Тёмный

Lecture 2: Modular Arithmetic and Historical Ciphers by Christof Paar 

Introduction to Cryptography by Christof Paar
Подписаться 63 тыс.
Просмотров 280 тыс.
50% 1

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com

Опубликовано:

 

14 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 256   
@VladimirDjokic
@VladimirDjokic 8 лет назад
Some professors are boring but this professor makes learning interesting and fun! Thank you :)
@IvoirRienna
@IvoirRienna 7 лет назад
Agreed 100%
@Sudiptmalakar2009
@Sudiptmalakar2009 5 лет назад
100% correct
@alexkotusenko302
@alexkotusenko302 4 года назад
100% correct
@YahyaKhan1254
@YahyaKhan1254 3 года назад
Write
@rvgprodss
@rvgprodss 3 года назад
keep preachin
@mr.shanegao
@mr.shanegao 3 года назад
Modular arithmetic 0:01 Rings 52:30 Shift(or Caesar) cipher 1:14:40 Affine cipher 1:23:00
@mdtanveerhasan1453
@mdtanveerhasan1453 2 года назад
bless your heart
@all462
@all462 3 года назад
I just started learning German, and being able to recognize few german words just feels amazing. Plus I am learning cryptography.
@Xardas_
@Xardas_ 3 года назад
I love the fact that we're learning new words in german as well ! Thank you.
@muthuramaganesh
@muthuramaganesh 2 года назад
Excellent..I liked they way the professor explained equivalence classes passionately. My target is to finish this course for the pleasure it gives. I have done my under graduation 20 years before
@vgdevi5167
@vgdevi5167 Год назад
elo, I'm about to start my CS undergrad in 3 months, any other course recommendations pls?
@alialtan8182
@alialtan8182 Год назад
Hi, my recommendation for you is to NOT start with cryptography, but start with mathematics for computer science, networking or a low level language course (learn C++ 😅).
@itsworkinprogress
@itsworkinprogress 3 года назад
Loving the lecture and I really appreciate, that you explain what is meant by the special mathematical notations. In a lot of books an lectures it is just anticipated, that you know it, but how? Thank you for making learning easy.
@thebudkellyfiles
@thebudkellyfiles 6 лет назад
This professor is on fire! I never had a professor with this much fervor and energy and brilliance, and I have well over 300 semester credits, mainly math, science, and computer science. This course is freakin' amazin' and free!@#$%
@diencai1812
@diencai1812 2 года назад
Watching this in 2022! Thank you for making this available professor (I am still awake at 37:30!!!)
@abhayahettiarachchige6853
@abhayahettiarachchige6853 6 лет назад
i wish i had a prof. like you during my studies. your teaching is very nice and active. thanks a lot
@kishsaam
@kishsaam 2 года назад
Sir you are a genius... nobody can ever make cryptography simpler than this....
@anatolicvs
@anatolicvs 6 лет назад
my professor uses mr. paar's book "Understanding Cryptography - A Textbook for Students and Practitioners" for our "Network Security and Cryptography" lesson, so I'm very much glad to watch him lessons on youtube, on the other hand, him explanation is far better than others did. thank you for sharing these series.
@padakoo
@padakoo 7 лет назад
Wow, wish we had more Professors like you Sir. Thanks for sharing this.
@TheAnimeist
@TheAnimeist 3 года назад
@9:30 "And what we're going to do for the next 80 minutes ..." Pure gold.
@prakashgourav
@prakashgourav 2 года назад
This is an incredible lecture, thanks Prof Christof Paar! Kudos!
@erikwg3814
@erikwg3814 5 лет назад
He looks like an older, German version of David Tennant... Great Lecture and thanks for all the wisodm!
@markmatter2411
@markmatter2411 6 лет назад
I'm watching this lectures and studying from your awesome book for my cybersecurity exam and i'm loving it. I just wanted to thank yo for making this fantastic lectures available on RU-vid. If you will ever read this comment i'd like to learn modular arithmetic deeply. Can you recommend some books for beginners? Thanks a lot!
@ThatNateGuy
@ThatNateGuy 9 лет назад
This is a fantastic tutorial series. I will almost certainly purchase your book, Herr Paar!
@opticintrusion6063
@opticintrusion6063 6 лет назад
Thank you, thank you, thank you!!! I was struggling so much with the modular arithmetic and why the number of keys in the affine cipher is 312. Now I understand. THANK YOU!
