RSA algorithm step by step example

RSA algorithm step by step example

Programming w/ Professor Sluiter

4 года назад

116,995 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@manishregmi4801
@manishregmi4801 - 09.01.2025 07:41

Brilliant video. This was a challenge for me to understand before I found this video - thank you.

Ответить
@rs-tarxvfz
@rs-tarxvfz - 30.12.2024 14:30

How does RSA guards their prime factors wodering :)

Ответить
@mikelyons5632
@mikelyons5632 - 07.12.2024 00:45

This is missing some important steps: (1) How can you come up with a very large prime number, or more specifically, given a very large prime number, how can you guarantee it's prime? (2) How can you come up with good values for E and D in a reasonable amount of computer time? (3) How can computers efficiently do ModPow with super large values?

There are algorithms for all of these, and they are super important. Without them, RSA would be a cool idea, but not usable in the real world. Without explaining these algorithms along side what was presented, you're only giving part of the story.

Ответить
@Crypro_Wallet_Finder
@Crypro_Wallet_Finder - 15.11.2024 03:57

Once you understand Bitcoin, you can’t go back

Ответить
@Crypro_Wallet_Finder
@Crypro_Wallet_Finder - 15.11.2024 03:54

I’m in it for the long haul. Bitcoin forever! 🌐

Ответить
@deafmute2501
@deafmute2501 - 23.09.2024 22:40

If I had some magical device that found the other prime number of RSA-2048, I wouldn't necessarily put it out there.

Ответить
@Suspiciousguy124
@Suspiciousguy124 - 19.07.2024 19:44

You kind of copied Eddie Woo; maybe come up with your example next time. Not saying, I am not thankful but you should honor other person work.

Ответить
@natisnotanerd
@natisnotanerd - 30.05.2024 10:14

I love you Professor Sluiter

Ответить
@netlogis
@netlogis - 16.02.2024 11:49

Step by Step makes sense!!

Ответить
@the_wizard_exe
@the_wizard_exe - 10.01.2024 02:32

teacher thank's very much for having explained them carefully and well-deatiled, everything was clear ! , break a leg with your videos !

Ответить
@daboyz6106
@daboyz6106 - 22.10.2023 13:17

Really good.

Ответить
@卢坤-d7s
@卢坤-d7s - 09.10.2023 22:31

Thank you very much. You help me solve the issue bothering me for a long time

Ответить
@samueldomb110
@samueldomb110 - 01.10.2023 07:04

where the 14 came from ? minute 7.58

Ответить
@rosannaisaksson3579
@rosannaisaksson3579 - 23.09.2023 13:05

Thank you for the thorough explanation of RSA. Very helpful.

Ответить
@hotbird3
@hotbird3 - 14.05.2023 10:10

How come these smart people not have millions of views. Thank you so much , very clear an precise explaination

Ответить
@ricp
@ricp - 05.05.2023 22:11

Great explanation, thanks a lot!

Ответить
@FagneTReges
@FagneTReges - 22.04.2023 16:10

Thanks for your video Professor Sluiter! I'am a brazilian student, and yours videos helpe me study!!

Ответить
@aurelio4601
@aurelio4601 - 28.03.2023 00:08

good explanation, however from your example you could have chosen multiple keys. This means that for each public key there are multiple private keys?

Ответить
@Ryan-xq3kl
@Ryan-xq3kl - 08.03.2023 22:54

Make sure not to implement these with weak (less than 2048 bit) ciphers in real life!

Ответить
@Woktavius
@Woktavius - 06.03.2023 23:42

confused during the explanation of the decryption where does the 32 mod 14 come from?

Ответить
@Starryfürr
@Starryfürr - 27.02.2023 21:22

i am still lost on how to find the e and d. at the part where you choose a co-prime, and the entire process for d.

Ответить
@becool1270
@becool1270 - 26.02.2023 16:44

I simply loved the explanation, this was great. Your way of explaining the algo was quite smooth and smile. Thank you.

Ответить
@spongebobsquarepants4576
@spongebobsquarepants4576 - 19.02.2023 07:42

Best explanation on the internet 🎉

Ответить
@stevenshrii
@stevenshrii - 10.01.2023 08:59

For I = 2 to (amount - 1): if (( amount mod I) = 0) then print I :next i

Ответить
@NGUYENTHIKIMNGAN_
@NGUYENTHIKIMNGAN_ - 09.01.2023 05:55

This one so far is the best explanation on RSA I have come across. Thank you, Prof!

