How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi)

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 ก.ย. 2024
  • This video explains how to compute the RSA algorithm, including how to select values for d, e, n, p, q, and φ (phi).

ความคิดเห็น • 314

  • @gibsonman507
    @gibsonman507 6 ปีที่แล้ว +63

    This is the best RSA explanation I've seen

    • @santaclaus897
      @santaclaus897 4 ปีที่แล้ว

      me too

    • @fnamelname2445
      @fnamelname2445 3 ปีที่แล้ว +2

      Better explained than my professor in college ... for which i pay hefty tuition fee each semester. lol

    • @sharonomonua1747
      @sharonomonua1747 3 ปีที่แล้ว

      @@fnamelname2445the only thing i don't understand is mod how is it used and like what is it

    • @fnamelname2445
      @fnamelname2445 3 ปีที่แล้ว

      @@sharonomonua1747 Mod or modulo only returns the remainder of a division operation. For instance, if you divide 5 into 5, the result is 1. But if you divide 5 into 3, the remainder is 2. Therefore, we write 5 modulo 3 = 2.
      These videos might help:
      1 - th-cam.com/video/6dZLq77gSGU/w-d-xo.html
      2 - th-cam.com/video/4zahvcJ9glg/w-d-xo.html

    • @lukacavara6254
      @lukacavara6254 3 ปีที่แล้ว

      Cleanly explained without messy hand written scribbles many TH-cam publishers practice

  • @InshuMussu
    @InshuMussu 5 ปีที่แล้ว +100

    You spent your time to save our time, double likes from me

  • @michaelschepens3750
    @michaelschepens3750 7 ปีที่แล้ว +21

    I was trying to understand the Wikipedia page on this topic with some difficulty. Your video did an excellent job of explaining it simply. Thanks a lot.

  • @chrominox
    @chrominox 8 ปีที่แล้ว +39

    The Extended Euclidean Algorithm method you've shown here was absolutely stellar. It made my job very easy. Thanks a ton, mate.

  • @zx600e93
    @zx600e93 4 ปีที่แล้ว +4

    Nice simple introduction and the slow transitioning of deeper and technical understanding with step by step interactivity in processing the RSA algorithm. Finally, ending with a real life example using Amazon's cart totally amazed me how it all works together. I'm sharing this with one of my Math Faculty members who teaches math for teachers, she'll be impressed to see how cryptography applies in real life and that most people don't know it. Thank you for taking the time out and scripting this too, good job, and an A+!

  • @ianfitchett2768
    @ianfitchett2768 9 ปีที่แล้ว +19

    I just wanted to say that the way you showed the extended Euclidean algorithm was not something I had seen before and it made my work SO much easier. You've more-than earned my like.

    • @asfandalikhan6269
      @asfandalikhan6269 7 ปีที่แล้ว

      extended euclidean algorithm is far easier than this technique and less time consuming. whereever you go there's just a matter of time and if you are slower then no one cares :)

  • @TechnikMeister2
    @TechnikMeister2 4 ปีที่แล้ว +19

    As Edward Snowdon said recently and as Gordon Welchman said 70 years ago, a computer generated algorithm thats creates a cypher can always be decrypted. The only true unbreakable encryption is a non computer generated one time pad. Its still used today. There is a guy in Switzerland who has a barrel with 50,000 dice and it spits out five dice in a row it then grabs them back and the next turn does the same. He will manually create one time pads for you at a cost of $500, good for 10,000 characters. No machine, not even a simple typewriter is used. They are written out by hand and you get both copies. He keeps no records of who buys them. Swiss banks now use them to protect their clients transactions after the US got a court order for computer records of US Taxpayers. Now not even the banks know.

    • @unh0lys0da16
      @unh0lys0da16 4 ปีที่แล้ว +3

      Sure it can be decrypted, it just takes 1000 years

    • @rickyc1991
      @rickyc1991 4 ปีที่แล้ว

      I'm very interested to learn more! Do you know what the non-computer generated method is called? I'm having trouble finding it.