@peeledbanana311
@peeledbanana311 3 месяца назад
Clocks are actually infinite sets that just increment the day by 1 every time the base of 24 is satisfied. And we are just truncating the incrementing day value. A better example of a modular set would be the alphabet, since once you get to the end of the set, it doesn't increment a higher place value. If a clock is a modular set then it follows that the decimal system's 1s place is a modular set if you don't show the tens place.
@JamesBall-v1s
@JamesBall-v1s Год назад
Christof! you are such a good teacher and professor. Honestly so based - your students are extremely lucky
@AndreyLomakin
@AndreyLomakin 3 года назад
Would be cool to see more course videos conducted by the professor Christof Paar
@freshman04
@freshman04 3 года назад
thanks for the great lesson! I think at 1:29:07 there might be a Freudian slip because gcd(13,26) does not equal to 2.
@raghavendraprabhu1913
@raghavendraprabhu1913 5 лет назад
Thank you professor.. your lectures we're really helpful. It is a great service you are doing by putting it on RU-vid
@Chaaminda
@Chaaminda 9 лет назад
The way he was teaching stored subject matter in mind clearly.
@potkettle
@potkettle 7 лет назад
This was great. Looking forward to watching the remainder (pun intended) of the series soon. Based on where I am now in my career, this is what I wish I'd studied at university.
@DavidTheSkeptic
@DavidTheSkeptic 7 лет назад
I found your lecture series, I find them quite informative, thank you for making them available
@DeckSeven
@DeckSeven 10 лет назад
A finite set is one which resets to 0 or some other start-value when a certain end-value is overreached. Programmers call it "overrun". In other words, it's a fixed number range. The complete range of ASCII codes 0 to 255, for instance, is a finite set too. If you add 1 + 255 you get 0 again. Same with time. After 2359 hrs comes 0000 hrs again and not 2400 or 2401. So "finite set" basically means "fixed number range". That's how a crypto developer like me calls it. And yes, you can envision it as a circle, a loop or even a ring.
@officialversetile1770
@officialversetile1770 7 лет назад
ReptorULTRA7 are modules infinte or finite . meaning mod 1,2,3,4,5.... does it reset at a certain nunber or keep going ?
@cipherbenchmarks
@cipherbenchmarks 6 лет назад
Could this also be called a base? Such as octal hex or decimal then?
@dermaoling
@dermaoling 10 лет назад
it is really helpful, and making cryptography lecture very fun!!!
@bluejimmy168
@bluejimmy168 4 года назад
Great job, this lecture was actually fun and easy to follow.
@samkelemdoyi3720
@samkelemdoyi3720 8 лет назад
wow thank you for the privilege of a step by step understanding of the concept and it's inside. God bless you
@avrelyy
@avrelyy 10 лет назад
Very clear explanation of integer ring. Thank you!
@pradippaul9703
@pradippaul9703 Год назад
You are absolutely great teacher.. I have learnt so many things..👍
@cbzha
@cbzha 7 лет назад
A perfect lecture to learn english, computer science and German. :)
@TheGenerationGapPodcast
@TheGenerationGapPodcast 3 года назад
And latin
@hachimitsuchai
@hachimitsuchai 6 лет назад
@1:08:35 how did he get 2^-1 ≡ 5 mod 9? And @1:13:18 he uses German to describe a structure that uses all four operations + - * /. What is the English? Field Structure?
@abstractapproach634
@abstractapproach634 3 года назад
Quick tip, using the negative mod can be very useful, what time is 23:00? Notice 23 is one less than a multiple of 12, thus 23 ≡ -1 (mod 12) so you know 23 ≡ 11 (mod 12) thus it's 11pm. (Of course 23 - 12 is just as easy, but when numbers get larger negative modulo equivalents can make life easier)
@EmielBlom
@EmielBlom 8 лет назад
"Since there are only 26 different keys (shift positions), one can easily launch a brute-force attack by trying to decrypt a given ciphertext with all possible 26 keys. If the resulting plaintext is readable text, you have found the key." @1:20:40 Sure, from an attacker point of view there is a 26 sized keyspace, only after 26 iterations of shifting will you have %100 certainty to see the decrypted version of the ciphertext But is this true for choosing a key? Because you have 26 minus 1, so 25 possible 'shifts'. Maybe purely from a mathematical point of view shifting by 26 would be "correct", but in practise the result would be the same plaintext again, so is the 'keyspace' always defined from an attacker point of view?
