How RSA Encryption Works

85,726
0
Published 2021-02-09
₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿

Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436

Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV

Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079

Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF

Dash
Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz

Zcash
t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr

Chainlink
0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14

Bitcoin Cash
qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp

Etherum Classic
0xeA641e59913960f578ad39A6B4d02051A5556BfC

USD Coin
0x0B045f743A693b225630862a3464B52fefE79FdB

Subscribe to my YouTube channel goo.gl/9U10Wz
and be sure to click that notification bell so you know when new videos are rel

All Comments (21)
  • I have a paper due this week about aes, rsa, and blowfish and you’ve been clutch bro
  • @joshduffney7954
    Excellent video, thank you so much! Like so many others, I've used certs and digital signatures for years but never taken the time to understand what's happening and this video helped me understand it better.
  • @LiborTinka
    If you want full understanding of the RSA cryptosystem (to the point of being able to program it), I advice reading "Introduction to Algorithms" (Cormen, Leiserson, Rivest, Stein) - the book also explains many related algorithms, like the Pollard Rho Method (generation of large, high-probability prime numbers).
  • @luwu5396
    5:04 You said the size of your RSA public key is "248 bits, or 256 bytes". I think you meant 2048 bits, 2048 bits / 8 bits per byte = 256 bytes.
  • @hsharma3933
    Spot on. You’d encrypt outgoing messages with the recipient’s public key You’d encrypt with your private key for signature purposes. I’m not aware of any other reasons. The whole idea with both encryption and hashing in general is that they’re easy to perform in one direction and exceedingly difficult in the other.
  • @mskiptr
    It's important to remember that you still have to be sure you got the right public key! Maybe a video on roots of trust (for websites, secure boot, …) and their alternatives (safety number in Signal, networks of trust, etc.)?
  • @Yadobler
    I like to think of the public key as a Lockable padlock, those kind in lockers that you can push in the shackle and it locks, but then you need the key to unlock it. thus the private key is the key, the padlock is that public one that anyone can use to lock their parcel in a cage with, and send it to you to open it
  • @matejzatko2085
    I would appreciate more visual aid in these videos. In my opinion it would make the videos more understandable and it would be easier to follow what you're talking about. Btw thanks for the educational content 👍
  • @cherubin7th
    While AES is somewhat robust against quantum computers, RSA would be totally broken by it.
  • @Catge
    I feel like one of my teachers will use this video in the future