The RSA Encryption Algorithm (2 of 2: Generating the Keys)

  Рет қаралды 639,244

Eddie Woo

Eddie Woo

Күн бұрын

Пікірлер
@thebillington
@thebillington 9 жыл бұрын
I'm currently revising for my cryptography final year exam, and this video is the best RSA explanation I've found anywhere. Just a shame that some of his class doesn't keep quiet, they don't realise they're listening to a genius!
@mmmajeed
@mmmajeed 8 жыл бұрын
+Billy Rebecchi its realy good to watch some one explaining things in this manner ...
@gib1262
@gib1262 5 жыл бұрын
Billy Rebecchi agreed
@arabiclive007
@arabiclive007 5 жыл бұрын
me too preparing for final exam...
@dragonore2009
@dragonore2009 5 жыл бұрын
Not for a final, but I used this so i can test out my program to see if it was written correctly.
@julianmjk5120
@julianmjk5120 5 жыл бұрын
I enjoy the background ambience of the audience, it's normal for them to make some noise, it also makes it feel less lonely, unlike many other such videos. Eddie Woo's enthusiasm is the absolute best though!
@thomasappel2973
@thomasappel2973 4 жыл бұрын
We need more teachers like this... He's teaching faster, more accurate and more fun and energetic it sometimes doesn't even feel like he is teaching but is telling us a nice story
@CharlesVanNoland
@CharlesVanNoland 4 жыл бұрын
That's how it is when a teacher is actually passionate about what they're teaching. :P
@sophocles1198
@sophocles1198 2 жыл бұрын
Feels like he is teaching to me. The whiteboard is a giveaway
@jhewitt2008
@jhewitt2008 9 жыл бұрын
You're an exceptionally talented teacher. Thank you
@docktordicking2852
@docktordicking2852 6 жыл бұрын
Yeah hes great
@Sahil-ph1bp
@Sahil-ph1bp 7 жыл бұрын
4:10 "I KNOW you think you are talking softly. You are not talking softly" LOL ROASTED
@Subtitles00
@Subtitles00 6 жыл бұрын
7:50 "Is it really that hard? :(" This dude just casually destroying kids while teaching RSA, amazing.
@benriminton
@benriminton 6 жыл бұрын
He might be saying "Is it really that hard to STFU?"
@MrMamfbr
@MrMamfbr 6 жыл бұрын
such a smooth way to burn
@amit_bisht
@amit_bisht 5 жыл бұрын
@@Subtitles00 That was encrypted message for "Stfu bit*h!". Only people with some processing power are able to decipher such messages.
@mikecmw8492
@mikecmw8492 4 жыл бұрын
Obviously this class has mentally challenged people who should not be there.
@jihochoi_cs
@jihochoi_cs 7 жыл бұрын
I want to go to this secondary school instead of my university. lol
@missghani8646
@missghani8646 6 жыл бұрын
same, I had such an amazing teacher, but he only teaches secondary and i miss his classes now that i m doing my degree, gems like these teachers are needed at each uni or school
@tanveerhasan2382
@tanveerhasan2382 6 жыл бұрын
wait, its a secondary school?
@missghani8646
@missghani8646 6 жыл бұрын
@@tanveerhasan2382 yh
@joaogabriel6929
@joaogabriel6929 5 жыл бұрын
what? secondary school, learning rsa wtf? Some people are so lucky. Damn i wish i had that in my school
@mmcgames8499
@mmcgames8499 4 жыл бұрын
I fell u bro
@abdulazizrehan
@abdulazizrehan 5 жыл бұрын
I remember studying 3 courses on Cryptography during my Masters in Theoretical Computer Science taught by a renowned research leader in the field, but I haven't seen anyone explain RSA so beautifully!
@nazhasabiri4825
@nazhasabiri4825 5 жыл бұрын
if Eddie Woo explains it better than your teacher, than Eddie is the leader in the Theoretical Computer Science.
@gytisx13
@gytisx13 5 жыл бұрын
Well, he only explained a very simplified RSA. Though understanding simplified way first probably would help to understand underlying formulas and stuff better. Btw maybe he does in the next video I did not check.
@wonderfulworldofmarkets9033
@wonderfulworldofmarkets9033 4 жыл бұрын
​@@gytisx13 No I think he leaves it at this level without going deeper that because he's teaching high schoolers. In all of Eddie's videos it seems like he struggles to dumb down his lessons as to not intimidate his young students and keep them engaged. It's sad that he's such a caring teacher that even when he tries to do that students talk during class (4:10) or give up saying it's so hard (7:54). Like he says its to complicated explain the mod calculator "trick" that takes about 2 seconds to understand. Or why the the number of coprimes of the product of two primes is just the product of 1 minus each prime (which is explained in a simple understanding of prime numbers). I feel like his highschool students not really caring is what has made him into such a great teacher. Compare that to college where the students are so compelled to learn for the high tuition or job prospects but it causes the opposite effect: professors can bullshit their lecture slides and put little to no effort into class.
