2.4.1 RSA Public Key Encryption: Video

2.4.1 RSA Public Key Encryption: Video

MIT OpenCourseWare

7 лет назад

47,593 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Nifty Quiz For Fun
Nifty Quiz For Fun - 25.07.2022 09:28

If the sender uses RSS algorithm. So he gets two keys Public and Private. If I want to send someone to public key . By What Method . How will I reach that public key.

Ответить
German P
German P - 17.12.2021 23:36

Well explained...
To make it interesting this is the public key or direction mt3au8ibxtunkz6esthju8vsd2vae2cv
There is a prize for whoever finds the secret key, (which is related to the video)
Do not be crazy, it has no economic value, it is only a challenge.

Ответить
Vishal Mishra
Vishal Mishra - 25.11.2021 04:39

Modern high performance RSA decryption does not use d and mod-N arithmetic (m = c^d mod N). It uses dp = d mod (p-1), dq = d mod (q-1) and qInv = q^-1 mod p.
This enables calculating m = c^d mod N much much more efficiently with half the number of bits (log(N)/2 bits) numbers as follows -
m = m2 + h q where m1 = c^dp mod p, m2 = c^dq mod q and h = qInv x (m1 - m2) mod p.

Ответить
Abu al-Sous
Abu al-Sous - 04.09.2021 06:08

didn't NSA leave a backdoor in RSA? that is note since 2008. i think RSA as a company was liquidated soon after.

i believe some other method is being used based on some curve

Ответить
Parsecscope king
Parsecscope king - 20.06.2021 02:18

Should give more examples

Ответить
Eliot McLellan
Eliot McLellan - 15.03.2021 18:20

thumbnail in the sky... outstanding destiny

Ответить
an1rb
an1rb - 15.06.2020 09:14

e is most commonly chosen to be a small prime number, rather than rel. prime to (p-1)*(q-1)

Ответить
Bon Bon
Bon Bon - 31.07.2019 13:21

But how can the sender be sure that the sender's public key actually has been created by that receiver and not some spy? :q
The spy can easily generate his own pair of keys, and then pretend to the sender that this is the receiver's key.
When the sender encrypts his message with it, the spy will be able to decrypt it easily, then encrypt again with the receiver's key and send it to him so that he didn't notice any tampering :q
How can we protect against that?

Ответить
Sascha Vogt
Sascha Vogt - 01.11.2018 22:29

Go to a primary school and try again - there. Then re-record.

Ответить
Living Vacuum
Living Vacuum - 24.05.2018 00:35

I will decompose the RSA of any complexity into multipliers. Fast and not expensive.

Ответить
John Russ
John Russ - 10.01.2018 23:48

Awesome!!!

Ответить
sjchsbc
sjchsbc - 27.10.2017 06:24

My mind exploded.

Ответить
Anijith M
Anijith M - 07.06.2017 18:14

thanks..I like the explanation very much

Ответить
Pipo De Clown
Pipo De Clown - 17.03.2017 23:00

Thank you for this video.

Ответить