Asymmetric Key Cryptography: The RSA Algorithm by Hand

preview_player
Показать описание
This video demonstrates the underlying principles of the RSA cryptosystem. It shows how the public and private asymmetric keys can be calculated from a pair of prime numbers. It also shows how to encrypt a message using the public key, and decrypt it using the private key. For ease, the calculations are performed with a spreadsheet, because the numbers involved in the process can be very large. The video points out that once a pair of asymmetric keys has been generated, the selection of which key should be made public and which key should be private, is arbitrary because RSA is a trap-door process.
Рекомендации по теме
Комментарии
Автор

Thank you for the explanation that I could understand.

HandsomeOrHandy
Автор

very clearly explained. This is the best explanation on the subject. Anybody now can understand what is very abstruse for the most.

TekCroach
Автор

Enjoying this little series from you, as it’s particularly well timed for my needs. :) love the range of content as always~

eveninrose
Автор

Amazingly explained, is it posssible for you to share excel sheet

MrDhawal
Автор

thank you so much for this video — I really like the demonstration!

egornashilov
Автор

Mr. Kevin, thank you *very much* for putting together such beautiful tutorials!

inarisound
Автор

Nice series next time pls do make a video on PERT Chart for cambridge Alevel calculating slacktime etc etc

mustaffaqasim
Автор

So, if I get it right, the difficult part to break it is to find the totient of n, which requires to find the factors of n.

Wolfeur
Автор

Excellent overview. It seems as though the ciphertext is vulnerable to frequency analysis and more, however. I'm assuming RSA is normally used in conjunction with other algorithms and techniques that effectively prevent such attacks?

chaemelion
Автор

Do you have a video on what is done to use larger primes and not encounter the representation errors you hit at the end of this one?

mikelwrnc