@2wr633
@2wr633 Жыл бұрын
​@@wonderfulworldofmarkets9033 you said it's very easy to understand why the amount of coprimes with pq between 1 and pq is (p-1)(q-1) but i have tried so hard and still can't figure it out, can you explain for me why that is the case? Edit: nvm i figured it out after asking
@antelope6826
@antelope6826 Жыл бұрын
I've worked in cyber security for 10+ years and Eddie just explained RSA better than I've ever understood it. Love his style of teaching so much, it is so elegant and succinct!
@DuncanInUK
@DuncanInUK 5 жыл бұрын
Starting to think the concepts in my uni lectures are probably actually quite simple, just the delivery is horrible.
@saloni8818
@saloni8818 4 жыл бұрын
same
@TheMalitias
@TheMalitias 4 жыл бұрын
That is the case very often. Quite a lot of teachers/professors want to seem smarter by making their topic appear more complex than it actually is. If you understood everything and can simplify what they are saying and they react insulted, you know they're just trying to show off instead of teaching.
@safer3853
@safer3853 4 жыл бұрын
I am in a cryptography class right now, and this is literally the easiest explanation I have found... I agree with you 100%
@jmcantila9104
@jmcantila9104 3 жыл бұрын
Academic institutions make a profit off making things seem more difficult than they are
@ABobroff
@ABobroff 3 жыл бұрын
he kinda skipped over the most important steps like: using euclid's algorithm to solve de = 1 (mod n), fermat's little theorem and euler's theorem . There is at least half of a semester of learning about discrete math before you could truly learn RSA in a rigorous manner. Understandable for HS teaching but in uni u need to understand the proof behind things, not just the equations.
@Mathiasmaxi1
@Mathiasmaxi1 4 жыл бұрын
"Every sixth multiple is a multiple of sixth" Genius
@peterhober8124
@peterhober8124 3 жыл бұрын
Finally. 40 years old and today I just understood exactly how RSA works, how and why the math actually works. Thank you!
@d3m0nger
@d3m0nger 19 күн бұрын
He explained how, but he did not explain why. But I guess the why is a many page math proof.
@Kearney999
@Kearney999 8 жыл бұрын
His enthusiasm is extrodinary and his delivery is second to none. A genius in understanding material, and teaching! You've got a bright future!
@rodmorgan9165
@rodmorgan9165 4 жыл бұрын
I'm 63, worked for over 40 years in data networking, software development and project management in the telecom industry. Thanks to Mr Woo, I now understand the underlying logic of encryption/decryption. You're never to old to learn and Mr Woo is an exceptional teacher. Thank you.
@ankurkumardubey9324
@ankurkumardubey9324 5 жыл бұрын
For people who are wondering what happened at 11:14 The private key d is derived from the following formula: d = (k*Φ(n) + 1) / e for some integer k At step 5 instead of doing what Eddie did, I'd suggest for you to use this formula instead which is basically the same thing. The little trick here is that k has to be such an integer, that k*Φ(n) + 1%e=0 (% stands for the mathematical mod) So let us try and find k for the above example where Φ(n)=6 and e=5 if k=1, 1*6+1%e = 2 if k=2, 2*6+1%e = 3 if k=3, 3*6+1%e = 4 if k=4, 4*6+1%e = 0 if k=5, 5*6+1%e = 1 if k=6, 6*6+1%e = 2 if k=7, 7*6+1%e = 3 if k=8, 8*6+1%e = 4 if k=9, 9*6+1%e = 0 So k=9 is our answer. Notice that we did not stop at k=4, because that would give us d=5 and the idea here is that d and e cannot be the same. Hence, for k=9 d = (k*Φ(n) + 1) / e = 11.
@alejandrobrufal257
@alejandrobrufal257 4 жыл бұрын
Thank you very much, I need it for a Covid App and your explanation was very useful!! 😁
@icommented9850
@icommented9850 3 жыл бұрын
what if we choose 17 of 11? using 17 for the secret key decrypts the message. so can there be multiple "d" for the same "e"? wouldnt that make different private keys?
@charlietran7182
@charlietran7182 3 жыл бұрын
You do realise that he's teaching a class of high school kids yeah? If you throw your equations at them they will be bored the hell out. Keep your explanation to the simplest form like Eddie was doing here
@Unstable_dio
@Unstable_dio 2 жыл бұрын
how can we apply this for huge numbers, we can't cycle through millions of possibilities when e is too long, it'll take way too much time
@cheerio4742
@cheerio4742 2 жыл бұрын
thanks, also does using extended euclidean algorithm have similar pattern?
@findthekeys3855
@findthekeys3855 4 жыл бұрын
I'm at the end of my first semester of a cyber security degree and I just can't get over how brilliantly explained this was. There is SO much more to teaching than just dumping knowledge out there - this video should be shown to all university professors as an example of top level teaching. A wonderful teacher you are Eddie.
