we have a math project that is due today but we were stuck in the RSA question for hoursss and you have saved our life at the last second for REALL thanks😭😭😭😭
God bless you. I had a homework, and they did not show us how to handle a negative private key. Thank you very much. If I could give you hundreds of likes, I swear I would do.
Suppose, using RSA for two prime numbers resulted in encryption and decryption keys having the same values. (Decryption key solved as in video). Is it alright? If not, how to proceed further?
I also got confused with this step but I get what happened now. So when we multiply the -2 into the brackets, we will get -2(7) and +2(5). Now we also have the 5 in the front which is basically 1(5), so +2(5) and 1(5) are like terms (the 5 is common) so we add the numbers in front and get 3(5). So that will give us 3(5) and -2(7) Hope this helps
I also got confused with this step but I get what happened now. So when we multiply the -2 into the brackets, we will get -2(7) and +2(5). Now we also have the 5 in the front which is basically 1(5), so +2(5) and 1(5) are like terms (the 5 is common) so we add the numbers in front and get 3(5). So that will give us 3(5) and -2(7) Hope this helps
Wow, thanks so much! I've been trying to understand it for weeks and the TA and professors kept telling me it's super simple and wouldn't help me. They were right, it's super simple! But you actually helped me, thanks!
you said if the number infront of 7 was positive we would be done. then in that case, what is d????, you only explained how to get d if the number infront of 7 was negative
What is p? What is q? What is n? What is up with teachers always saying "This is what p is!" and just equate it to some other equation. I mean WHAT IS THE MEANING OF IT? What function does it serve? Why do we need it?
p is a placeholder that is equal to a prime number that you choose. q is a placeholder that is equal to a prime number that you choose. "p" and "q" can be any prime numbers. The second that you choose them, they have to remain fixed for the remainder of the calculations for the public and private keys.
Great video. I'm in computer science but I've never liked doing theoretical math and proofs. I'll do it if there's a practical application in an algorithm I need to understand, but I usually try to avoid it. This was a great explanation because you got to the point and explained everything very clearly.
KPop+KMath: Do you know relationship of 'Extended Euclidean Algorithm' and 'Nucha Binary Operation'? I'll Show You!!! ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-gi1CVjZVENA.html
You said at the end that if 17 was positive and not negative, that we would be done. If that were the case and it was 1 = 3(40)+17(7) what would d equal?
Hello, i think there is some issue with your calculations.. (M^7|55)^23|55 == (M^7|55)^3|55 == (M^7|55)^43|55 .. i think that hacker should not be able to use other private key to decode the staff other then the one..