@littlebigphil
@littlebigphil 7 лет назад
If the identity key doesn't count for choosing a key, then why would it count for an attacker? The attacker only needs to perform the 25 shifts that would actually be chosen to get a 100% certainty.
@ramyfarid2296
@ramyfarid2296 8 лет назад
The lectures are great, I am really grateful, professor
@SkynetDrone12
@SkynetDrone12 7 месяцев назад
Thank you so much, you make learning this fun and so interesting and not easy but much easier!
@kylebrown2903
@kylebrown2903 8 лет назад
I love this. I've always wanted a more in depth look into cyphers. Is this a university where students to learn english while learning other subjects? Ich moechte wissen wo und was diese ist.
@introductiontocryptography4223
Thanks for your interest. We are just a plain German university (and are, of course, public :)). Teaching is mostly in German, at least the B.Sc. courses. We have every year several foreign exchange students, that's why I had taught this one year in English. The approximately 150 students in the room are 1st year students and since most of them are German, I explain some tricky questions in German. Regards, christof
@kylebrown2903
@kylebrown2903 8 лет назад
Danke für ihre beantwörte! Ich studierte Computer Ingenieurwesen als hauptfach und natürlich Deutsch als nebenfach an der Uni aber möchte immer lerner. Ich wünsche ihnen nur das beste.
@Stillshot10200
@Stillshot10200 4 года назад
Maybe I missed something. At 1:29:14 he said gcd(13,26) = 2. Isn't it 13?
@finne5450
@finne5450 4 года назад
Yes
@topdayunky4134
@topdayunky4134 3 года назад
​@@finne5450 isnt gcd(12,26) = 2 ? making 12 a bad number for a? I thought the gcd had to exactly equal to 1?
@peeledbanana311
@peeledbanana311 3 месяца назад
Zank yew fau zis lektur! Schnitzel-dwaf!
@Pulkit__7
@Pulkit__7 Год назад
I love how you wake everyone who were sleeping during important topics lol
@Pulkit__7
@Pulkit__7 Год назад
Lol, there is also a comment of go back to sleep 😂💀
@jerrymahone335
@jerrymahone335 5 лет назад
are there learning algorithms associated with cryptography? ie can a crypher be taught to defend it self from attacks?? an AI crypher would be a great thing.
@aparnaammu1444
@aparnaammu1444 8 лет назад
Very nicely explained. You are my inspiration.
@younglatino134
@younglatino134 8 лет назад
awesome and im learning a little bit of german lol
@youmah25
@youmah25 8 лет назад
Ja
@RecursiveTriforce
@RecursiveTriforce 6 лет назад
Nikt wirklik
@arulselvalakshmi3806
@arulselvalakshmi3806 9 лет назад
Great lecture prof. I'm no expert. But around 1.29.00 How can #a be 12? isn't gcd(12,26) =2 ? and not 1? apologies if im wrong :)
@introductiontocryptography4223
+arul selva lakshmi The possible values for "a" are: (1,3,5,7,9,11,15,17,19,21,23,25). Hence, #a = 12 Cheers, christof
@arulselvalakshmi3806
@arulselvalakshmi3806 9 лет назад
Just realized it was a silly question '#a'.. !! Thank you Prof :) Cheers, Lakshmi
@mukul30051990
@mukul30051990 8 лет назад
cheers Mukool :P :P
@JohnSmith-he5xg
@JohnSmith-he5xg 8 лет назад
Why can't you exceed 26? gcd(27,26) =1 (unless I goofed)
@introductiontocryptography4223
Note that for the affine cipher all arithmetic is done mod 26. That means that 27 == 1 mod 26 and, thus, the value of "a" must be from (0,1, ..., 25). hope this helps, christof
@mrnobody1321
@mrnobody1321 3 года назад
if A = m*q + r, and we have 15*17 = X mod 6, we're just replacing (m1*q1+r1)*(m2*q2+r2) but every term having m is divisible by "6", then you're left with the remainders. In this case it could be (2*6+3)(2*6+5) and the only trouble is 3*5/6. so it's 3 mod 6 I guess the corollary is we can find remainders easier. It was a bit overly complicated from the video to me.
@matiassolomon7198
@matiassolomon7198 2 года назад
thanks for this video!
@hannahjp1505
@hannahjp1505 9 лет назад
In your lecture you said that the key space for shift cipher is 26. But actually, it is 25 only. Because shift by 0 is the plain text itself. Your lectures are useful for me and I am trying to listen all the lectures by you. Thanks and regards.
@bartomiejjakubowski2900
@bartomiejjakubowski2900 9 лет назад
Hannah Jp Nope he's right. You have 26 letters in the alphabet shown @1:19:14. If you use modulo 25, you are never able to get "Z"
@frtard
@frtard 9 лет назад
Hannah JP, it's true that a shift of 0 results in plaintext, but it still in the key space. bartłomiej Jakubowski Yup. With the modulo operator, you can't get a result the same as the modulus. It *has* to be 26.
@hannahjp1505
@hannahjp1505 9 лет назад
bartłomiej Jakubowski You should not use modulo 25. It should be modulo 26 only. But the shift by 0 gives the plain text itself.
@bartomiejjakubowski2900
@bartomiejjakubowski2900 9 лет назад
Hannah Jp Modulo is not for shifting here, only to stay within the range (alphabet). In this Cipher the shift comes from "K". PS: Now i got it, you are right.
@hannahjp1505
@hannahjp1505 9 лет назад
frtard Yes it is a genuine argument also. Thanks
@lablnet
@lablnet 2 года назад
I liked your lectures, many thanks
@arbab64
@arbab64 7 лет назад
Thank you very much for your elucidated exposition. Good luck.
@DieFliegeinderSuppe
@DieFliegeinderSuppe 8 лет назад
BUCKLE UP NOW!! love it
@MissNorington
@MissNorington 2 года назад
1:19:35 (You subtract modulo 26). I am here to try to understand the modulo operator. So if you have the encrypted letter "b" which is 1, and you subtract the key 3, you will obviously get a negative number here: -2. Try dividing -2 with 26 to get the remainder and you will be surprised it is outside the alphabet set. The result is -2 for 1 - 3 mod 26. -2 is an integer still. It is just not the result you would expect. I am here to try to solve this by mathematics, and not by special exceptions such as, if the value before division is less than 26, add 26, just so we'll never go below 0...... I am not expecting this to be solved without special exceptions.
@caffeinetablet2898
@caffeinetablet2898 4 года назад
37:51 I don’t speak German. Did he call out students? If so, good for him!
@shivertalks1691
@shivertalks1691 3 года назад
Yes he did :)
@ovais217
@ovais217 11 месяцев назад
Excellent, excellent lecture !!
@jliu6735
@jliu6735 10 лет назад
Go back to sleep, that was the cool part today. lol
@aneeshprasobhan
@aneeshprasobhan 4 года назад
lol
@Uriakatos
@Uriakatos 3 года назад
Me at home: *continues the video but gets ready for bed*
@Kguru04
@Kguru04 3 года назад
Undergrads all over the world sleep even if the Prof is interesting
@faizalkhan3042
@faizalkhan3042 3 года назад
@@Kguru04 As an Indian I can confirm.
@smrititiwari8243
@smrititiwari8243 6 лет назад
thanks ! I liked it a lot.. as usual u were really clear and interesting . :) hope I complete the next too.
@yoloboss1432
@yoloboss1432 8 лет назад
Hi Professor Christof May I ask please why the remainder was taken in to account on 43:00? The equation before that was totally understandable but why did we enquire about the remainder of diving 55 to 5? Many Thanks and thank you for continuously supporting us
@introductiontocryptography4223
+YOLOBOSS In this example we always look at results that we obtain if we compute modulo 5. Please have also a look at the first equation (2 lines above the 55 = 0 mod5 line). There we consider 200 modulo 5. Hope this helps. regards, christof
@JohnSmith-vs9oe
@JohnSmith-vs9oe 7 лет назад
Nice, interesting lecture. Thank you!
@HighArchingCrests
@HighArchingCrests 3 года назад
57:50 the chalk makes the Mario theme rhythm
@АлексейБыстров-с1ю
Thank you so much, that was great. How did you even decide to record the lessons? I thought it was a kind of secret. Or else one won't need to enter the university :D But don't stop, if you occasionally see my comment, please!
@prajganesh
@prajganesh 2 года назад
In the notes, he has total key space for Caeser Cipher is 26! is it just 26 or 26!?
@YahyaKhan1254
@YahyaKhan1254 3 года назад
Does we shuld learn any programing language for advanced cryptography
@Jota_VA
@Jota_VA 3 года назад
Great Lecture, thanks for sharing
@akhishesh
@akhishesh 7 лет назад
You are a great professor, this course if helping me a lot. Thank you sir :).
@roseb2105
@roseb2105 7 лет назад
so is what makes cryptography challenging is the key is the remainder but with the same a and m you can get so many different remainder?
@colinwithers1969
@colinwithers1969 6 месяцев назад
at 29:13 when defining the set the number to the right of 12 shoukd be 17 not 15
@emmyzhou9552
@emmyzhou9552 6 лет назад
Thank you so much for these lectures!
@deemdoubleu
@deemdoubleu 2 года назад
I'm a bit confused about the "a equiv r mod m". In programming we would say r = a mod m. Why isn't it "r equiv a mod m"?
@SS-605
@SS-605 7 лет назад
Hi Professor, Thank you for your video lectures. Can you please tell from where we can get access to the homework. Also I want to ask do you have lectures on other subjects too like discrete maths?
@introductiontocryptography4223
For problem sets, please visit www.crypto-textbook.com and go to online course -> videos. The solutions to the ODD NUMBERED problems are also on the website, look at "book". Sorry, but we are not allowed to release the other solutions. cheers, christof
@ramkumarnj7617
@ramkumarnj7617 6 лет назад
Go back to sleep? You know one cant - after that magic :-) Your lecture is super cool!
@hassanjaber8169
@hassanjaber8169 3 года назад
And here I am 7 years later at 2 am deciding to watch this course randomly
@Danielacce19
@Danielacce19 3 года назад
SAME but its so interesting
@officialversetile1770
@officialversetile1770 7 лет назад
in the video he said the set Zm ={0,1,...m-1} i get that. but how many Modules are there ? 1- infinity or does it end ? just trying to clear this up ?
@Elitios
@Elitios 9 лет назад
Thanks for th lectures! I'm leraning a lot thatnks to you. Out f curiosity, what happens in a shift cipher when you chose a key that varies, for example 3+position of the letter in the alphabet?
@introductiontocryptography4223
+Elitios In principle, a varying key is a good idea. However, your proposal will not work. In your example A and N would both be mapped to the same ciphertext with the shift cipher. Assume k=1, the "A" would be encrypted as e(A) = 0 + 0 + 1 = 1 =B but also e(N) = 13 +13 + 1 = 27 = 1 = B mod 26 But again, a varying key is exactly what we need for a strong cipher, but it must be constructed wiith a more sophisticated rule. Cheers, christof
@Elitios
@Elitios 9 лет назад
+Introduction to Cryptography by Christof Paar Oh! I see. Thanks a lot for the answer christof!
@TheResonating
@TheResonating 8 лет назад
Maybe I missed it, but for those confused at 28:33 its because A=B(modC) is equivalent to AmodC = BmodC. Thats how he got 7 and -3 ...... 12= 7(mod5) --> 12mod5 = 7mod5 the remainder is 2 not 12
@CreativeVery
@CreativeVery 8 лет назад
He was demonstrating that you can have more than 1 remainder. The remainder was both 2 and 7.
@bettinaschedwill9306
@bettinaschedwill9306 7 лет назад
Sehr guter Lehrer. Außerdem lernt man gleichzeitig die englischen Fachbegriffe!
@roseb2105
@roseb2105 7 лет назад
how is frequence perserved with a -b forumula?
@roseb2105
@roseb2105 7 лет назад
can pick any number basically to sqaure beacuse the set is inifinite so even if 4 was from the 5 equivalence class it is also form the 7 equivalence class so I can square it to get a smaller number which is easier to divide by 7?
@GrahamCrannell
@GrahamCrannell Год назад
41:26 - i'll be honest, that *did* actually blow my mind a little bit. Dr. Paar wasn't lying haha. [edit] okay the part with the negative numbers *definitely* blew my mind
@roseb2105
@roseb2105 7 лет назад
i have a stupid question so would we replace 3 to the expondent of 8 with any number from the 7 equivalence classs and then see how many time 7 goes into that number to find the remainder
@roseb2105
@roseb2105 7 лет назад
what would be the value for your y in the equation x=a-1(y-b)?
@user-or7ji5hv8y
@user-or7ji5hv8y 5 лет назад
He’s great! Explains very clearly.
@roseb2105
@roseb2105 7 лет назад
so instead of 81 you take i number from the equivalence class?
@bananian
@bananian 7 лет назад
26:33 hey that's also the line equation y=mx+b
@youmah25
@youmah25 9 лет назад
great lecture may i ask you what text book you are using???
@introductiontocryptography4223
+Youcef Mahdadi Sure, we are using "Understanding Cryptography" by Jan Pelzl and myself. The video lectures follow the book very closely. You find more information about the book and sample chapters at www.crypto-textbook.com. You may also want to check out the reviews at Amazon.com. People seem to really like the book. Regards, Christof
@youmah25
@youmah25 9 лет назад
Danke i will download the book
@nnnscorpionnn
@nnnscorpionnn 7 месяцев назад
Please somebody make subtitles for the videos.
@nournote
@nournote 3 года назад
25:40 the remainder IS unique!!! It's your definition of the remainder that is non-standard and unjustifiably counter-intuitive.
@itshertz37
@itshertz37 3 года назад
There is a mistake @1:29:15 - The gcd(13,26) is not 2, 13 is a prime, but it is 13 itself.
@roseb2105
@roseb2105 7 лет назад
also im confused with equaivalence class if I create an equivalence class of ( 7, 15,22, 29,3 etc) and of these numbers if i substitute them instead of 81 I will get a remainder of of then i would get 1 mode 7? someone please explain.
@thehumancondition3
@thehumancondition3 4 года назад
27:46 how is it possible to have a remainder of 7 if a = 12 and mod = 5? Surely it should be 8? Where am I going wrong?
@nournote
@nournote 3 года назад
5 does not divide 12-8 (which is 4)
@amrmahdi8522
@amrmahdi8522 5 лет назад
why is mod(n) used so frequently in cryptography?
@markmanning2921
@markmanning2921 5 лет назад
looks to me like the "cool" part is just rotating the clock to have whatever root you want to start with at the top!
@amitsrivastava5391
@amitsrivastava5391 8 лет назад
Is their any more session of yours on ECC ?
@epictetus__
@epictetus__ 7 месяцев назад
Sir which book were you refering to in class?
@introductiontocryptography4223
@introductiontocryptography4223 7 месяцев назад
The lecture closely follows my textbook "Understanding Cryptography": www.amazon.de/Understanding-Cryptography-Textbook-Students-Practitioners/dp/3642041000 Please note that the 2nd edition should become available in appr. 2 months.
@roseb2105
@roseb2105 7 лет назад
but then if i take 15 and i square and I divide by 7 my remainder is not 2?
@klabboy13
@klabboy13 6 лет назад
So around 50:00 the professor refers to a mod 5 class and substitute 81*81 with 4*4. Wouldn't he need to make a mod 7 class and substitute 2.
@tehwinsam3522
@tehwinsam3522 6 лет назад
yes it require to do so , the final answer will be 16 ≡2 mod 7 . i think he didn't do the final step but in his book he show up the final answer as the answer which i have mentioned .
@roseb2105
@roseb2105 7 лет назад
so to clarify we can replace the 81 with any number form the 7 equivalence class such as 13 and get the correct remainder?
@introductiontocryptography4223
13 would not be correct, but 11 would work. regards, christof
@TimothyEmong
@TimothyEmong 8 месяцев назад
Zee Proffesor I should have had in my Computer Science Klass.
@mastaskep
@mastaskep 9 лет назад
This is at the undergraduate level? What is the major?
@phanikrishna7450
@phanikrishna7450 8 лет назад
Hi Sir , I have one question. Let's consider ( 13 * 16 ) mod 5 Here i replace one with +ve and one with -ve number ( 8 * -4 ) mode 5 = -32 mod 5 Does this equal to 3 or 2 ?
@introductiontocryptography4223
Since -32 = (-7) * 5 + 3 it follows -32 = 3 mod 5 regards, christof
@CarloLavezzari
@CarloLavezzari 4 года назад
You must turn the clock's arm in the opposite way
Далее
CS50 Cybersecurity - Lecture 1 - Securing Data
1:55:22
Просмотров 131 тыс.
Слушали бы такое на повторе?
01:00
Part 5. Roblox trend☠️
00:13
Просмотров 2,7 млн
Cryptography: Crash Course Computer Science #33
12:33
Просмотров 841 тыс.
Lecture 1: Introduction to Cryptography by Christof Paar
1:17:25
Quotient-Remainder Theorem and Modular Arithmetic
9:30
Слушали бы такое на повторе?
01:00