How prime numbers protect your privacy

Поделиться
HTML-код
  • Опубликовано: 3 июн 2024
  • Most of us have probably heard about encryption before, but have you ever wondered how it works? This video explores the math behind the RSA cryptosystem, a very popular encryption method that set the stage for asymmetric cryptography.
    ► Join my Discord server: / discord
    This video was made as part of the Summer of Mathematical Exposition organized by @3blue1brown
    ► Sources:
    - en.wikipedia.org/wiki/RSA_(cr...)
    - / rsa-gradually-leaves-t...
    - en.wikipedia.org/wiki/Prime_n...
    ► Learn more about...
    - Bézout's identity: en.wikipedia.org/wiki/B%C3%A9...
    - The extended Euclidean algorithm: en.wikipedia.org/wiki/Extende...
    - Modular exponentiation: en.wikipedia.org/wiki/Modular...
    ► Stock footage from: pixabay.com/
    🎵 Music from Epidemic Sound, register with my link to support the channel and get a discount:
    www.epidemicsound.com/referra...
    Chapters:
    0:00 - Intro
    0:35 - Alice and Bob
    01:10 - Encryption
    02:01 - Asymmetric cryptography
    03:22 - Rivest-Shamir-Adleman
    03:50 - Modular congruence
    04:59 - The RSA Equation
    05:52 - Prime numbers
    07:27 - Generating a keyset
    09:19 - Implementation
    10:25 - Proof of correctness
    12:42 - Conclusion
    #SoME2
  • НаукаНаука

Комментарии • 69

  • @NamePointer
    @NamePointer  Год назад +17

    What is this? A new video already? It hasn't even been a year yet!
    Just kidding, I'm really happy that I managed to upload a second video this summer. This one is quite different from my usual style though, but I wanted to participate in SoME2.
    Please let me know what you think!

    • @pichu8959
      @pichu8959 Год назад

      it was a great video, a nice refresher of the topic

    • @Ravioli1586
      @Ravioli1586 Год назад +1

      It was very helpful to understand these concepts mathematically. Thanks for the video!!

  • @conando025
    @conando025 Год назад +7

    Great Video there's only a slight problem I have with it. Namely that you say that the private key is for encryption and the public key for description, while this is probably the most common use case it can lead to confusion when thinking about digital signatures since there the roles are reversed. Just something that took me a while when first learning about public key crypto

    • @NamePointer
      @NamePointer  Год назад +5

      You're absolutely right. I should have pointed out that there are usecases where the keys' roles are reversed. I didn't think about it because I only talked about RSA in the context of message encryption, but the math I showed also works for private key encryption.

  • @SFSylvester
    @SFSylvester 5 месяцев назад +1

    This was great! Hope you're able to put out more explainers one day!

  • @lolcat69
    @lolcat69 Год назад +6

    A new video of name pointer :O
    Edit: Man, this is such an interesting topic, after watching this video, I can say, I learn something new, and I understand most of it, I live this chanell and the guy that make this videos, keep the good work :D

  • @NoNTr1v1aL
    @NoNTr1v1aL Год назад +2

    Absolutely amazing video! Subscribed.

  • @zenhookah9296
    @zenhookah9296 Год назад

    glad you are still around keep up the good work

  • @alex-yk8bh
    @alex-yk8bh Год назад

    Great educational video!

  • @AviPars
    @AviPars Год назад

    Great video! Subbed

  • @annoyingman6184
    @annoyingman6184 Год назад +1

    Nice video can you make a tutorial channel where you implement the topics in one program

  • @lbirkert
    @lbirkert Год назад +8

    What would happen if the man in the middle just send it's own key instead of proxy the public key of person b so he could be able to decrypt the messages and reencrypt them using the public key of person b so nobody would notice anything?

    • @NamePointer
      @NamePointer  Год назад +9

      Although modifying and injecting messages is a lot more difficult than just reading them, what you describe could be a significant security threat if an attacker succeeded to do so. Luckily, there is something called "Signing" to combat that. You can learn more about it on the RSA Wikipedia page.

    • @fullfungo
      @fullfungo Год назад +1

      But you already know Bob’s public key.
      That’s the starting state of the algorithm.
      No one sends their public keys.
      This is because RSA is a secure encryption algorithm, not secure communication algorithm.

    • @NamePointer
      @NamePointer  Год назад +4

      @Fullfungo actually, the public keys have to be sent once after having been generated, otherwise, how is the other person supposed to know it?

    • @conando025
      @conando025 Год назад +1

      @@NamePointer true but in the use case of https that is done through a chain of trust and the DNS servers since one public key is enough to start a secure conversation. And you shouldn't be using RSA for communication since it's way to inefficient compared to a symmetric encryption like AES so most of the time RSA is simply used as a method to securely establish an AES tunnel

    • @whannabi
      @whannabi Год назад +1

      @@conando025 you're right about its usage.

