Тёмный

Paper and Pencil RSA (starring the extended Euclidean algorithm) 

Jenn Janesko
Подписаться 303
Просмотров 211 тыс.
50% 1

For more detail on back substitution go to: bit.ly/1W5zJ2g
Here is a link with help on relative primes: www.mathsisfun.com/definitions...
This is (hopefully) a very simple example of how to calculate RSA public and private keys. Just to be clear: these values should not be used for any real encryption purposes.

Опубликовано:

 

25 фев 2013

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 183   
@sadclownism
@sadclownism 11 лет назад
I had an exam today where the extended Euclidean algorithm played a key role. I watched your video about 2 hours before the exam. Thanks to you I am 100% sure I got all the questions concerning the algorithm correct, and probably passed the exam.
@AvidLearner11
@AvidLearner11 11 лет назад
Fastest and clearest video of this algorithm -- perfect, thanks!
@daviddeoliveira9114
@daviddeoliveira9114 8 лет назад
Oh my gosh thank you! I've been looking everywhere for someone who actually explains this. Thank you so much.
@nolanlego
@nolanlego 3 года назад
Wow, thanks so much! I've been trying to understand it for weeks and the TA and professors kept telling me it's super simple and wouldn't help me. They were right, it's super simple! But you actually helped me, thanks!
@TimmehOriginal
@TimmehOriginal 9 лет назад
This was so helpful - couldn't find that last step (40-17) anywhere on the internet, so thank you so much!!
@JennJanesko
@JennJanesko 11 лет назад
I'm glad you found it to be helpful. I actually made this so that I could remember the steps for an exam. :)
@user-sy4be2be2m
@user-sy4be2be2m 11 лет назад
Thank you so much (: I had such a hard time figuring out how Extended Euclidean Algorithm works but after your explanation, it is so clear!
@jackm5904
@jackm5904 10 лет назад
Life saver! Watching this and another video on basic euclidean algorithm has made me understand it
@user-ko1wg7zg6b
@user-ko1wg7zg6b 6 месяцев назад
we have a math project that is due today but we were stuck in the RSA question for hoursss and you have saved our life at the last second for REALL thanks😭😭😭😭
@alanxoc3
@alanxoc3 8 лет назад
Thank you for this video. I've looked at a number of other sources and your video makes the most sense to me :).
@hattrickster33
@hattrickster33 5 лет назад
Great video. I'm in computer science but I've never liked doing theoretical math and proofs. I'll do it if there's a practical application in an algorithm I need to understand, but I usually try to avoid it. This was a great explanation because you got to the point and explained everything very clearly.
@JennJanesko
@JennJanesko 11 лет назад
e has to be relatively prime to our totient. I have added a link above in my video description to a website that gives a quick instruction on how to find a relative prime. Our example totient is 40. And, we have to pick a relative prime for our totient with the numbers from 1 to 40. Here is a list of all of these relative primes: 3, 7, 9, 11, 13, 17, 19, 21, 23, 27, 29, 31, 33, 37, 39 I can pick any of these numbers. For our example, I chose 7 because it was easy to calculate.
@el_quba
@el_quba 9 лет назад
You are the best! 7 hours I was trying to understand how to get d number and now I know. THANKS!
@realdealaneil
@realdealaneil 10 лет назад
Thank you so much for explaining this! If only my professor knew how to explain it as simple as you did! I cannot thank you enough!
@AD-do2rs
@AD-do2rs Год назад
Its been 9 years since this comment . Just wondering how you are doing in the present ?
@HarshPranami
@HarshPranami 9 лет назад
Thank uuuuuuuuuu!! For 3 hrs I was trying to figure out how to calculate d and now I know. I think I'll pass in the externals now.
@JennJanesko
@JennJanesko 11 лет назад
e has to be relatively prime to our totient. I have added a link above in my video description to a website that gives a quick instruction on how to find a relative prime. Our example totient is 40. And, we have to find a relative prime for our totient with the numbers from 1 to 40. Here is a list of all of these relative primes: 3, 7, 9, 11, 13, 17, 19, 21, 23, 27, 29, 31, 33, 37, 39 I can pick any of these numbers. For our example, I chose 7 because it was easy to calculate.
@blah44287
@blah44287 10 лет назад
Beautiful explanation! Was stummped by the book and this is the clearest source on th etopic for beginners out there!
