N it's a very typical CTF challenge :) mind blowing the first time you see it, but boring and straight forward afterwards :(
@nirmalthapa8093
@nirmalthapa8093 7 жыл бұрын
yeah. maths part is boring :(
@rhrh9012
@rhrh9012 7 жыл бұрын
LiveOverflow I always looked at RSA's simple one-line math and thought "how could no one break it"? As I've entered the video I thought, hmm, maybe someone did. But no, you need extra help for doing so :( Nevertheless, great video!
@hecko-yes
@hecko-yes 6 жыл бұрын
0:14 This somehow consistently activates my Google Assistant, even though I myself have trouble doing it.
@typedeaf
@typedeaf 5 жыл бұрын
Awesome video. Going to have to watch it again to digest it (unintentional crypto pun.) Tip: put a hyphen between bullshit and free, ie. bullshit-free, or else it might imply that is is both bullshit and free, instead of being free of bullshit.
@mistsu1171
@mistsu1171 3 жыл бұрын
Great video man ^^ Hope you got some more vids about cryptography like this one heheh
@Zzznmop
@Zzznmop 6 жыл бұрын
Discrete math
@Bubatu7
@Bubatu7 7 жыл бұрын
I learned so much with this video, great one, thanks!
@cthulify
@cthulify 7 жыл бұрын
Very well put together, kudos!
@georgekonstantopoulos212
@georgekonstantopoulos212 7 жыл бұрын
Great video and nice crash course on RSA!
@MrLePiggy
@MrLePiggy 7 жыл бұрын
I heard about some news that the "Shor Algorithm" will be able to crack all Public keys Encryption methods but you'll need a Quantum Computer for that which nearly nobody has.
@Mike-gs7eo
@Mike-gs7eo 7 жыл бұрын
Yup, on a quantum computer, shor's algorithm can do prime factorization in polynomial time
@rhrh9012
@rhrh9012 7 жыл бұрын
Desenter though when we'll get to quantum computing almost everything we do in cs will need to be rethinked and remodulized
@iamtheguitar
@iamtheguitar 7 жыл бұрын
1. There are lots of Quantum Computers but their computational Power is very limited. They can factorize very small numbers only. It's hard to estimate when they will be ready. 2. There are actually Asymmetric Methods that might hold against Shor's Algorithm, that you could use on a standard computer. So not all hope is lost. One method being discussed these days was invented a few decades ago and never used. Pretty impressive imho
@hxllside
@hxllside 6 жыл бұрын
Shor also figured out how to do logarithms on quantum computers which breaks the El gamal encryption
@MrFram
@MrFram 6 жыл бұрын
It's not sure quantum computers will break all public key encryption. As far as we know, only the popular methods will be broken. Candidates for post-quantum public key crypto: McEliece cryptosystem, Winternitz signatures, syncing tree parity machines for key exchange, NTRU...
@angela_jx
@angela_jx 6 жыл бұрын
This just blew my mind.. great stuff
@privatekeyrecoverybitcoinr9425
@privatekeyrecoverybitcoinr9425 4 жыл бұрын
Recover your lost coins with a private key inbox me
@harshant1
@harshant1 6 жыл бұрын
One of the best video on crypto
@_mm512_load_ps
@_mm512_load_ps 7 жыл бұрын
holy fucking shit
@EchoXIIIGO
@EchoXIIIGO 7 жыл бұрын
Shit, I'm just gonna watch this when I'm 3 days less sleep deprived haha, very informative though
@privatekeyrecoverybitcoinr9425
@privatekeyrecoverybitcoinr9425 4 жыл бұрын
If you need a private key recovery just contact me on +1(202)7434155
@jamesduvall168
@jamesduvall168 7 жыл бұрын
Amazing video. Please keep them coming
@6mikaoP6
@6mikaoP6 7 жыл бұрын
Just today i learned this at university! thank you!
@sem8973
@sem8973 7 жыл бұрын
Raúl Peñacoba Veigas what course are you doing?