@MattBellamy87
@MattBellamy87 9 жыл бұрын
Best explanation on youtube
@mr_kamuran
@mr_kamuran 7 жыл бұрын
exactly!!!!
@sanvedlop
@sanvedlop 7 жыл бұрын
I'd trade ten of my current professors to get you to teach me.
@BroadVisions92
@BroadVisions92 4 жыл бұрын
lol
@wonderfulworldofmarkets9033
@wonderfulworldofmarkets9033 4 жыл бұрын
Right? I think most teachers care more about being in power than their students learning. One time all the students in our class collected our notes and shared them on Google Drive so that we could learn Chemistry better and the teacher found out and threatened that she would fail us if we did it again. She cared more about us struggling to write down notes + pay attention rather than us learning the material and getting better grades. Compare that to Eddie who happily uploads his lectures on youtube! Sometimes the current school system / current school teachers are so backwards.
@philippegorov367
@philippegorov367 9 жыл бұрын
Man you're brilliant. Make some online courses and world will be better !
@brademerson8035
@brademerson8035 11 ай бұрын
Eddie, this was a GREAT presentation of this, holy smokes. I'm in an online CompSci curriculum, and I had to learn this last year. The math seemed really difficult at the time, and now watching your video for a refresher as we get into SSL/TLS/RSA/HTTPS, it seems so simple! Thanks for keeping these videos up! Also I laughed my ass off "I know you think you're talking softly, but you're not talking as softly as you think you are." you're obviously a very well tempered professor who's great with students. Don't ever lose that man!
@kinglouiecd
@kinglouiecd 4 жыл бұрын
Whenever I can't figure out a math concept, I look for an Eddie Woo video on it. You are an excellent teacher, sir.
@casualyoutuber6239
@casualyoutuber6239 5 жыл бұрын
Dude you jusy killed it, I learnt RSA in like 20mins which my teacher couldn't fully deliver in a 2 hours lecture. You are a really brilliant teacher and you explain stuff so well right down at the level of a student 👌👌
@jijsaxton
@jijsaxton 7 жыл бұрын
Currently learning network security and cryptography as one of my uni subjects. I have to say this video really helped me to understand the RSA algorithm. Brilliant teacher!
@HAAH999
@HAAH999 4 жыл бұрын
If you can't explain it simply, you don't understand it well enough....Albert Einstein Clearly, you nailed the topic as this is the simplest, most intuitive and most elegant explanation I have seen so far.
@harrytaller9403
@harrytaller9403 6 жыл бұрын
Eddie, you are the best teacher that I have seen in my life, I started my career as CS Teacher with Asia' s largest school.
@TheDilanson
@TheDilanson 4 жыл бұрын
The best lecturer I have ever seen... Thank you so much sir. I am so happy
@thegoonist
@thegoonist 4 жыл бұрын
honestly, this guy is easily in the top 1% of teachers. if hes being paid accordingly, i.e. he should be earning millions IMO.
@艾莉莉-y2y
@艾莉莉-y2y 2 ай бұрын
I'm revising for my cyber security course for masters and this is the best RSA explanation (and this video was made 9 years ago)!!
@leynenslucker2991
@leynenslucker2991 5 жыл бұрын
wow...... I never learned cryptography, never had any experience over higher level math. I understood every step. This is great. Very late to the party, but I like Eddie Woo's lectures
@Dennis-td3um
@Dennis-td3um 4 жыл бұрын
This man is such an amazing teacher I'm literally sitting here being awestruck about how great he is at explaining this topic.
@lololol112
@lololol112 8 жыл бұрын
amazing video! shame when there are people in the class not wanting to listen and yet so many people around the world who would kill to be in their place..
@tishachoudhuri7082
@tishachoudhuri7082 6 жыл бұрын
I agree
@silverzero9524
@silverzero9524 6 жыл бұрын
well i dont completely agree his explanation is good no doubt about it but do u consider how bored the students might be ? other teachers may not be good at teaching ? they were exhausted and wanted a break but didnt get 1. So its only natural to talk with others or do something that may disturb teacher
@its.moonjc
@its.moonjc 6 жыл бұрын
@@silverzero9524 Thats all assumption. Why are you speaking for them 😂
@annapoorania8860
@annapoorania8860 5 жыл бұрын
So trueee!
@Enigmater14
@Enigmater14 5 жыл бұрын
In uni and have a professor who sits and reads verbatim from slides for an hour. I would love to have someone as enthusiastic as Eddie teach me.
@blissbrad8665
@blissbrad8665 Жыл бұрын
The point where the teacher says " I know you are trying to talk softly but you're not, OK" with a smile. Genius
@nlwarrior
@nlwarrior 9 жыл бұрын
I may not aspire to become a teacher, but I am already looking up to you for the contributions your online lessons bring to us students. Keep up the good work :)
@durururururururu
@durururururururu 2 күн бұрын
he has helped me in highschool, and he has helped me in college. best teacher ever!
