How prime numbers protect your privacy
NamePointer NamePointer
24.4K subscribers
10,288 views
0

 Published On Aug 14, 2022

Most of us have probably heard about encryption before, but have you ever wondered how it works? This video explores the math behind the RSA cryptosystem, a very popular encryption method that set the stage for asymmetric cryptography.

► Join my Discord server:   / discord  

This video was made as part of the Summer of Mathematical Exposition organized by ‪@3blue1brown‬

► Sources:
- https://en.wikipedia.org/wiki/RSA_(cr...)
-   / rsa-gradually-leaves-the-stage-after-more-...  
- https://en.wikipedia.org/wiki/Prime_n...

► Learn more about...
- Bézout's identity: https://en.wikipedia.org/wiki/B%C3%A9...
- The extended Euclidean algorithm: https://en.wikipedia.org/wiki/Extende...
- Modular exponentiation: https://en.wikipedia.org/wiki/Modular...

► Stock footage from: https://pixabay.com/

🎵 Music from Epidemic Sound, register with my link to support the channel and get a discount:
https://www.epidemicsound.com/referra...

Chapters:
0:00 - Intro
0:35 - Alice and Bob
01:10 - Encryption
02:01 - Asymmetric cryptography
03:22 - Rivest-Shamir-Adleman
03:50 - Modular congruence
04:59 - The RSA Equation
05:52 - Prime numbers
07:27 - Generating a keyset
09:19 - Implementation
10:25 - Proof of correctness
12:42 - Conclusion

#SoME2

show more

Share/Embed