@6mikaoP6
@6mikaoP6 7 жыл бұрын
I'm at Universitat Politècnica de Catalunya studying informatic engineering
@Salmiery
@Salmiery 7 жыл бұрын
You are the man. Great video again, as always. I would have never thought to use GCD. Just curious, did that take a long time to compute the GCD, or was that result real time?
@P-G-77
@P-G-77 Жыл бұрын
Juicy work.
@michaellin4553
@michaellin4553 6 жыл бұрын
What are the chances of two public keys having the same random prime in a real life setting? Like, given 10 randomly sampled public keys from a given keyserver plus one that we want to cryptanalyse, how likely is this to happen? There has to be a certain keyspace for RSA given that the keylength is just the length of n. To get anything, I would imagine that we would have to exhaust every combination of two public keys and the gcd() function just to find anything. This come to be O((b^2/2)-(b/2)), where b is the number of public keys in the directory (worst case scenario, big O). If we were given 10 public keys, we would attempt 45 combinations. 100? 4950 combinations. Note these are all worst case scenarios. In real life, I think b would be much, much bigger.
@sgstair
@sgstair 6 жыл бұрын
In practice, this is extremely unlikely. Assuming 2048-bit RSA (very typical), the primes will be 1024 bits long. The probability that numbers will be prime in that range is around 1 in 709 (1/log(2^1024)), so to be conservative we can say there are 2^1014 possible primes that could be used. (divided by 1024, or 2^10) So to try a birthday attack on this pool, the number of primes we need to collect to have a 50% chance of having a collision is approximately 2^507 primes, or 2^506 keys, which is utterly infeasible. That assumes that all primes are selected randomly from all available primes, which isn't actually the case, but the further reduction to the prime count isn't going to make the attack useful. Unless of course, the prime number generation routine is flawed in some significant way...
@PlasmaHH
@PlasmaHH 5 жыл бұрын
Surprisingly in certain circumstances it is rather high. There are lots of IoT devices that have bad random number generation. Also there has been a linux distro that so severely broke its random number generator for key generation that this happening was a real possibility.
@siddheshjadhav
@siddheshjadhav 7 жыл бұрын
insane smart work !
@SharylFeutz
@SharylFeutz 3 ай бұрын
Great video as always! 👍 Just a small off-topic question: 😅 I have a set of words 🤷‍♂️. (behave today finger ski upon boy assault summer exhaust beauty stereo over). I don't know what they are. What should I do with them? 🤷‍♀️
@geamer0079
@geamer0079 2 жыл бұрын
6:10 better explanation for modulo is remainder of division
@arjunpeter9614
@arjunpeter9614 3 жыл бұрын
Awesome Very brief explanation, great job, would you make a video on SS7
@sheelaghmynatt
@sheelaghmynatt 3 ай бұрын
Thanks for the breakdown! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). What's the best way to send them to Binance?
@Captain.Mystic
@Captain.Mystic 6 жыл бұрын
About the two prime numbers bit. If you figure out how to find two prime numbers easily. It wont just be RSA thats dead, a LOT of things can be solved as soon as that simple breakthrough is found(as far as i know) the whole P=NP problem right?
@GRBtutorials
@GRBtutorials 6 жыл бұрын
Nope. That you solved an NP problem in polynomial time doesn't mean you can solve ALL NP problems in polynomial time. In fact, with quantum computing, there's an algorithm that solves it in polynomial time.
@sidvyas
@sidvyas 6 жыл бұрын
if I am not wrong this will only work in the case of bad random generation right?
@ripmeep
@ripmeep 4 жыл бұрын
Yafu is a great tool for RSA key finding btw
@pascal6145
@pascal6145 6 жыл бұрын
great Job! very cool!
@JCake
@JCake 2 жыл бұрын
A+ for 'sane country like Germany'
@Firem1nded
@Firem1nded 7 жыл бұрын
Regarding Euklids Algorithm: Check out PBS Infinite Series if you haven't yet. They just released a great video explaining it, absolutely worth the time watching!
@iamtheguitar
@iamtheguitar 7 жыл бұрын
I totally agree. At first they seem like one of those channels breaking down maths into such a simple ecplanation that its wrong, to make the videos more popular. But after watching I realized the maths is not only legit, they explain it in the easiest way I've seen. Great channel
@GRBtutorials
@GRBtutorials 6 жыл бұрын
And they also explain RSA and how it could be broken with quantum computers! Definitely worth checking out.