@blah44287
@blah44287 10 лет назад
Please post more on discrete math topics! You are a great explainer!
@codonbyte
@codonbyte Год назад
I procrastinated on an assignment that I shouldn't have procrastinated on, and this actually saved my life.
@gototcm
@gototcm 7 лет назад
Nice job. The only thing I would have added is how messages are actually encrypted with the public key and decrypted with the private key, only for the purposes of completeness.
@youtube_username_
@youtube_username_ Год назад
Thank you - I was able to use your explanation to write a couple of functions to perform the same procedure.
@AliRachid
@AliRachid 7 месяцев назад
God bless you. I had a homework, and they did not show us how to handle a negative private key. Thank you very much. If I could give you hundreds of likes, I swear I would do.
@RyanNovaktheFirst
@RyanNovaktheFirst 9 лет назад
Jenn, thank you so much for this video. I am taking a class that involves cryptography and I had no clue how RSA worked after reading the teacher's slides but your example cleared it up. You are awesome! Please do an AES and DES video next! ;)
@mvincent43
@mvincent43 9 лет назад
wait till you learn about asymmetrical cryptography
@puccantu
@puccantu 7 лет назад
amazing video! finally I understand all the concepts! Thanks!
@AbhinavSharma267
@AbhinavSharma267 7 лет назад
Helpful in understanding the concept of key generation
@firasqzieh1604
@firasqzieh1604 8 лет назад
to find d another way easier than this d=1+(n*m)/e So that n start 0 to infinity number 0,1,2,3,4,5,6,7,8,9,10,11,12,13,..... The result of the previous equation =just int number but not double for example : 1+(3*40)/7=17.2 Do not take because 17.2 is double 1+(4*40)/7=161/7=23 then d=is 23 this is take because is int note: n in previous equation different from n=(p-1)*(q-1) .....Greetings
@noras7802
@noras7802 7 лет назад
thank you a lot you saved my life :/
@awaisahmadsiddiqi6505
@awaisahmadsiddiqi6505 5 лет назад
why not d = 1+(0*40)/7 =1 why we dont use 0?
@hattrickster33
@hattrickster33 5 лет назад
@A Hassan m is calculated as (p-1) * (q-1). This is the same as φ(n) in the example. Using the letter n is confusing because n usually refers to p * q. Most examples will use the letter k instead. So it looks something like: d = ( 1 + (k * φ(n)) )/e As Firas said, you just need to find a value of k which makes d an integer.
@richerrera8992
@richerrera8992 11 лет назад
Equation in step 1 is called a Diophantine equation. Great video!
@zeuscesar
@zeuscesar 4 года назад
Honestly you just save me! great explanation! I was a bit lost
@EscaExcel
@EscaExcel 9 лет назад
Thanks so much, this was great in understanding how to do this.
@EbraM96
@EbraM96 6 лет назад
In Euclidean algorithm if you make m steps, you will have to make m steps in substitution to reach the answer. Hope this helps to clear things out.
@zzantares
@zzantares 10 лет назад
if I choose an e (1 < e < φ(n)) but when doing the euclidean algorithm at the end I get 4 = 2*2 so there is no 1 there, there's no remainder, that means that my e is invalid?
@JennJanesko
@JennJanesko 10 лет назад
Hi Cézar, your e must be relatively prime to 40 (the totient). This means that the only factor that e and 40 should share is 1. 4 and 40 share the following factors: 1, 2, and 4. So, 4 is not a valid selection for e. Here is a short website that explains it in a slightly different way: www.mathsisfun.com/definitions/relatively-prime.html
@zzantares
@zzantares 10 лет назад
Jenn Janesko Thanks!
@Jdiddy1792
@Jdiddy1792 9 лет назад
Why in 1=5-2(2), do you substitute in for only one of the 2s? I tried with substituting in for both 2s, and it didnt work.
@uumdi
@uumdi 7 лет назад
Thank you sincerely for this; I've been doing a research paper on RSA / cryptology stuff, and this has been a huge help. Just a challenge question -- when we get x = -17, how do we know to subtract that from the totient? I'm already at 30 pages, I'm just going to wave my hands and say "because", but it would be cool to know. Thank you!
@woodchuk1
@woodchuk1 6 лет назад
uumdi It's the same thing as adding the modulus to the negative to make it positive. -17 and 23 are congruent in mod 40 arithmetic.
@JennJanesko
@JennJanesko 11 лет назад
This is a very cool tip. I looked this up and learned more about how these equations work. Thanks!