@TheHsuya
@TheHsuya 2 жыл бұрын
He's such an expressive teacher and really wants to impart all the knowledge he has. The students should be more respectful(silent) when he's working so hard for them!
@TheMR-777
@TheMR-777 Жыл бұрын
I was thinking the exactly same.
@jdgtnight
@jdgtnight Жыл бұрын
Incredible teacher, with real passion and energy. Eddie really enjoys the job. Thank you for the excellent lecture.
@The3nlightened0ne
@The3nlightened0ne 7 жыл бұрын
You're an amazing math teacher.
@bing_liu
@bing_liu 10 ай бұрын
Thank you for the video. My teacher at CIT just read a PowerPoint slide with no explanation. Now I can understand the whole procedure.
@LFSPharaoh
@LFSPharaoh 2 жыл бұрын
Great explanation. A shame the class was so disruptive. I would have been laser focused if I was there. It's one of my favorite clever-math things I've come across. I always revisit it from time to time.
@elikelik3574
@elikelik3574 5 жыл бұрын
Big respect to this Teacher. Excellent explanation. Thanks, Sir for sharing such a great explanation with us.
@RainingArtillery
@RainingArtillery 5 жыл бұрын
2 of 2? I feel robbed! We were getting to all of the good stuff. :(
@noahglimcher5445
@noahglimcher5445 Жыл бұрын
I was working for hours and hours to try to get an understandable and digestable explanation of RSA and you did it for me so beautifully I couldn't have asked for more. Now 1 or 2 years later when I wanted to refresh my memory because I wanted to start working on an encryption project of my own I remember how well you explained it to me and came right back. Thank you for explaining this complex topic to me so well, and setting an amazing example for teachers everywhere.
@realggo
@realggo 10 жыл бұрын
What a power in your deliver :) luvd it
@asdfgpredyz92
@asdfgpredyz92 2 жыл бұрын
Defenitely he is the best instructor, I'm here because of my java communication encryption homework for MSc CSE. Greetings from Hungary! :) Keep it up!
@standriggs2420
@standriggs2420 5 жыл бұрын
Note that in this example, e=5 and d=11, but 5 and 11 are the same when used as the exponent power mod 14. That is the lock is the same as the key in this particular case (which defeats the purpose). Also, the formula for Phi (Euler's totient function) given here only works for N that is the product of 2 primes. In general, if p is the list of the prime factors of N, phi(N) = prod(p-1) * N/prod(p). Which is to say that if you factor N, phi will be the product of the unique primes minus 1, times the repeated factors. For example N=5x5x7=175, phi(N) = 4x6x5 since the 5 factor is repeated.
@Lina-mb3vt
@Lina-mb3vt 4 жыл бұрын
What a briliant explanation! I can't believe, some of the students did not listen carefully, you're an amazing teacher!
@v1991c
@v1991c 7 жыл бұрын
omfg how old are the students?! they should be grateful they have such an explanation before their eyes. i certainly did not learn this in highschool, and in the university there were no kids...therefore i am intrigued
@tld8102
@tld8102 5 жыл бұрын
Students are teenagers. This is high school
@ArtyomPalvelev
@ArtyomPalvelev 5 жыл бұрын
When you're a teenager, you got more important things to worry about than coprime numbers and modular arithmetics :)
@ryank2465
@ryank2465 4 жыл бұрын
dawg you assume everyone on earth has the same mindset/priorities as you do lmao. you have the benefit of hindsight
@Norogoth
@Norogoth 4 жыл бұрын
@@ArtyomPalvelev Oh yeah I am sure they are discussing vital issues much more important than their education. Give me a break.
@arianphilips5777
@arianphilips5777 4 жыл бұрын
@@ArtyomPalvelev poor mentality
@earthpatel365
@earthpatel365 4 жыл бұрын
These kids are being spoiled lol my prof in college can't explain anything in 90 minutes yet I feel comfortable about RSA with you :) thank you!
@clemfoua661
@clemfoua661 6 жыл бұрын
"is it really that hard? " *sad and kinda disapointed face*
@Teslacoil33
@Teslacoil33 5 жыл бұрын
Nothing sadder than a sad Eddie ☹️
@duffmandje
@duffmandje 5 жыл бұрын
I thought a thug life meme would start at that point
@orange_leaf4913
@orange_leaf4913 4 жыл бұрын
aw :c
@gamertechkid1490
@gamertechkid1490 4 жыл бұрын
did someone leave? or was a student talking again?
@poisonpotato1
@poisonpotato1 3 жыл бұрын
I thought the student was talking again
@宇弦的书房
@宇弦的书房 3 жыл бұрын
Thank you for much for explaining this. I have been wondering why prime numbers are important for RSA but couldn't find anyone using an example like this! Your students are lucky to have you!!!!