@secaouseonyibe2254
@secaouseonyibe2254 6 жыл бұрын
Great video LiveOverflow(the man behind the video) where can i get the script from please?
@LiEnby
@LiEnby 5 жыл бұрын
Couldn't you also try changing the public key in the application to one that you know the private key for then just sign it?
@MadushanNishantha
@MadushanNishantha 6 жыл бұрын
What am I missing here? It looks like GCD is way faster than prime factorization, what stops me from collecting a lot of public keys on the internet(say from SSL certificates) and try to brute-force and at least get factors for few of them?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
You didn’t miss anything ;) people have done that
@MadushanNishantha
@MadushanNishantha 6 жыл бұрын
I better get cracking 😂😂
@madcroc111
@madcroc111 6 жыл бұрын
@@LiveOverflow Are there way too many prime numbers to do that then? I also immediately thought of this. The big companies would have a database with all prime numbers and make a public key per prime. Then compare those made up public keys with real ones they want to break.
@silverzero9524
@silverzero9524 6 жыл бұрын
They could even store the product in db
@renakunisaki
@renakunisaki 5 жыл бұрын
@@madcroc111 yeah, we're talking numbers thousands of digits long. The odds of finding such a collision in theory are comparable to the odds of winning the lottery while being hit by lightning. But, sometimes people flub the random generation, making it a lot more likely.
@mustafaaytas6027
@mustafaaytas6027 7 жыл бұрын
You guys ever done this and successed? I just wonder where?
@renakunisaki
@renakunisaki 5 жыл бұрын
I think this is the same mistake Sony made with the PS3? Reusing Q for two different signatures, allowing people to compute the master key?
@sankarsanrauta7062
@sankarsanrauta7062 6 жыл бұрын
Wow ur videos are so awosome
@mihai6564
@mihai6564 4 жыл бұрын
Nice video. But I don’t understand one thing. There are services (like github) which have thousands and thousands RSA public keys. Why don’t they watch this video and get all the private keys?
@d1rtyharry378
@d1rtyharry378 4 жыл бұрын
Maybe bruteforcing the value e is not easier than it is here? Because of ctfs these type of things are intended. I'm not sure tho
@tomtravis858
@tomtravis858 4 жыл бұрын
The RSA was implemented incorrectly, proper RSA can't be broken with modern tech yet.
@Utubelmb123
@Utubelmb123 5 жыл бұрын
How do you go from a hashed public key to the normal numbers public key? Is that just using SHA-1? Confused..:/
@arc.ismail4714
@arc.ismail4714 4 жыл бұрын
Go to fredmitnick95 oπ lnsta for a valid private key
@bikhlarrovamarakov5392
@bikhlarrovamarakov5392 6 жыл бұрын
geat teacher u are
@nicka2570
@nicka2570 7 жыл бұрын
Amazing
@ChaddyHV
@ChaddyHV 7 жыл бұрын
Thanks for sharing
@shargon85
@shargon85 7 жыл бұрын
its possible reverse AES/CBC (get the password) with the IV and the crypted text?
@PhilNavidson
@PhilNavidson 7 жыл бұрын
So is this GCD method to figure out one of the prime factors not a problem in general for RSA?
@LiveOverflow
@LiveOverflow 7 жыл бұрын
+Phil Glaser well it is an issue for RSA in the sense that you have to be aware of this. It's a mistake you could accidentally make. It doesn't break RSA in every case, but you should be aware of in what cases crypto algorithms can be weak.
@PhilNavidson
@PhilNavidson 7 жыл бұрын
Are public keys not typically similar in length (i.e., common standards are 1024 and 2048 bit keys)? Assuming they are, wouldn't that just mean that you could apply this GCD method?
@iamtheguitar
@iamtheguitar 7 жыл бұрын
I don't know about the coding, but apllying the theory it seems very unlikely that the keys have the exact same lenght. I would guess they fill the remaining bits up with zeros.