    • @markstephens8423
      @markstephens8423 4 ปีที่แล้ว

      There is an encryption program out there named Vial 7 - Only way to get a copy is if you know the person. Each copy is made to order and it will only work on the users computer. He hard codes the key into the program and puts the location of the file somewhere on the computer at the request of the client. When you try to use the program it looks for the key and if it's not found it will close the program, so everyone that wants to communicate with that program they have to have a custom made version to work on their computer. The encryption math is said to make RSA look like 1+1. If you are not government USA, you will never own it. After it locates the key to use it then the real encryption begins and if you use the same password every time, the encryption out put will always be different, that means there is no standard algorithm with the exception of unlocking the program for use. Estimated bit strength - Unknown because the more text there is the higher the bit strength gets.

    • @Amazing._Games
      @Amazing._Games 3 หลายเดือนก่อน

      They can use cryptographic random number generators

  • @Blacktouch2000
    @Blacktouch2000 4 ปีที่แล้ว +1

    I spent my life searching for this video. I am eternally grateful.

  • @mohammedusama5869
    @mohammedusama5869 4 ปีที่แล้ว +4

    This video was such a gem that it explained almost everything of the concept clearly in just a couple of minites
    Thanks mate, you made me very happy today

  • @DutchlimitsDesign
    @DutchlimitsDesign 4 ปีที่แล้ว +2

    You have the best explanation from all the video's ive seen regarding RSA. Thanks so much!

  • @thebestisyettocome7
    @thebestisyettocome7 3 ปีที่แล้ว +1

    Very good explanation of the RSA algorithm, one of the best I've seen on TH-cam.

  • @MissNorington
    @MissNorington 2 ปีที่แล้ว +6

    Thank you for making this easy to understand! I am no good with math but I like to be able to use it from time to time! 😀

  • @samosapakora9086
    @samosapakora9086 9 ปีที่แล้ว +2

    I really have to say that was top notch, clear, simple, articulate. Thank You!

  • @tehownerer1547
    @tehownerer1547 9 ปีที่แล้ว +13

    Amazing video.
    TO ANYONE CONFUSED: LEARN ABOUT THE EUCLIDEAN ALGORITHM AND THEN STUDY THE EXTENDED EUCLIDEAN ALGORITHM INDEPENDENT OF RSA.
    That might help.

    • @Ali-mi9up
      @Ali-mi9up 4 ปีที่แล้ว

      more importantly the eulers theorem

  • @MustafaAlhadi
    @MustafaAlhadi 9 ปีที่แล้ว +10

    Dude... you are a time saver, thank you very much for this great and clear video

  • @hqiu6828
    @hqiu6828 5 ปีที่แล้ว +1

    Excellent explanation! You reveal the magic behind the RSA encryption-decryption algorithm!

  • @chrisweaver7989
    @chrisweaver7989 3 ปีที่แล้ว +1

    OMG! so I am being taught Maths in uni and its basically everything in this getting me ready for next year. I find it hard to follow the lecturer sometimes and this is amazing! I need to also program a crypto algorithm and this gives me a good base! THANK YOU!

  • @OldFilmCameras
    @OldFilmCameras 3 ปีที่แล้ว

    This has to be one of the best if not the very best explanation of the RSA algorithm that i've come across, Thank you!

  • @anandsuralkar2947
    @anandsuralkar2947 5 ปีที่แล้ว +3

    Best video on RSA mathematics..so far and finally i am able to get maths behind RSA

  • @TON-vz3pe
    @TON-vz3pe 4 ปีที่แล้ว +1

    Fantastic Job. Like others said , "By far the best Explanation of RSA Algorithm" after scraping the entire TH-cam

  • @marciocastro7101
    @marciocastro7101 4 ปีที่แล้ว +5

    Good explanation, but is important to point that e must be coprime with phi and N. With small numbers, it's relatively easy to pick a value for e, but if p and q have 30 digits each...