@leequdgns
@leequdgns 9 жыл бұрын
I think it's worth to note that d is a multiplicative inverse of e mod (p-1)(q-1)
@iycgtptyarvg
@iycgtptyarvg 7 жыл бұрын
He sort of said that when he showed that d was added to the encryption formula e(mod phi(N)). What he did not explain is why d*e*(mod phi(N)) has to be 1. Also, he didn't tell them the maximum length of the message is limited to N. So, for instance, with his numbers it would not have been possible to encrypt the letter 'Z' in one step.
@MrNoxiium
@MrNoxiium 4 жыл бұрын
@@iycgtptyarvg why not? If my N is 247. What is the highest number I can encrypt/decrypt?
@sander_bouwhuis
@sander_bouwhuis 4 жыл бұрын
@@MrNoxiium [0,246]. But, with his numbers you cannot do more than [0,13].
@pcbona
@pcbona 3 жыл бұрын
you can clearly see, that he himself is passionate about the things he teaches. This helps alot in bringing the point across. Have seen so many videos where they only explain the theory or explain it with an example that has very large numbers and are hard to follow. This is the best explenation of the RSA algorythm i could find on YT and i have watched a lot of videos. Great teacher. He is not getting the attention he deserves for his genious.
@sagarkc6381
@sagarkc6381 8 жыл бұрын
Thank you so much. I thought I would never ever understand this
@mounikakulkarni1115
@mounikakulkarni1115 5 ай бұрын
My professor Xinyue Zhang is one of the best I've seen in my masters and I missed her RSA class(adv crypto), and believe me this helped me a lot in my exams, thank you.
@MateoHrastnik
@MateoHrastnik 8 жыл бұрын
Eddie you're a great man. You made my life so much easier. Thank you for this!
@Bittertokken
@Bittertokken 4 жыл бұрын
Watching in 2020! Even I'm annoyed AF at the talking student(s). This explanation was amazingly easy to follow, thank you!!
@derpyscratch9078
@derpyscratch9078 5 жыл бұрын
Eddie Woo, the man, the myth, the legend... he is the lord of this mathematical world, a deity among mere mortals... we love you Eddie, we love you.
@shayorshayorshayor
@shayorshayorshayor 4 жыл бұрын
Nerd
@riasadbari1872
@riasadbari1872 Жыл бұрын
You are one of the top 10 educators the world has ever witnessed... Your students are lucky to have you.
@GauravBoraJodhpur
@GauravBoraJodhpur 5 жыл бұрын
How can you talk in his class!! You teach beautifully Eddie!
@calcifer1234
@calcifer1234 3 жыл бұрын
I am very bad at maths and have been trying to get my head around RSA for ages and this video is what made it click for me. Thank you!
@PopeLando
@PopeLando 9 жыл бұрын
Gah! I'm just learning this stuff and while watching the previous video I used the proper algorithm to figure out the d, but all I could get was 5 and I couldn't figure out where he got 11. So now it turns out I was right all along! James Grime at Numberphile did the same thing - picked numbers so tiny you end up with e = d (which destroys the whole point!)
@ethan6708
@ethan6708 10 ай бұрын
The fact that this dude just dropped some major RSA knowledge bombs while simultaneously dealing with a classroom of what I presume are unruly and disrespectful college students(aka ADULTS), is amazing. This is the best cryptography video I have ever seen, hands down.
@mistsu1171
@mistsu1171 4 жыл бұрын
I have a few questions: 1. Why do we need to pick e between 1 and Φ(N)? 2. Why when we find d, it's found in such a way that de mod Φ(N) = 1?
@yeln4tsmusic
@yeln4tsmusic 5 жыл бұрын
I learned more about RSA encryption through this video than I have ever learned from any other article, book, or video. Thank you so much for making these videos!!!! Instantly subbed!!!
@heliousss
@heliousss 8 жыл бұрын
thank you so much i understood every word you said
@Makersdiary小匠记
@Makersdiary小匠记 4 жыл бұрын
Amazing how you explained RSA encryption to a class of high school students, and as someone who works in computer science, i have never seen this concept explained so beautifully.
@getnomercy4657
@getnomercy4657 4 жыл бұрын
Isn;t it weird that you can actually decrypt the cipertext with the lock. 4^5 = 1024, 1024/14 = 73.1428......, that - 73 gives 0.1425... and if you mulitiply this by 14 it gives back 2. I mean, am I the only one to notice this. It isnt a good formula or just not a good example of the RSA algorithm.
@juhi-yeturu
@juhi-yeturu 2 жыл бұрын
When I say I clutched my head and my mind was blown- HOLY ASDFGHJKL- ENLIGHTENMENT!! Couple more hours before my finals, and I finally get what RSA means for the very first time this entire semester!!