@RaceForMoney
@RaceForMoney 7 жыл бұрын
Have rabbit command for terminal? Please give me this!
@venkateshp1191
@venkateshp1191 2 жыл бұрын
what if public key pair is known? Assume a public key for RSA encryption given by the pair (143, 11). Find the private key corresponding to this pair.
@vanadiumV
@vanadiumV 5 жыл бұрын
you need very very expansive FPGA boards to do that !
@10178697
@10178697 4 жыл бұрын
I have a pdf digitally signed . Want to know if you can crack it so i could use that signature in other document and still be validated?
@rogo7330
@rogo7330 4 жыл бұрын
Idea of signature is about only you can create same signature. Then someone else can create the same signature, you can't prove that it was you. Private key should be your secret.
@kevinalexander4959
@kevinalexander4959 2 жыл бұрын
OpenSSL has had this patched since 2008 though!
@carel_dfx
@carel_dfx 4 жыл бұрын
It is too much coincidence that two public keys have one prime number in common... But I think it’s normal if you make a CTF...
@LiveOverflow
@LiveOverflow 4 жыл бұрын
is it? eprint.iacr.org/2012/064.pdf 'More worrisome is that among the 4.7 million distinct 1024-bit RSA moduli that we had originally collected, 12720 have a single large prime factor in common"
@carel_dfx
@carel_dfx 4 жыл бұрын
@@LiveOverflow thx 4 the info i didn't expected you respond me 😂😍🥰
@stanislawpalka9015
@stanislawpalka9015 4 жыл бұрын
This atack does not work. Number n to factorize have 256 bits. And primes have 128 bits each. gcd(n,x) return common prime p only if x is divisible by p. But because p is so big you have not chance to chose such x. Random choise of x works only when primes p&q are small.
@LiveOverflow
@LiveOverflow 4 жыл бұрын
??? GCD on two n that share a prime factor works. As seen in this video??? What do you mean?
@stanislawpalka9015
@stanislawpalka9015 4 жыл бұрын
@@LiveOverflow "GCD on two n that share a prime factor works" but in case of PGP cryptography it is difficult to find x such that x and n share common factor. How to chose such x for given number n?. Mathematician chose random x bigger then n. If gcd(n,x)=1 they chose another x randomly. In case of random n this method works well because random n has often small factor and has many factors. But in case of PGP cryptography n has only 2 factors which are primes!. So in this case is very difficult find such x that share common factor with n. Mo rover p and q are very big numbers. Why choising randomly x is bad for this case? For simplicity I take n=15 p=3,q=5. p
@idofilus7464
@idofilus7464 7 жыл бұрын
Impressive
@happygimp0
@happygimp0 4 жыл бұрын
How did you know that there was a common q in different keys? Can you find that out by debugging the code?
@d1rtyharry378
@d1rtyharry378 4 жыл бұрын
He was just trying out a possibility. If the number didn't have a common divisor, he'd have tried some other things.
@npip99
@npip99 6 жыл бұрын
@liveoverflow It's really not black magic, I mean the proof is quite short. d was calculated as invmod(e, (p-1)(q-1)), so d*e = 1+(p-1)(q-1)*K. Now, you're done by Euler's Theorem. (That m^((p-1)(q-1)) = 1 mod pq).
@npip99
@npip99 6 жыл бұрын
And it's surprisingly easy to iron out the Euler part if you want a ground up understanding (not totally necessary though). By Fermat's little theorem m^(p-1) is equal to 1 mod p, and same for q. Multiplying gives m^((p-1)(q-1)) = 1 mod pq and done. An easy to understand proof of Fermat's little theorem is here: primes.utm.edu/notes/proofs/FermatsLittleTheorem.html Okay, it uses Wilson's theorem, but then look up that proof and you'll see it's also surprisingly simple (And how it all comes together is really rewarding and honestly magical in its own right)
@anshuljain3465
@anshuljain3465 Жыл бұрын
how to convert public keys to numbers?
@tzzzliang4874
@tzzzliang4874 2 жыл бұрын
that is cool
@TheOnlyGeggles
@TheOnlyGeggles 7 жыл бұрын
Warum benutzt du immer Python2 anstatt 3?