    • @nafiz1938
      @nafiz1938 2 ปีที่แล้ว

      no need to coprime with N, just coprime to phi

    • @marciocastro7101
      @marciocastro7101 2 ปีที่แล้ว

      @@nafiz1938 whatever, same problem because of big numbers.

    • @kimkarlson7820
      @kimkarlson7820 2 ปีที่แล้ว

      @@marciocastro7101 Ever heard of Fermat primes? It shouldn't take you longer than a fraction of a millisecond to find a suitable e.

  • @dkarthiganesh
    @dkarthiganesh 5 ปีที่แล้ว

    This is great explanation. Helped me to solve d for (e,N)=(53,299) and encode(m)=171. Thanks a lot.

  • @suphasitthongniam9082
    @suphasitthongniam9082 9 ปีที่แล้ว

    Thank you so much. I have confused about RSA for a while , I just watched your video and now I clearly understand about RSA Algorithm. Thanks so much.

  • @iycgtptyarvg
    @iycgtptyarvg 7 ปีที่แล้ว +2

    Thanks for the video. It helped that I already understood the process, but this is still useful. It would perhaps have been informative to explain to people why we use phi = (p-1)(q-1), but hopefully they will search the Internet to see why that is so.

  • @EMate-vu3ku
    @EMate-vu3ku 7 ปีที่แล้ว +2

    Thank you very much for this video! It is of excellent quality and I could understand it easily despite I'm only at secondary school. It is the best explanation I've come across both in print and on the internet. Many thanks!

    • @freewheelburning8834
      @freewheelburning8834 2 ปีที่แล้ว

      what other reads have you found in print that's this intuitive? (just curious)

    • @EMate-vu3ku
      @EMate-vu3ku ปีที่แล้ว +1

      @@freewheelburning8834 There was a section about this in Marcus du Sautoy's book, The Music of Primes. I recommend it, a fascinating read!:)

  • @caitancorreia8379
    @caitancorreia8379 7 ปีที่แล้ว

    thanks,
    the way to find 'd' using a short-cut version of the EEA is a life saver :)

  • @cdemetriad
    @cdemetriad 6 ปีที่แล้ว +1

    Very well explained, it helped me a lot. Good, simple graphics and good, timed voice. THANKS!

  • @andrewlittle9569
    @andrewlittle9569 7 ปีที่แล้ว +1

    This video makes it much easier to understand. Thanks a lot!

  • @davidr.flores2043
    @davidr.flores2043 9 ปีที่แล้ว +1

    Anthony, great work sir. I appreciate your effort, very well done and you know the topic inside-out. Kudos to you man!

  • @davidhedin-abreu4426
    @davidhedin-abreu4426 7 ปีที่แล้ว

    Terrific video Anthony, I used it to teach the mathematics of RSA and to write an example Java program for encryption and decryption.

  • @crypticnomad
    @crypticnomad 5 ปีที่แล้ว +1

    This is actually super useful for what I am currently working on. I'm attempting to generate rsa keys using a seeded rng which uses bitcoin's bip39 seed or "mnemonic phrase".

  • @muhammadlawal6719
    @muhammadlawal6719 6 ปีที่แล้ว

    thank you very much . i was confuse before about how to get d bt i am now satisfied with explanation.

  • @bennetbraune2513
    @bennetbraune2513 3 ปีที่แล้ว

    Thank you, I got stuck implementing the RSA in Python at "d". your calculation path was easy to implement.

    • @vishalmishra3046
      @vishalmishra3046 2 ปีที่แล้ว

      Use d = pow( e, -1, (p-1)*(q-1) ) in Python3.8 built in function (not math.pow).

  • @gaastonsr
    @gaastonsr 4 ปีที่แล้ว

    Best explanation I could find on TH-cam. Thanks!