@XxFennasxX
@XxFennasxX 10 лет назад
this video really helped me . Thank you
@JennJanesko
@JennJanesko 9 лет назад
Hi Jdiddy1792, I apologize for the late response. I just got notice of your question. I think that the easiest way to describe the pattern here it is that I am only substituting the numbers that are in between the parentheses. So, in this example, I only care about the 2 inside of the parenthesis. With other example numbers the numbers may be different inside and outside of the parentheses.
@hinakanwal5849
@hinakanwal5849 4 года назад
Thank you so much...best video on RSA
@planetdeepak
@planetdeepak 11 лет назад
Thank You very much for the lucid explanation. Its a big help . Cheers !!
@AvidLearner11
@AvidLearner11 11 лет назад
Could you possibly do Reed-Solomon encoding examples as well?
@smalltugz
@smalltugz 8 лет назад
is there a method to get somewhere near what the value of the private key (d) will be and then use trial and error to get the actual answer ? Also you should have shown why the 32 was right by using the formula for more clarity
@DanielGutierrez3007
@DanielGutierrez3007 4 года назад
Amazing! i'm so grateful, nice video.
@isaackim9181
@isaackim9181 Год назад
this deserves the noble peace prize
@ManjunathPrabhakar
@ManjunathPrabhakar 6 лет назад
Can show encryption and decryption for the same if M = 88
@zelimkhan7126
@zelimkhan7126 6 лет назад
thanks a lot, your explanation is clear and simple... you are awesome :)
@luisluiscunha
@luisluiscunha 10 лет назад
Thanks! Great explanation.
@sausages2k8
@sausages2k8 11 лет назад
for e why did you choose 7? 3 and 9 also leave a gcd where +1 is at the end. But if you use 3 or 9, d turns out as a different number. So does it matter which relative prime number you use or can d be a different number than what you have??
@nate22621
@nate22621 6 лет назад
Great explanation
@ankitabasu7242
@ankitabasu7242 5 лет назад
modular multiplicative inverse{d = ee−1(mode φ(n) ) } where : e=27 and n=55 please help me calculate 'd' and the pseudo RSA algo is
@TheScreenagerist
@TheScreenagerist 11 лет назад
where did you get -17 in the last list of step 2?
@harihitaaramesh1086
@harihitaaramesh1086 Год назад
Suppose, using RSA for two prime numbers resulted in encryption and decryption keys having the same values. (Decryption key solved as in video). Is it alright? If not, how to proceed further?
@SuperEgyptianMan7
@SuperEgyptianMan7 11 лет назад
Perfection. Great example
@VoTinhThuong
@VoTinhThuong 7 лет назад
Oh thank you so much. I learn about RSA but stuck in step calculate d many hours =)))
@ljankok
@ljankok 8 лет назад
Excellent Video. Thanks a lot!
@JennJanesko
@JennJanesko 8 лет назад
Yes and no. For small numbers you could probably use trial and error. But, in real life, in general, the key sizes are so large that this is not manually possible within a lifetime. There are some side channel attacks that would help you to reduce the range of numbers so that you could possibly brute force keys with the help of a computer.
@yogeshwardalvi1778
@yogeshwardalvi1778 7 лет назад
Thanx @Jenn...
@dr.jokernalayaknaik2210
@dr.jokernalayaknaik2210 7 лет назад
I like your voice. So nice to hear..
@I_once_loved_too_much
@I_once_loved_too_much 5 лет назад
Great Video. But Can Someone Say How did we get 1= 3 (5) - 2 (7)??
@anderspan1226
@anderspan1226 7 лет назад
Every damn exam period I come back to this video.
@anderspan1226
@anderspan1226 7 лет назад
Great tutorial btw :)
@JennJanesko
@JennJanesko 7 лет назад
You and me both. :)
@anderspan1226
@anderspan1226 7 лет назад
Hahaha hopefully not for ever! :D Besides joking i really appreciate your work
@imveryhungry112
@imveryhungry112 7 лет назад
Beautiful. Thank you very much.
@rabarrasool757
@rabarrasool757 6 лет назад
how choose e=7 ?
@shaw6781
@shaw6781 10 лет назад
awesome explanation....thanx
@SandeeDude
@SandeeDude 9 лет назад
Does this method work with larger numbers? I'm trying an example where p = 13, q = 31 and d = 7 but I'm getting stuck when doing step 2 of Euclid's Extended Algorithm
@MASTER365r
@MASTER365r 9 месяцев назад
Yes dude! It'll work.