Ответить
@davep8221
@davep8221 - 07.01.2023 21:55

In the real world, don't you need to make sure that N is large enough to cover the symbol range you wish to encrypt?
E.g. for alpha text, 1.. 26 --> T >= 27. And then you need two primes whose multiple is >= 27, say (3,11), (5,7). Of course it'll be (Yuge prime, Bigly prime), but I'm just asking about the "min" value for p, q.
Would 0.. 25 be allowed? It would handle the number of symbols, but I'm not sure if 0 would break any of the math.

Ответить
@Astro-Markus
@Astro-Markus - 07.01.2023 02:57

I understand what's happening here, however nobody encrypts anything just to decrypt it again afterwards. You want to send the encrypted message to someone who can decrypt it. And you certainly don't send them your private key. And the receiver has their own private key, which is most probably based on different prime numbers. So, how does that work together with the public key?

Ответить
@jeffreycanipe1936
@jeffreycanipe1936 - 31.12.2022 19:21

Great job explaining this!!! I would take a class under this professor anytime.

Ответить
@rob651
@rob651 - 25.12.2022 00:43

Amazing! Thank you very much

Ответить
@user-w87b7egvss
@user-w87b7egvss - 24.12.2022 11:39

Awesone explanation, Thanks so much! I'm not sure what I would've done without this tutorial

Ответить
@pewpewwepwep9296
@pewpewwepwep9296 - 12.12.2022 17:45

Brilliant explanation !!

Ответить
@fablefallen
@fablefallen - 20.11.2022 10:37

Im lost how on how 5 is a number co prime with 6 and 14?

Ответить
@McBhayan
@McBhayan - 14.11.2022 15:29

You are such a genius creature on the planet earth Prof Sluiter. Hats off!

Ответить
@aimatters5600
@aimatters5600 - 12.11.2022 20:15

really helpful man thank you

Ответить
@zgb3l
@zgb3l - 04.11.2022 16:06

This video is so underrated, but the best on this topic I've seen. And I've seen A LOT. Thank you so much for this.

Ответить
@bakobaxtyar8453
@bakobaxtyar8453 - 23.10.2022 19:51

where does 14 came from ??????

Ответить
@ayeshaali6462
@ayeshaali6462 - 12.10.2022 22:56

encypting o with (5,14) give a, and decrypting a with (11,14) gives a.
how to get o instead of a after decryption?

Ответить
@KDmadness18
@KDmadness18 - 10.10.2022 06:55

for finding e, whyd you choose 14?? and how is 4 coprime for 6 and 14???

Ответить
@VehlaEngineer_
@VehlaEngineer_ - 04.10.2022 02:45

A great video.

Ответить
@ritamghosh3550
@ritamghosh3550 - 16.09.2022 12:10

wonderful explanation, thanks a ton.

Ответить
@authenticknowledge9349
@authenticknowledge9349 - 12.09.2022 14:53

So as far as I understand there can be more than 1 private keys d that work the exact same way to decrypt a message.Isn't that a vulnerability?

Ответить
@egorutkin6347
@egorutkin6347 - 09.09.2022 19:20

omg so simple and comprehensive explanation

great job!

Ответить
@attilaguba856
@attilaguba856 - 22.08.2022 00:51

Professional as usual! Thanks!

Ответить
@dimitarkostov8301
@dimitarkostov8301 - 16.07.2022 18:20

Your walkthrough in excell was very helpful. Thank you for the effort!

Ответить
@jessycagonzalez2666
@jessycagonzalez2666 - 08.07.2022 22:45

Finally. A good explanation on this topic with no skipped steps nor assumption about the viewers' previous knowledge. Amazing professor!

Ответить
@_i_m_
@_i_m_ - 27.06.2022 00:42

buy how does an computer decides which two huge prime numbers to chose? How does he know they are prime?

Ответить
@orhanaygun7298
@orhanaygun7298 - 15.06.2022 14:57

bilale anlatır gibi anlatmış. helal olsun!

Ответить
@khanthein1740
@khanthein1740 - 09.06.2022 12:56

THANK YOU SO MUCH YOU ARE A LIFE SAVER

Ответить