  • @mariomax2960
    @mariomax2960 6 ปีที่แล้ว

    the best course I've ever seen about rsa !!!!

  • @kirkouimet
    @kirkouimet 10 ปีที่แล้ว +2

    This is awesome Tony! Thanks for creating and sharing! Hope to see more like it :)

  • @JWentu
    @JWentu 8 ปีที่แล้ว

    One of the best explanations that i found on the topic. thankx a lot

  • @Lucaemar
    @Lucaemar 8 ปีที่แล้ว

    Finally got it, now I can complete my math's paper. Hallelujah & thank you

  • @raghuma1
    @raghuma1 9 ปีที่แล้ว

    wow awesome video...i finally found short and clear cut explanation of algorithm to find d.
    thank u so much for this awesome video

  • @deepakrai6353
    @deepakrai6353 8 ปีที่แล้ว

    Its very good description of RSA .I am became fan.................

  • @madhabahlal-madinah4309
    @madhabahlal-madinah4309 ปีที่แล้ว +1

    A simple trick to get the d as well: d = e-1 mod φ(n). Let's take the example in the video:
    e = 7
    φ(n) = 40
    7^-1 mod 40 = 23
    and that's how you can get it without going through the steps of the Extended Euclidean Algorithm

  • @tomay3000
    @tomay3000 9 ปีที่แล้ว +3

    Nice, this is a very nice and clear explanation.
    Well done (y)

  • @brandondupuis8243
    @brandondupuis8243 8 ปีที่แล้ว +5

    to find d : (k*PHI(N) + 1)/e. increment k by 1 until the answer is a round number. EX:
    ((1x1872) + 1 )/7 = 267.571... (not working, not a round number) ---> increment k by 1--->
    ((2x1872) + 1)/7 = 535 .... so d = 535 in that case.
    now you can build a simple program to find d , using this concept and loops

    • @asddsaaassddd
      @asddsaaassddd 6 ปีที่แล้ว

      wouldnt this take very long if ur numbers are huge?

    • @zayedzihan6594
      @zayedzihan6594 6 ปีที่แล้ว

      thank u, it helped...

    • @vishalmishra3046
      @vishalmishra3046 2 ปีที่แล้ว

      Use Python3.8 built-in function d = pow(e, -1, phi) for mod inverse calculations if you don't want to implement on your own.

  • @ariayang2980
    @ariayang2980 4 ปีที่แล้ว

    My mind is blown, the shortcut method. Nice 👍

  • @kf4426
    @kf4426 3 ปีที่แล้ว

    This is hands down the best RSA video out there. Too bad it took me so long to find it >.

  • @cybotx3872
    @cybotx3872 9 ปีที่แล้ว

    That was Excellent, Anthony !
    Great Work !

  • @TheMrVogue
    @TheMrVogue 7 ปีที่แล้ว +3

    Minor mistake at 6:28, you said the result is two thousand five hundred seven, and we can see it is 2557. Cheers though, this is the best RSA tutorial I've found to date.

  • @Melrix
    @Melrix 8 ปีที่แล้ว +1

    Thank you very much! It was awesome. Nice and clear explanation.

  • @wramarante
    @wramarante 4 ปีที่แล้ว

    Useful ^ 4096 = A better word to be used at the end of the video. Thanks for sharing.

  • @An.Individual
    @An.Individual 3 ปีที่แล้ว

    Thanks for this terrific explanation.

  • @finestinlondon8837
    @finestinlondon8837 8 ปีที่แล้ว +2

    Dude, this has helped amounts that you can't even imagine - thank you so much! 'Liked' the video too. I'm trying to write a bit of code to replicate RSA's encryption method, but was struggling to work out how to calculate 'd', and this worked wonders. Thank you again.
    Just a quick query though, how did you get -34 MOD 40 to equal 6? Mathematically, doesn't this equal -34? When I get a negative number, should I be adding the value of phi (until the value becomes positive) instead of MOD'ing the value by phi?