@Nico-ny2om
@Nico-ny2om 8 жыл бұрын
Such a complicated thing made simple !
@RaviKumar-ym5nm
@RaviKumar-ym5nm 6 жыл бұрын
QuantuMuffin yes
@fadygamilmahrousmasoud5863
@fadygamilmahrousmasoud5863 3 жыл бұрын
my doctor explains this in a 3 hours lecture and i can't see the big picture of the algorithm or where these numbers are exactly come from, you are amazing thank you 😄
@lyuboslavkanev8702
@lyuboslavkanev8702 6 жыл бұрын
Why did we choose 11 as the private key? 5 seems to also do the work, but the math is easier. Did we choose it for the sake of the example, or is there another reason?
@illiacvie
@illiacvie 6 жыл бұрын
The point of RSA is an asymmetric encryption. Where sender and receiver of the message didn't have same key. If he use (5,14) for both sender and receiver will have same key. This coincident can happen because he use 2, and 7 as 'p' and 'q' for the sake of simplicity in calculation. If we use bigger prime number for 'p' and 'q', most of the time sender and receiver will have different key (asymmetrical). for example if we use (7,33) to encrypt , we can't use (7,33) to decrypt the message. let says we send B or 2. 2^7 mod 33 = 29 if we tried to decrypt using (7,33) we got : 29^7 mod 33 = 17 (it's wrong message, it should be 2). but if we use (3,33) to decrypt the message : 29^3 mod 33 = 2.
@rafaelalbarello1292
@rafaelalbarello1292 5 жыл бұрын
@@illiacvie I think that is not what he meant. He's not trying to use the same key, he's asking why at 11:12 he didn't chose 5 , as he went for 11. I've tried to look for an answer, but I've only found that the number "e" can be calculated with another method, but nothing on the "reasons it's a little harder to explain". Maybe it's in the extended euclidean algorithm, but that i haven't checked myself
@agusnurhalim9671
@agusnurhalim9671 3 жыл бұрын
Stumble into this, by accident. Wow, what a good teacher you are. Definitely brilliant explanation.
@halogenlampert
@halogenlampert 8 жыл бұрын
how do you check if your chosen e and d fulfill these criteria for insanely large numbers tho?
@sabinrawr
@sabinrawr 6 жыл бұрын
If you're doing it on paper, you could expect it would take a long time. Luckily, computers are REALLY good (and fast) at doing multiplication and modulo arithmetic. Using massive numbers, with the aid of a computer that has already been given the process, it shouldn't take more than a few seconds. Even with extremely massive numbers. The power of RSA comes from one thing that this brilliant teacher didn't cover in this video, and that is the fact that factoring larger and larger numbers take exponentially more time. One easy way to get the value of D is if you have de(mod phi(N)), d = e*phi(N)-1. The number 29 would work equally well as 11. We can check 5*29=145. 145/6~24.167... or 14 45 mod 6 = 1. With small numbers, there seem to be a lot of options for D. But as we'll see, the bigger we make P and Q (and by extension, phi(PQ)), the more disparate and hard-to-guess D becomes. Once you decide on prime values for P and Q, the rest of the math is trivial for a computer. But, you never tell anyone those values. They only get to know that the product of P*Q=14. Let's say you chose larger numbers, and their product is 143. It's not super hard, but it's not trivial (11 and 13). Now try 44,747,819... it's getting harder (6599 and 6781). Now try that with two prime numbers that are 400+ digits long. It will take all the computers in the world longer than the age of the Universe to figure that out... UNLESS you already know one or both of the factors! The largest known prime number has over 23 million digits. Good luck, Eve!
@GMIosi
@GMIosi 4 жыл бұрын
Eddie, not only I'm learning math in a great way, I'm also learning a lot about education just by watching your videos. Keep up the awesome work you do!!
@ankitsagar255
@ankitsagar255 5 жыл бұрын
but in that case, we could have many decryption keys. ain't it?
@fraserporter5518
@fraserporter5518 4 жыл бұрын
Eddie makes math easy and the communication is impeccable. well done!!
@Michaels0184
@Michaels0184 8 жыл бұрын
Sorry why did you pick the 11 again? tHANKS
@auroraaa._.
@auroraaa._. 5 жыл бұрын
I know this comment comes from 3 years ago... But oh well I can't help to reply.. On 09:00 there's step 5, de(mod Φ(N))=1, where the value of e is already known as 5 5.d(mod 6)=1, in mod 6, every 6th step will always gives remainder of 0 So to complete 5.d(mod 6)=1 equation, we'll pick 6th step minus 1 The d value can be (6,12,18,24,30) minus 1 = 5,11,17,23,29 So the decryption key can be (5,14) or (11,14) or (17,14) and so on. To proof if above decryption keys are correct, let's calculate back: 1) key (5,14) -> 4^5 (mod 14) = 1,024-(74x14) = 2 -> (5,14) is correct 2) key (11,14) -> 4^11(mod14) = 4,194,304-(299,593x14) = 2 -> correct 3) key (17,14) -> 17,179,869,184-(1,227,133,513x14) = 2 -> correct So the conclusion is: He choose 11 because the decryption keys can be 5,11,17,23,29 Hope this helps someone in the future.. :D
@AverageJoe8686
@AverageJoe8686 5 жыл бұрын
@@auroraaa._. You didn't understand the question. If the keys can be any of the set {5, 11, 17...} why choose 11 versus 17, etc.? The question is: What actually defines a public versus private key? Is this arbitrary? Computational speed limit? Crypto-strength? How do you weigh this?