@JennJanesko
@JennJanesko 11 лет назад
@AvidLearner11 Sorry for the late response. I'm not very familiar with the Reed-Solomon encoding algorithm, so I won't be able to help.
@soa99
@soa99 2 года назад
how did you came up with the 3 at the end
@cedric1731
@cedric1731 Год назад
Literally saving me rn!
@joshrobertson897
@joshrobertson897 11 лет назад
Great example, thank you.
@TheFriedixD
@TheFriedixD 9 лет назад
Awesome video! :) Thanks a lot !!!
@salmanelbadessi1922
@salmanelbadessi1922 Год назад
In the 3rd part where you chose e, you included the number 9 which is not a prime number. Otherwise, Great video and very helpful!
@alexandruvlad3867
@alexandruvlad3867 10 лет назад
really god work here, liked
@roypaulnarido1052
@roypaulnarido1052 2 года назад
so in the e of the first example can be 3 also?
@orux100
@orux100 10 лет назад
Hi there, I'm writing a program in rexx that should encrypt files using rsa. However I'm not able to find proper algorythm for large random prime. Although i can use random function to find any random digit. How insecure this would be this any random number (large ones). My lecturer may not even note this if program will work, but I'd like to know for myself.
@JennJanesko
@JennJanesko 10 лет назад
Sorry for the late response. For large primes: Dave Evans has a nice video that I used a long time ago to write a program determine relatively quickly whether or not a number is likely to be a prime www.udacity.com/course/viewer#!/c-cs387/l-48684829/e-48754066/m-48719221. There should be libraries out there as well that cover this. One thing, though... Be careful with the (pseudo)random functions that you use to generate numbers. You probably already know all this. There's a nice discussion here of random numbers here: blog.cryptographyengineering.com/2012/02/random-number-generation-illustrated.html.
@3actu6
@3actu6 10 лет назад
in the select a number that is relatively prime, could you not choose 3 instead of 7?
@JennJanesko
@JennJanesko 10 лет назад
You are absolutely correct. If I remember correctly, I picked 7 because it was small and in the Euclidean algorithm section, It made a better example.
@kurtgiron1367
@kurtgiron1367 8 лет назад
hi in back substitution how did you find i got confused? 1=3(5)-2(7)
@DMerenguelli
@DMerenguelli 8 лет назад
+kurt giron So what I think is going on is this.. in the step just before we have 1 = 5 - 2(7 - 1(5)), if we multiply the 2 through.. then 1= 5 -2(7) + 2(5)... assuming that the 5 = 1(5).. she combined them to get 3(5) finally 1 = 3(5) - 2(7)
@JennJanesko
@JennJanesko 8 лет назад
+Dennis M You are exactly right about what I did. Well explained!!
@DMerenguelli
@DMerenguelli 8 лет назад
+Jenn Janesko Thank you
@siduduzomanqele9096
@siduduzomanqele9096 8 лет назад
+Dennis M am Still confused at this stage, so you mean1=5 -2(7) and -2(-1(5) ? that is 1=5-2(7)+2(5) therefore 1=3(7)+2(5).
@DMerenguelli
@DMerenguelli 8 лет назад
+siduduzo manqele 1=5 - 2(7) + 2(5) ---> 1= 1(5) - 2(7) + 2(5) then combine like terms.
@Cryogeneses
@Cryogeneses 6 лет назад
You said at the end that if 17 was positive and not negative, that we would be done. If that were the case and it was 1 = 3(40)+17(7) what would d equal?
@JennJanesko
@JennJanesko 6 лет назад
Hi Cryophilic, if 17 were positive, then d would simply be 17.
@Cryogeneses
@Cryogeneses 6 лет назад
Ok thank you
@Ooberr
@Ooberr 9 лет назад
9 is not prime @ 1:55? It can be divided by three..
@JennJanesko
@JennJanesko 9 лет назад
Hi Jonio, you are right. 9 is not a prime number. But, it is *relatively* prime to 40. *Relatively* is the key word here. A number is relatively prime to another number if the only factors that the two numbers share is 1. For example: NOT relatively prime: 2 because the factors of 2 are 2 and 1. And, 40/2=20 5 because the factors of 5 are 5 and 1. And, 40/5=8 15 because the factors of 15 are 5,3 and 1. And, 40/5=8 YES relatively prime: 3 has factors 3 and 1. Except for 1, there are no common factors that 3 shares with 40. 9 has factors 3, 3 and 1. Except for 1, there are no common factors that 9 shares with 40. 21 has factors 3, 7 and 1. Except for 1, there are no common factors that 21 shares with 40.