    • @JimVekemans
      @JimVekemans 8 ปีที่แล้ว

      39 MOD 40 = 39
      100 MOD 40 = 20 because there's 20 LEFT! after subtracting 40 two times.
      so, you don't try to see how much less -34 is than 0, you try to find out how much MORE -34 is than -40. Which is 6.

    • @finestinlondon8837
      @finestinlondon8837 8 ปีที่แล้ว

      +Jim Vekemans ah, this makes complete sense. So you simply just take the absolute value - thank you for your help!

  • @conanalbrecht5157
    @conanalbrecht5157 10 ปีที่แล้ว +1

    Very descriptive of the mathematics. Awesome.

  • @Ha1ization
    @Ha1ization 8 ปีที่แล้ว

    Great work Anthony. Thank you kindly.

  • @zholud
    @zholud 6 ปีที่แล้ว

    I wish you have explained 1) how does one generate 2048 bit primes p and q and 2) how computationally expensive it is to raise large m to the power large d mod large n when decrypting? How do you compute 5634644664688854133766886678^7754467997556567 mod 344346456654567776554345667885677777779 for example? Apart from that the explanation is clear, thanks for the video!

    • @vishalmishra3046
      @vishalmishra3046 2 ปีที่แล้ว

      Use built-in pow() function in Python3.8 (takes milli-seconds to answer for huge numbers)
      >>> pow(5634644664688854133766886678, 7754467997556567, 344346456654567776554345667885677777779)
      216531167112280961897015422503817866282

  • @Chaya-uv6oq
    @Chaya-uv6oq 4 ปีที่แล้ว

    u made my day & saved my time & I love you
    not rly but great video & u explained everything so well & simply that even I could follow & now I wrote a working python script & I'm happy ^^

  • @chaitanyavinnakota9909
    @chaitanyavinnakota9909 5 ปีที่แล้ว +1

    Thanks a ton. Immensely helpful explanation.

  • @tiyasharma441
    @tiyasharma441 6 ปีที่แล้ว

    So clear and crisp

  • @SkelleRok
    @SkelleRok 5 ปีที่แล้ว

    Thank you for this awesome and clear tutorial.

  • @duniajamma6031
    @duniajamma6031 7 ปีที่แล้ว +1

    In the last example, if you calculate 3 * 6219 mod 2328 = 33 not 1

  • @teus1500
    @teus1500 7 ปีที่แล้ว +2

    Hello, very nice explanation. Now, I read somewhere that if I want to have a 8bits key, my 'n' needs to be less than 2^(8), but I saw many resolutions where they use a 'n' that is > 2^(key lenght that they want). Could someone light me up?

  • @AkumaRaion
    @AkumaRaion 8 ปีที่แล้ว

    this is a great explanation of rsa. thanks a lot.

  • @fruney_x
    @fruney_x 9 ปีที่แล้ว

    Thank you, that was clear and to the point.

  • @hutaospunchableface7381
    @hutaospunchableface7381 3 ปีที่แล้ว

    Thank the lords for this video!

  • @wabafethacker1552
    @wabafethacker1552 5 ปีที่แล้ว

    I really liked your explanation

  • @bharathnayakb
    @bharathnayakb 4 ปีที่แล้ว

    Best explanation 👍

  • @minomino200
    @minomino200 5 ปีที่แล้ว

    Thanx bro......it help me a lot

  • @karimbarakat7732
    @karimbarakat7732 4 ปีที่แล้ว

    thank you, your explanation was just great.