  • @johnchessant3012
    @johnchessant3012 Год назад +1

    good explanation

  • @featherless656
    @featherless656 Год назад +1

    Cool video, would be cool to see you remake discord lol

  • @RSLT
    @RSLT Год назад +1

    Very Interesting and informative Great Job. Quick note p and q don't have to be prime numbers. They need to prime to each other! This is one of the reasons the Riemann hypothesis and prime numbers theories are super important.

    • @NamePointer
      @NamePointer  Год назад +2

      Thank you for the feedback! However, if p and q are not primes, the proof of correctness wouldn't be valid anymore, as it used Fermat's little theorem which requires them to be primes, or am I missing something?

    • @orangeoranj8007
      @orangeoranj8007 Год назад

      @@NamePointer The proof can be amended with Euler's theorem, which generalizes Fermat's little theorem.

  • @hhhharis622
    @hhhharis622 Год назад +1

    Bro I was expecting a NordVPN ad the whole video🤣

    • @NamePointer
      @NamePointer  Год назад

      The irony is that the video shows that you don't actually need a VPN to have an encrypted internet connection, you just have to use secure apps and only access HTTPS websites!

  • @brendawilliams8062
    @brendawilliams8062 Год назад

    Thankyou.

  • @Baezor
    @Baezor Год назад +1

    Super cool and well-made video, I still have no idea what I just watched though.

    • @brendawilliams8062
      @brendawilliams8062 Год назад

      It seems to me a bunch of different triangulations that you don’t want to step on toes with. I never investigated computers.

    • @Baezor
      @Baezor Год назад

      @@brendawilliams8062 the quantum mainframe can obliterate rsa, good luck prime numbers, you bout to be cyber cracked by the triangulations of the quantum spherical nature of the encrypted 4-dimensional realms

    • @brendawilliams8062
      @brendawilliams8062 Год назад

      @@Baezor I just can’t get it. All I can figure is prime numbers are dangerous.

    • @Baezor
      @Baezor Год назад

      @@brendawilliams8062 exactly! prime numbers are actually evil!

    • @brendawilliams8062
      @brendawilliams8062 Год назад

      @@Baezor that is what I thought. You can’t work on anything that’s been bought and sold.

  • @pianoforte611
    @pianoforte611 Год назад

    Oof, that opening sentence stung.

  • @abhi36292
    @abhi36292 Год назад

    Alice and bob definitely didnt touch grass for the last 6 months, lol

  • @ItsNat21_
    @ItsNat21_ Год назад

    gotta love cryptography

    • @majokuhn
      @majokuhn Год назад

      Luckly I had it in school

  • @keremino
    @keremino 10 месяцев назад +1

    namepointer its been 11 months please make a new video im getting so bored in my basement

  • @EliasWolfy
    @EliasWolfy 28 дней назад

    halo?

  • @EliasWolfy
    @EliasWolfy 28 дней назад

    I think you're not very happy with the channel, have you decided to take a break? (the ratio between views and likes is visible.)

  • @JM-us3fr
    @JM-us3fr Год назад

    6:10 Your definition of prime numbers is not quite correct. Specifically, you need to replace your use of the word “integer” with “positive integer.”
    If you were trying to allow for negative primes, then you can’t say “greater than one” and “…product of _smaller_ positive integers…” You would have to say “Nonzero” and “Can’t be written as the product of two nonunits (e.g. not +1 or -1)” respectively.

    • @NamePointer
      @NamePointer  Год назад

      Thanks for the feedback, however I explicitly said "greater than one" to account for that

    • @JM-us3fr
      @JM-us3fr Год назад

      @@NamePointer Yes, but you didn’t say that the _two factors_ had to be greater than one or even positive. Just “smaller integers.” Thus, a factorization like 7=(-1)(-7) would rule out 7 from being prime, by your definition.

    • @NamePointer
      @NamePointer  Год назад +1

      Oh yes I understand you now. Thanks for pointing that out!

    • @JM-us3fr
      @JM-us3fr Год назад

      @@NamePointer No problem.

  • @minheepark4896
    @minheepark4896 Год назад

    Huh suddenly you seem like Nas daily :|

  • @TorvoTheMighty
    @TorvoTheMighty Год назад

    U quit again aye?

  • @portalguy1432
    @portalguy1432 Год назад

    i dont even remember subscribing to this guy

    • @aviee2046
      @aviee2046 Год назад

      Same lol

    • @NamePointer
      @NamePointer  Год назад +2

      I hope you enjoyed the video though :)

    • @portalguy1432
      @portalguy1432 Год назад

      @@NamePointer didn’t watch it though
      no hard feelings

    • @lolcat69
      @lolcat69 Год назад +6

      @@portalguy1432 that is rude man...

    • @sleepntsheep1169
      @sleepntsheep1169 Год назад +1

      @@portalguy1432 lets go find who asked