@LiveOverflow
@LiveOverflow 7 жыл бұрын
I'm an old person who doesn't want to change and learn anything new, so I stick to the good ol' days
@Miles-co5xm
@Miles-co5xm 4 жыл бұрын
i was making advanced rsa encrypter , then i saw this
@nicolasguillan7672
@nicolasguillan7672 5 жыл бұрын
Hi , with this you can get RSA PRIVATE KEY?
@arc.ismail4714
@arc.ismail4714 4 жыл бұрын
I'm sure Fredmitnick95 oπ lnsta can get it for you
@puranyadav6577
@puranyadav6577 5 жыл бұрын
sir my pc data corrupt from virus and readme massage for private key in 0.08 bitcoin .so help me about this
@happygimp0
@happygimp0 4 жыл бұрын
Format the disk and restore your data from a backup.
@arc.ismail4714
@arc.ismail4714 4 жыл бұрын
Go to fredmitnick95 oπ lnsta for a valid private key
@danycowwashere
@danycowwashere 6 жыл бұрын
Guys sorry to bother, but can anyone help me out with a ransomware situation? All my files were apparently encrypted. Encryption was produced using unique private key RSA-1024 (as the ransom note claims)
@GRBtutorials
@GRBtutorials 6 жыл бұрын
If the private key has been leaked, there might be a decryption program. But if that's not available, the easiest way is to restore from backup (because you have a backup, don't you?). And take it as a lesson to backup more often. Or you could attempt to brute force it using methods such as GNFS, but you might get nowhere. And if you're patient enough, wait until quantum computers get more powerful, as RSA could be broken in a powerful enough quantum computer.
@TheSecretssocieties
@TheSecretssocieties 7 жыл бұрын
so can this work for my wallet id transactions as i have a few id that i dont have PK any more
@dreamyrhodes
@dreamyrhodes 6 жыл бұрын
No. Bitcoin doesn't use RSA
@dasher9
@dasher9 7 жыл бұрын
Is there a way to recover our private key of ETHEREUM address with our public Key ? I loose my backup. My funds are on Etherdelta's platform and i already try to go into google's development tool => application tab => localstorage to check if they were the key value of my private key but no in fact. No other way to find it? because otherwise i loose a lot of money.. thanks for your help if its possible
@LiveOverflow
@LiveOverflow 7 жыл бұрын
sounds like you have no chance. sorry :(
@vaisakh_km
@vaisakh_km Жыл бұрын
Wow
@PvblivsAelivs
@PvblivsAelivs 7 жыл бұрын
But you could use RSA the same way as AES. Break the message up into blocks according to the modulus. I see you talk about the difference. But you dismiss actual differences as "shallow." And then you claim a "difference" that is no difference at all. Though you may dismiss this as "shallow" (you seem to dismiss all actual differences as "shallow") the fundamental difference is that AES is designed such that the information needed to encrypt is the same as the information to decrypt, while in RSA the ability to encrypt will not also allow you to decrypt. Reversing the algorithm is computationally hard.
@LiveOverflow
@LiveOverflow 7 жыл бұрын
That's clearly just an opinion of mine that I consider asymmetric vs symmetric a "shallow" difference. But I still mention it, so what's the issue? I just emphasise on what I think is a more sensible difference. The AES algorithm is fundamentally different from RSA. AES operates on bytes, s-boxes, shifting, mixing, ... blah... and sure that is also (binary logic) math. But RSA is basic numeric math. Sure you can jump through hoops and make RSA behave like a block cipher, but I think I made it clear what kind of difference I see there :)
@PvblivsAelivs
@PvblivsAelivs 7 жыл бұрын
Well, the one thing you clearly identified as a "difference" was that AES operates on blocks. You also said that implementations operate on bytes. Unfortunately, the same is true of RSA. I got the distinct sense of trying to describe a particular difference that wasn't really there.
@LiveOverflow
@LiveOverflow 7 жыл бұрын
But RSA doesn't operate on bytes. Sure it's implemented on a computer that uses bytes to represent the numbers, but RSA is essentially just mathematical exponentiation. While AES does bitwise xors, byte substitution, mixing the bytes, ... For example bitwise xor in AES requires you to look at the data in bits. Same with the byte substitution. While you can do RSA with whatever number system you feel like. That the difference to me.