  • @sigmaK9
    @sigmaK9 7 ปีที่แล้ว

    There's a significant disadvantage to your swift method of finding d. Not many people do it this way, which means if a student doesn't understand your method, he's hosed if he searches elsewhere. Also, when you mentioned the Euclidean and Extended Euclidean, you only assured we'll be getting to that later. But you never actually pointed out that we have gotten there once we started up on finding d. I happen to recognize where the EucAlgorithms came in but only because I've spent the last three weeks or so studying the damn stupid formula and falling FURTHER behind in my class as a result. I would remedy this if I were you.
    That said, however, this is a very good tutorial. At last, at fucking LAST I understand what all these formulas are for in RSA. Even with all the TH-cam videos available, up until this point, I had been bashing my head against the wall, trying to figure out, "Euler! Phi! Totient! GCD! Extended GCD! Euclidean! Extended Euclidean! What in the fuck am I studying this shit for?!?!"
    So thank you for clearing this up.

    • @vishalmishra3046
      @vishalmishra3046 2 ปีที่แล้ว

      Use pow() the built-in function in Python3.8 - e.g. d = pow(e, -1, (p-1)*(q-1) )

  • @michaelmcgoldrick5241
    @michaelmcgoldrick5241 3 ปีที่แล้ว

    Thank you this was very helpful

  • @pobg807
    @pobg807 4 ปีที่แล้ว

    this video is PERFECTION

  • @abderrahmanghorfy3281
    @abderrahmanghorfy3281 9 ปีที่แล้ว

    Excellente video and explication, GREAT JOB!!!!

  • @Magicsquarepuzzles
    @Magicsquarepuzzles 4 ปีที่แล้ว

    Very well explained

  • @AhmadShahwaiz
    @AhmadShahwaiz 8 ปีที่แล้ว

    Hey ++Anthony The only confusion I'm getting is that d value is not the greatest common divisor. Check with these values
    p=5 q=7, e=5, n=35. The value of 'd' I get is 5. But in another solution it is 29.

    • @vishalmishra3046
      @vishalmishra3046 2 ปีที่แล้ว

      phi = (p-1)x(q-1) = 4x6=24. So, d = 5 (mod 24) = [5, 29, 53, 77, 101, 125, 149, 173, 197, 221, ...]. Hence infinite solutions > 24.

  • @ajithkumar6787
    @ajithkumar6787 3 ปีที่แล้ว

    Best explanation ever.. Thank you.
    Can I get the video for Elliptic Curve Cryptography, from you, please?

  • @SANDEEPSINGH_9
    @SANDEEPSINGH_9 7 ปีที่แล้ว

    Good work Anthony...

  • @alvianibnuburhan2484
    @alvianibnuburhan2484 7 ปีที่แล้ว

    You are the best brohh big thanks

  • @ahmedghazii4964
    @ahmedghazii4964 8 ปีที่แล้ว

    THANKSS A LOT
    its working with all
    except p=11 q=3
    gives d=2 and the right answer is d=3 :)

    • @fmaleknia
      @fmaleknia 5 ปีที่แล้ว

      for p=11 and q=3, then n=33 and Phi=20, if e=3 then d=7.
      you may not choose e=2 as it has co-factor with Phi=20.

  • @tanyacharbury4728
    @tanyacharbury4728 8 ปีที่แล้ว +2

    Thank you ... this helped me a lot. :-)

  • @feliperodrigo7445
    @feliperodrigo7445 7 ปีที่แล้ว +1

    Hi! I love your video and it is helping me a lot with my Internal Assessment from IB Maths HL. I really need to do something original with RSA encryption (or look at it at a different way), so I was wondering if you (or anyone reading this comment) could have any idea about an original idea or a further step to RSA encryption.
    Thanks ;)

  • @mekaramu
    @mekaramu 8 ปีที่แล้ว

    Super Explanation!!!!! Great Thank you

  • @ananamz
    @ananamz 5 ปีที่แล้ว

    Love you man! Thanks for the video.

  • @Nada-yc8uo
    @Nada-yc8uo 4 ปีที่แล้ว

    you are amazing!!! good work, you got a new sub

  • @LivingVacuum
    @LivingVacuum 6 ปีที่แล้ว

    I will decompose the RSA of any complexity into multipliers. Fast and not expensive.