@auroraaa._.
@auroraaa._. 5 жыл бұрын
@@AverageJoe8686 He chose 11 over 5 (or 17) because he wants to shows that on simpler math, the key can be multiple. This happens because he used smaller number on p & q. What defines a public key? The logic is like this, when you lock your door on your house, you will always choose to use complicated one. So thieves will have longer time to break through your door, even though the thief can just use hacksaw, or TNT as 'bruteforce' way to break your lock. In real usage, the decryption key usually only has 1 or several possible key due to usage of high modulus number, on my previous comment, there's mod 6, so in every 6th thep, there will be a valid key. So if we use (for example) mod 1,000,000,000 the key is only valid for every 1,000,000,000th step. I hope you get what I mean
@AverageJoe8686
@AverageJoe8686 5 жыл бұрын
@@auroraaa._. You still didn't get it. 11,000th prime versus 17,000th prime. Is this arbitrary? Computational speed limit? Crypto-strength? How do you weigh this?
@auroraaa._.
@auroraaa._. 5 жыл бұрын
@@AverageJoe8686 Nowadays, the minimum acceptable crypto strength for RSA is 1024-bit, or equivalent to 80-bit symmetric key. RSA is an asymmetric system, while an example of a symmetric system is AES (Advanced Encryption Standard). The strength of RSA 1024-bit key is more or less equivalent to AES 80-bit key, it is also approximately equivalent to another encryption algorithm known as Triple DES. The 1024-bit here is not the string length, where as 'abcdef' is 6 string length. The algorithm use Base64 encoding to cope with the string length. Below is the strength equivalency between symmetric key and asymmetric key: 80 = 1024, 112 = 2048, 128 = 3072, 192 = 7680, 256 = 15360 The difficulty of breaking 112-bit compared to 80-bit strength is 2^48 times more difficult. A 80-bit key strength is recommended to be obsolete at 2010 by the National Institute of Standard and Technology (further read: csrc.nist.gov/CSRC/media/Projects/Key-Management/documents/transitions/Transitioning_CryptoAlgos_070209.pdf) RSA 512-bit can be broken by a normal 2GHz PC in about 73 days, requiring 5 GB of diskspace and 2 GB of RAM. NIST determine the obsoletion of a key strength by calculating the speed and computational power needed for a key to be broken. And also, English is not my first language, so if your question is not answered yet, perhaps you can rephrase it.
@GodModeMaker
@GodModeMaker 4 жыл бұрын
Every other Tutorial, Every other teaching video just made me confused. I am not lying when I say this, you are the only one who was able to make me understand properly!
@MrQwerty2524
@MrQwerty2524 8 жыл бұрын
Did he mean a common factor with 2 and 7? How are 8 / 10 / 12 a common factor of 14?
@scottza
@scottza 8 жыл бұрын
He means to share a common factor of 14 from my understanding. Because 2 is a factor of 14 and it also is a factor of 8, 10 and 12. Therefore they share a common factor. :-)
@MrQwerty2524
@MrQwerty2524 8 жыл бұрын
Thanks a lot mate!
@cyberguide_in
@cyberguide_in 8 жыл бұрын
I also did not understand what he meant to say. Perhaps, +Eddie Woo can make it clear.
@aparnamahalingam1595
@aparnamahalingam1595 6 жыл бұрын
He mainly meant common factor with 2; all even numbers (here, because we are dealing with 14 = even) will share at least common factor, i.e., the number 2. Therefore, they're all eliminated.
@confidential303
@confidential303 6 жыл бұрын
Aparna Mahalingam where does q=7 came from couldnt follow it.
@hasanafrezsa4608
@hasanafrezsa4608 5 жыл бұрын
English is not my first language, but i understand your lesson more than my lecturer.
@Mux31
@Mux31 5 жыл бұрын
"... one times six, whaaaaat" :D
@abdullahalam2088
@abdullahalam2088 4 жыл бұрын
This is hands-down the best explanation of RSA in existence. Amazing.
@AL-go2mv
@AL-go2mv 6 жыл бұрын
Tell those students to shutup!
@malavbadu663
@malavbadu663 3 жыл бұрын
Simply amazing. What a teacher he is. The energy and the explanation. uff.