@PvblivsAelivs
@PvblivsAelivs 7 жыл бұрын
"But RSA doesn't operate on bytes." Any realistic implementation of it does. But you may be talking about it being easier to explain how it operates to someone.
@LiveOverflow
@LiveOverflow 7 жыл бұрын
Look at the wikipedia article of RSA - section: Operation. The whole algorithm does not involve bits or bytes. It's just dealing with numbers. Now look at the wikipedia article of AES. In the highlevel description you can see how they talk about mixing and substituting bytes all over the place. Bit operations like XOR that only make sense on bits. It's nothing you do on regular numbers... "Substitution permutation network"... We are attacking the math in this video - finding the prime factors of a number. Has nothing to do with bytes. You can do the calculations with your calculator. While AES is completely different on the algorithm level. Ignore the fact that both is implemented on a finite memory deterministic machine based on bits. AES and RSA are based on fundamentally very very different things.
@liusyulianto8865
@liusyulianto8865 3 жыл бұрын
Hello liveOverflow, greeting from Indonesia, I always like your tutorial because it's easy to understand. I tried to copy your script but I got confused in gcd script, can you please share your gcd script? Thank you in advance
@arsen3783
@arsen3783 5 жыл бұрын
you saying google activated my Google assistant
@ahmedcissp
@ahmedcissp 5 жыл бұрын
Decipher RSA: For example 12345 reverse it 54321, minus 54321-12345 every time take mod of result now devide by 9 repeat process until you get zero last value before zero is key to decipher this algorithm.
@uccohwrmtqle2xernixq7mdw39
@uccohwrmtqle2xernixq7mdw39 6 жыл бұрын
I use sha512
@justknot4481
@justknot4481 3 жыл бұрын
it 's 10th grade highschool math 🤣🤣
@fairplaymichael4640
@fairplaymichael4640 3 жыл бұрын
I’m so glad I got my account back with thê hêlp of the *lucidcracks* thanks I’m so happy guys
@TheGrimravager
@TheGrimravager 6 жыл бұрын
high school level ? maybe, but explaining how it works.. pfft I took codes and security.. unofficial prerequisits: functional analysis, group theory, algebraic structures and linear algebra.. third year physics elective edit: but I was able to implement my own RSA encryption algorithm and code it such that a mathmatician could understand it
@444whoislex
@444whoislex 5 жыл бұрын
I’ve found a way to factorize primes, use a quantum computer! Is rsa dead now? 😂
@happygimp0
@happygimp0 4 жыл бұрын
Can you build one that can factorize numbers with 2048 bits?
@arc.ismail4714
@arc.ismail4714 4 жыл бұрын
Go to fredmitnick95 oπ lnsta for a valid private key
@George-gj9je
@George-gj9je 3 жыл бұрын
*DOAVERCRACKS* óñ !G🇺🇸
@brian-pf5dk
@brian-pf5dk 6 жыл бұрын
wtf macOS. Thats kinda disappointing.
Format string exploit on an arduino - rhme2 Casino (pwn 150)
7:41
LiveOverflow
Рет қаралды 17 М.
HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128
15:47
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН
Breaking RSA - Computerphile
14:50
Computerphile
Рет қаралды 369 М.
Asymmetric Encryption With OpenSSL (Private Key & Public Key)
19:02
Public Key Cryptography: RSA Encryption Algorithm
16:31
Art of the Problem
Рет қаралды 941 М.
TLS Handshake Deep Dive and decryption with Wireshark
1:05:40
David Bombal
Рет қаралды 287 М.
The RSA Encryption Algorithm (1 of 2: Computing an Example)
8:40
Eddie Woo
Рет қаралды 1,1 МЛН
The Circle of Unfixable Security Issues
22:13
LiveOverflow
Рет қаралды 116 М.
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
24:11
LiveOverflow
Рет қаралды 64 М.
Key Exchange Problems - Computerphile
9:18
Computerphile
Рет қаралды 362 М.