@pti-media8647
@pti-media8647 7 лет назад
can someone help me... how to encrypt the text "how are you" taking p=7,q=11 and assuming (a to z) =(0 to 25) using the RSA Algorithm.
@TheOiseau
@TheOiseau 7 лет назад
First find the other parameters: N = pq = 77 Phi (the totient) = (p-1)(q-1) = 60 e = … Well now, you need to choose some value of "e". It can't have any common factors with Phi (60), so you can't take 2, 3, 4, 5, 6, but you could take 7. If you plan on being able to decrypt, you'll need "d" too, but your question was how to encrypt. HOW ARE YOU transforms to 7, 14, 22, 0, 17, 4, 24, 14, 20 according to your scheme. The encryption formula for RSA is C = M^e mod N. So compute this formula for each number in the list. 7^7 mod 77 = 823 543 mod 77 = 28 14^7 mod 77 = 105 413 504 mod 77 = 42 22^7 mod 77 = 2 494 357 888 mod 77 = 22 0^7 mod 77 = 0 (duh) I'll leave the others to you. Your encrypted message is 28, 42, 22, 0, etc. Notice you can't convert back to letters because the answers are between 0 and 76. To decrypt you need to compute M = C^d mod N. For this you need "d", which is the inverse of "e" mod Phi. You get it by doing the Extended Euclidian Algorithm. Here is a shorthand version of it: Inverse of 7 mod 60: 60 0 (write 60 and 7 in first column, 0 and 1 in second column) 7 1 (because 7 goes 8 times into 60, do Line 1 - 8 x Line 2) 4 -8 (because 4 goes 1 time into 7, do Line 2 - 1 x Line 3) 3 9 (because 3 goes 1 time into 4, do Line 3 - 1 x Line 4) 1 -17 (because 1 goes 3 times into 3, do Line 4 - 3 x Line 5) 0 60 The last line being 0 and 60 proves that we did it right. The inverse you seek is on the previous line next to the 1. In this case it is -17. To get a positive number, add 60 (so 43). You can check that 7 x 43 mod 60 = 1. Voilà.
@pti-media8647
@pti-media8647 7 лет назад
TheOiseau thank you so much .
@juliojdp
@juliojdp 11 лет назад
God bless you! Explained it so nicely ;)
@Pyraptor
@Pyraptor 9 лет назад
I'm greatful.
@CheteauPape
@CheteauPape 3 года назад
Finally understand,thanks!!!💕💕💕
@Ashyon1337
@Ashyon1337 7 лет назад
Can someone help me do the Euclidean Algorithm with e=3 and 11,200 as the totient of n? I'd need this for a math project. Thank you
@TheOiseau
@TheOiseau 7 лет назад
You need the inverse of 3 mod 11 200. Here goes. Write 11 200 and 3 in a column. Write 0 and 1 in a second column: 11 200 0 3 1 Because 3 goes 3733 times into 11 200, do Line 1 - 3733 x Line 2 1 -3733 Because 1 goes 3 times into 3, do Line 2 - 3 x Line 3 0 11 200 The last line being 0 and 11 200 shows that we did it right. The inverse is actually on the previous line next to the 1. In this case it is -3733. To get a positive value, add the totient 11 200, so d = 7467. You can check that 3 x 7467 mod 11 200 = 1.
@bouabdellahtahar5126
@bouabdellahtahar5126 3 года назад
whey you chose e=7 you can chose e=3?
@JennJanesko
@JennJanesko 11 лет назад
Good job!
@shafigilanizadeh7726
@shafigilanizadeh7726 6 лет назад
thank u, its very helpful vedeo
@roshenw
@roshenw 10 лет назад
Thank you very much!
@getmemansoor
@getmemansoor 11 лет назад
how we get 7 explain plz
@tombourner9513
@tombourner9513 10 лет назад
so how do I number each letter to then encode using RSA? I tried the basic a=1,b=2 etc, but t=20 gives a result of 0, which is obviously not what I want, bit confused,hope someone can help
@JennJanesko
@JennJanesko 10 лет назад
Hi Tom, encoding the letters is a bit beyond the scope of this video. But, there is a simple explanation RSA text encoding here: rosettacode.org/wiki/RSA_code in the first bit. Heed the warnings on the page. :) The code examples there may or may not be correct. Good luck!!