@clottenbach6869
@clottenbach6869 6 жыл бұрын
The procedure is better explained than in my university handouts. Thank you, this short video helped me a lot!
@rachelluo4300
@rachelluo4300 Жыл бұрын
The most vivid and detailed RSA explanation I've ever seen!
@yoitsunoookami
@yoitsunoookami 4 жыл бұрын
Best RSA explanation video to date!! Other videos didn't even explain euler totient function ...
@veen8616
@veen8616 2 жыл бұрын
This is incredibly useful. I'm a grade 9 student who needed to get a refresher on RSA for a school thing, and this vide was simple enough that I could easily understand it.
@elnuraabbasova7994
@elnuraabbasova7994 3 жыл бұрын
This is the only video I really understood how RSA encryption works. Thanks a lot!
@chrischauhan1649
@chrischauhan1649 6 жыл бұрын
Most enthusiastic teacher i ever seen!! Awesome Explanation.
@tedkoler6301
@tedkoler6301 Жыл бұрын
Eddie, I love the passion you bring to your classroom [and your videos]! I ran into an issue with your explanation: if the modulus < number of characters in the set of possible characters being encoded, the decryption will not return the original character since the modulus 'repeats'. So if you're encoding the upper alphabet (A - Z), the modulus would have to be 31. Also, if the modulus results in a zero or one remainder, your resulting encryption/decryption will be either a zero or a one (raise zero and one to a power and the result is zero or one, respectively). Try encrypting/decrypting 'hello'; the decrypt comes as 'hella' since the letter 'o' is the 15th letter. The public key (5,14) encrypt produces a remainder of 1. The decrypt of 1 is also 1.
@calvinjoy1144
@calvinjoy1144 4 жыл бұрын
I studied RSA whole day and couldn't clarify my doughts. And after watching his video, I felt like a stupid. He is the best teacher I never had
@МавлюдаМехруллаева
@МавлюдаМехруллаева 2 жыл бұрын
One of the greatest lessons which I have watched. Good luck!!! I could easily understand the main concept of this algorithm. Thank you so much for your brilliant explanation absolutely free !!!
@triatheletecameraman6226
@triatheletecameraman6226 3 жыл бұрын
This is the best thing I have seen on internet in the past few months. Eddie you genius, Hats off , and thank you for sharing your amazing skills to explain. And thank you Google for creating this platform !
@yerlibilgin
@yerlibilgin 4 жыл бұрын
The MOST intuitive and beautiful RSA explanation I have ever seen. Wow! Now I see how a real TEACHER teaches crypto (Bored of all the college professors who aren't actual teachers)
@BillFlann9
@BillFlann9 Жыл бұрын
Excellent, interesting and rather fun explanation. Very clear - Thank you so much for posting. I'm glad I found your channel Professor Woo
@JITCompilation
@JITCompilation 5 жыл бұрын
If I took your class I would pay SUCH close attention because you are amazing at explaining things!
@PixlStyx
@PixlStyx 4 жыл бұрын
Man, you are a life saver... i don't care how old this video is it still holds up. thank you for such an awesome explanation
@0x3Devoid
@0x3Devoid 2 жыл бұрын
Wow. You made my day, thanks for this explanations. God bless you prof
@gototcm
@gototcm 5 жыл бұрын
Never understood Euler's phi (totient) function in a practical sense until I heard this explanation. Sometimes you can lose the essence of the "why" even though you understand the full derivation. Good stuff.
@mandolinic
@mandolinic 5 жыл бұрын
Seriously the best explanation of RSA I've seen.
@berkaay1977
@berkaay1977 7 ай бұрын
The best explanation to RSA that I've seen. Thank you!
How many prime numbers exist? (Euclid's proof)
10:51
Eddie Woo
Рет қаралды 44 М.
The RSA Encryption Algorithm (1 of 2: Computing an Example)
8:40
Eddie Woo
Рет қаралды 1,1 МЛН
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН
Breaking RSA - Computerphile
14:50
Computerphile
Рет қаралды 369 М.
The Dome Paradox: A Loophole in Newton's Laws
22:59
Up and Atom
Рет қаралды 986 М.
Lecture 12: The RSA Cryptosystem and Efficient Exponentiation by Christof Paar
1:28:27
Introduction to Cryptography by Christof Paar
Рет қаралды 163 М.
Fast Inverse Square Root - A Quake III Algorithm
20:08
Nemean
Рет қаралды 5 МЛН
RSA algorithm step by step example
20:41
Programming w/ Professor Sluiter
Рет қаралды 110 М.
Primality (1 of 2: Fermat's Test)
7:47
Eddie Woo
Рет қаралды 44 М.
Bayes theorem, the geometry of changing beliefs
15:11
3Blue1Brown
Рет қаралды 4,6 МЛН
How Quantum Computers Break Encryption | Shor's Algorithm Explained
17:31
minutephysics
Рет қаралды 3,1 МЛН
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН