Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

How prime numbers protect your privacy

namepointer

ai

programming

machine

learning

machine learning

tutorial

technology

mathematics

science

coding

artificial intelligence

artificial inteligence

name pointer

math

some2

cryptography

Автор: NamePointer

Загружено: 15 авг. 2022 г.

Просмотров: 15 067 просмотров

Описание:

Most of us have probably heard about encryption before, but have you ever wondered how it works? This video explores the math behind the RSA cryptosystem, a very popular encryption method that set the stage for asymmetric cryptography.

► Join my Discord server:   / discord  

This video was made as part of the Summer of Mathematical Exposition organized by ‪@3blue1brown‬

► Sources:
https://en.wikipedia.org/wiki/RSA_(cr...)
  / rsa-gradually-leaves-the-stage-after-more-...  
https://en.wikipedia.org/wiki/Prime_n...

► Learn more about...
Bézout's identity: https://en.wikipedia.org/wiki/B%C3%A9...
The extended Euclidean algorithm: https://en.wikipedia.org/wiki/Extende...
Modular exponentiation: https://en.wikipedia.org/wiki/Modular...

► Stock footage from: https://pixabay.com/

🎵 Music from Epidemic Sound, register with my link to support the channel and get a discount:
https://www.epidemicsound.com/referra...

Chapters:
0:00 - Intro
0:35 - Alice and Bob
01:10 - Encryption
02:01 - Asymmetric cryptography
03:22 - Rivest-Shamir-Adleman
03:50 - Modular congruence
04:59 - The RSA Equation
05:52 - Prime numbers
07:27 - Generating a keyset
09:19 - Implementation
10:25 - Proof of correctness
12:42 - Conclusion

#SoME2

How prime numbers protect your privacy

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

I made a better Ray-Tracing engine

I made a better Ray-Tracing engine

How Quantum Computers Break Encryption | Shor's Algorithm Explained

How Quantum Computers Break Encryption | Shor's Algorithm Explained

Public Key Cryptography: RSA Encryption

Public Key Cryptography: RSA Encryption

AES: How to Design Secure Encryption

AES: How to Design Secure Encryption

Wavelets: a mathematical microscope

Wavelets: a mathematical microscope

Hopfield network: How are memories stored in neural networks? [Nobel Prize in Physics 2024]  #SoME2

Hopfield network: How are memories stored in neural networks? [Nobel Prize in Physics 2024] #SoME2

Seven Dimensions

Seven Dimensions

Simulating the Evolution of a Zombie Pandemic (Virus simulation)

Simulating the Evolution of a Zombie Pandemic (Virus simulation)

What is Group Theory? — Group Theory Ep. 1

What is Group Theory? — Group Theory Ep. 1

What is the Riemann Hypothesis REALLY about?

What is the Riemann Hypothesis REALLY about?

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]