@nmenumber1WYD
@nmenumber1WYD 10 лет назад
Jenn Janesko thanks very much,was sat here thinking that if I encoded plaintext by giving each letter a number then it would still be vulnerable to basic frequency analysis so much appreciated my learning continues,a really good introductory video by the way, and I now understand euclid alrogithm better as well :)
@roopakrajpal9613
@roopakrajpal9613 9 лет назад
If we got 17 instead of -17 in the last step then what would the value of d be?
@JennJanesko
@JennJanesko 9 лет назад
Hi Roopak Rajpal, that's a great question. If you have a positive result, then that is your answer. So, in your example the answer would be 17.
@roopakrajpal9613
@roopakrajpal9613 9 лет назад
Thanks a ton!
@WanderingFriar
@WanderingFriar 4 года назад
2:20 - 9 is not a prime number? Because 3x3? Good explanation for RSA though. Help me understand a bit more. Thanks.
@ait-gacemnabil9181
@ait-gacemnabil9181 3 года назад
she didn't say prime , she said RELATIVELY prime with 40 , which means it shares with 40 one common devisor : 1
@eatens
@eatens 4 года назад
you said if the number infront of 7 was positive we would be done. then in that case, what is d????, you only explained how to get d if the number infront of 7 was negative
@RomelPerez07
@RomelPerez07 10 лет назад
if you have questions about the second part, you can find good information in here: math.stackexchange.com/questions/67171/calculating-the-modular-multiplicative-inverse-without-all-those-strange-looking
@JennJanesko
@JennJanesko 10 лет назад
Romel, this is a SUPER link. Thanks!
@abedismyname
@abedismyname 4 года назад
thanks it helped explain things
@shubhamupadhyay9457
@shubhamupadhyay9457 10 лет назад
thank u.....very much..........................thanks a lot...
@JennJanesko
@JennJanesko 11 лет назад
In the step before I got to the line with -17, I had the following equation: 1= 3(40 -5(7)) -2(7) If I distrubte the 3 over 40 and -5(7), I get: 1 = 3(40) -3*5(7) - 2(7) This simplifies to: 1= 3(40) - 15(7) - 2(7) This simplifies to: 1= 3(40) - 17(7) When using the extended euclidean algorithm for RSA, you want to find the final number from the algorithm that sits in front of the number that you selected for e. In this case, the number is -17.
@Pellaeon4587
@Pellaeon4587 6 лет назад
Thank you so much! Didn't really understand where the 17 came from, it's now obvious in hindsight :)
@saralagab4036
@saralagab4036 Год назад
thank u very much ,u saved me
@galfrasian
@galfrasian 4 года назад
Why are we taking e=7 and not e=3??
@ludos4153
@ludos4153 6 лет назад
Hello, i think there is some issue with your calculations.. (M^7|55)^23|55 == (M^7|55)^3|55 == (M^7|55)^43|55 .. i think that hacker should not be able to use other private key to decode the staff other then the one..
@sumaiyatabassum654
@sumaiyatabassum654 10 месяцев назад
thank you so much
@chinnaraogolagani3249
@chinnaraogolagani3249 6 лет назад
why are u taking 7, 3 is also thee
@war.on.buffets4170
@war.on.buffets4170 3 года назад
Thank you!!
Далее
Extended Euclidean Algorithm Example
14:50
Просмотров 306 тыс.
Breaking RSA - Computerphile
14:50
Просмотров 354 тыс.
Cabeças erguidas, galera! 🙌 Vamos pegá-la!
00:10
小天使和小丑离家出走#short #angel #clown
00:36
когда мучает жажда // Eva mash
00:58
Просмотров 331 тыс.
RSA algorithm step by step example
20:41
Просмотров 104 тыс.
The Euclidean Algorithm
6:58
Просмотров 219 тыс.
Why R.S.A. Cryptography Works
10:30
Просмотров 1 тыс.
Extended Euclidean Algorithm - Example (Simplified)
7:40
Elliptic Curve Cryptography Overview
11:29
Просмотров 461 тыс.
Cabeças erguidas, galera! 🙌 Vamos pegá-la!
00:10