  • @mackomako
    @mackomako 9 ปีที่แล้ว

    Excellent video!

  • @rrr00bb1
    @rrr00bb1 ปีที่แล้ว

    I would make a big distinction in RSA between asymmetric encryption and public-key encryption. If you use a well-known and small 'e', you have public key, but can't support 'asymmetric' key encryption. With 'asymmetric' key encryption, 'e' and 'd' have the same properties; and are equally secret.
    I use it to make digitally signed tokens such that you don't know the plaintext until you produce a witness that you performed verify to extract a secret to decrypt the signed claims. That way, the signer distribute the verify key to those who are allowed to VERIFY. It's not totally public, because it's (n,e), but signer has (n,d,e). This allows tokens to be passed around so that man-in-the middle can't decode the claims, and the verifier can only extract verified claims. ie: the current way of checking signatures (plaintext,Sign(H(plaintexty))=sig) has security problems. The main one being that you allow people to not verify the signatures; something that is very common in the hands of web developers. And the other is in leaking the tokens to intermediate proxies.

  • @justincaseOne
    @justincaseOne 5 ปีที่แล้ว

    thank you very much...Very useful nd very clear

  • @christopherderrell8470
    @christopherderrell8470 7 ปีที่แล้ว

    @Anthony Vance Thank you very much for such a useful video.

  • @cycletechsa
    @cycletechsa 5 ปีที่แล้ว

    Thanks,......
    you are a life saver

  • @muffinspuffinsEE
    @muffinspuffinsEE 9 ปีที่แล้ว +1

    You sir, just got yourself a sub!

  • @KYMeatShower
    @KYMeatShower 6 ปีที่แล้ว

    A little python3 to calculate 'd':
    Note that using big primes will take a while and you will need to increase the range by a good amount.
    e = 17 # part of public key
    p = 61 # prime, keep secret
    q = 53 # prime, keep secret
    n = p * q # part of public key
    phi = ((p - 1) * (q - 1)) # phi of n
    d = [] # private key
    for num in range(3, 5000, 2): # if no answer is found, increase range (the 5000)
    poss_d = (e * num) % phi
    if poss_d == 1:
    d.append(num)
    else:
    pass
    for each in d:
    print(each)

    • @vishalmishra3046
      @vishalmishra3046 2 ปีที่แล้ว

      Use pow() the built-in function in Python3.8 - e.g. d = pow(e, -1, (p-1)*(q-1) ) = pow(17, -1, 60*52) = 2753.

  • @avatekmuhammed5013
    @avatekmuhammed5013 6 ปีที่แล้ว

    Very very very nice. Thank you so much

  • @benjadamore
    @benjadamore 5 ปีที่แล้ว

    Fantastic!! Good job!

  • @davidmiranda3129
    @davidmiranda3129 7 ปีที่แล้ว

    Great video! Thanks!

  • @راجيةرحمةالله-ز6م
    @راجيةرحمةالله-ز6م 5 ปีที่แล้ว +1

    Thanks a lot, I have a question "Can I used same the way to generate the key to steganography for embedding data in an image?"

  • @BelievinSP
    @BelievinSP 8 ปีที่แล้ว

    clear and concise!

  • @adam3416
    @adam3416 6 ปีที่แล้ว

    at 4:55 it would take trillions of trillions of years to crack an rsa like that

  • @bish-jyag3371
    @bish-jyag3371 4 ปีที่แล้ว

    Great work

  • @mahmoud-ibrahim
    @mahmoud-ibrahim 7 ปีที่แล้ว

    great video. many thanks.

  • @tmdbah
    @tmdbah 2 ปีที่แล้ว

    Thanks for this.

  • @kolawoleolusola
    @kolawoleolusola 9 ปีที่แล้ว

    thanks this really helped me