Thanks to all of you who support me on Patreon. You da real mvps! $1 per month helps!! :) https://www.patreon.com/patrickjmt !! Part 1: https://youtu.be/PkpFBK3wGJc
Please consider being a supporter on Patreon! https://www.patreon.com/patrickjmt
Twitter: @Patrick_JMT
In this video I show mathematically for RSA encryption works by going through an example of sending an encrypted message!
If you are interested in seeing how Euclid's algorithm would work, check out this video by Emily Jane: https://www.youtube.com/watch?v=fz1vxq5ts5I
A big thanks to the 'Making & Science team at Google' for sponsoring this video!
Please like and share using hashtag #sciencegoals

Views: 42398
patrickJMT

For more detail on back substitution go to: http://bit.ly/1W5zJ2g
Here is a link with help on relative primes: http://www.mathsisfun.com/definitions/relatively-prime.html
This is (hopefully) a very simple example of how to calculate RSA public and private keys. Just to be clear: these values should not be used for any real encryption purposes.

Views: 127338
Jenn Janesko

Modern day encryption is performed in two different ways. Check out http://YouTube.com/ITFreeTraining or http://itfreetraining.com for more of our always free training videos. Using the same key or using a pair of keys called the public and private keys. This video looks at how these systems work and how they can be used together to perform encryption.
Download the PDF handout
http://itfreetraining.com/Handouts/Ce...
Encryption Types
Encryption is the process of scrambling data so it cannot be read without a decryption key. Encryption prevents data being read by a 3rd party if it is intercepted by a 3rd party. The two encryption methods that are used today are symmetric and public key encryption.
Symmetric Key
Symmetric key encryption uses the same key to encrypt data as decrypt data. This is generally quite fast when compared with public key encryption. In order to protect the data, the key needs to be secured. If a 3rd party was able to gain access to the key, they could decrypt any data that was encrypt with that data. For this reason, a secure channel is required to transfer the key if you need to transfer data between two points. For example, if you encrypted data on a CD and mail it to another party, the key must also be transferred to the second party so that they can decrypt the data. This is often done using e-mail or the telephone. In a lot of cases, sending the data using one method and the key using another method is enough to protect the data as an attacker would need to get both in order to decrypt the data.
Public Key Encryption
This method of encryption uses two keys. One key is used to encrypt data and the other key is used to decrypt data. The advantage of this is that the public key can be downloaded by anyone. Anyone with the public key can encrypt data that can only be decrypted using a private key. This means the public key does not need to be secured. The private key does need to be keep in a safe place. The advantage of using such a system is the private key is not required by the other party to perform encryption. Since the private key does not need to be transferred to the second party there is no risk of the private key being intercepted by a 3rd party. Public Key encryption is slower when compared with symmetric key so it is not always suitable for every application. The math used is complex but to put it simply it uses the modulus or remainder operator. For example, if you wanted to solve X mod 5 = 2, the possible solutions would be 2, 7, 12 and so on. The private key provides additional information which allows the problem to be solved easily. The math is more complex and uses much larger numbers than this but basically public and private key encryption rely on the modulus operator to work.
Combing The Two
There are two reasons you want to combine the two. The first is that often communication will be broken into two steps. Key exchange and data exchange. For key exchange, to protect the key used in data exchange it is often encrypted using public key encryption. Although slower than symmetric key encryption, this method ensures the key cannot accessed by a 3rd party while being transferred. Since the key has been transferred using a secure channel, a symmetric key can be used for data exchange. In some cases, data exchange may be done using public key encryption. If this is the case, often the data exchange will be done using a small key size to reduce the processing time.
The second reason that both may be used is when a symmetric key is used and the key needs to be provided to multiple users. For example, if you are using encryption file system (EFS) this allows multiple users to access the same file, which includes recovery users. In order to make this possible, multiple copies of the same key are stored in the file and protected from being read by encrypting it with the public key of each user that requires access.
References
"Public-key cryptography" http://en.wikipedia.org/wiki/Public-k...
"Encryption" http://en.wikipedia.org/wiki/Encryption

Views: 496449
itfreetraining

Caesar Cipher
Modulo Arithmetic Rules
Congruency Modulo n equivalence relation
RSA
Table of Contents:
00:00 - Cryptography
00:09 - Encryption
01:24 - Caesar Cipher
03:47 - Encryption
04:51 - Public – Key Cryptography
06:51 - Recall: Equivalence Relation
07:09 - Recall: Equivalence classes
07:54 - Recall: A useful result
08:35 - Recall : Congruence Modulo n
09:00 - Congruence modulo n
10:49 - Residues
12:02 - Congruence Modulo n
17:59 - Modular Arithmetic
21:17 - Practical Applications
24:25 - Divisibility tricks
27:37 - A Computation Technique
32:09 - Extended Euclidean Algorithm.
42:00 - Relatively Prime & Inverse
45:25 - Using Inverses
47:29 - RSA
48:51 - To encode…
51:01 - To decode…
51:39 - Example
54:36 - Let’s Decode it!
59:04 - That’s it!

Views: 158
Joseph Dugan

Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi
Only 4 steps stand between you and the secrets hidden behind RSA cryptography. Find out how to crack the world’s most commonly used form of encryption.
Tweet at us! @pbsinfinite
Facebook: facebook.com/pbsinfinite series
Email us! pbsinfiniteseries [at] gmail [dot] com
Previous Episode:
Can We Combine pi & e into a Rational Number?
https://www.youtube.com/watch?v=bG7cCXqcJag&t=25s
Links to other resources:
Shor's paper: https://arxiv.org/abs/quant-ph/9508027v2
Lecture on Shor's Algorithm: https://arxiv.org/pdf/quant-ph/0010034.pdf
Blog on Shor's algorithm: http://www.scottaaronson.com/blog/?p=208
Video on RSA cryptography: https://www.youtube.com/watch?v=wXB-V_Keiu8
Another video on RSA cryptography: https://www.youtube.com/watch?v=4zahvcJ9glg
Euler's Big Idea: https://en.wikipedia.org/wiki/Euler%27s_theorem (I can find a non-wiki article, but I don't actually use this in the video. It's just where to learn more about the relevant math Euler did.)
Written and Hosted by Kelsey Houston-Edwards
Produced by Rusty Ward
Graphics by Ray Lux
Made by Kornhaber Brown (www.kornhaberbrown.com)
Challenge Winner - Reddles37
https://www.youtube.com/watch?v=bG7cCXqcJag&lc=z135cnmgxlbwch1ds233sbzgaojkivaz004
Comments answered by Kelsey:
Joel David Hamkins
https://www.youtube.com/watch?v=bG7cCXqcJag&lc=z13zdpcwyk2ofhugh04cdh4agsr2whmbsmk0k
PCreeper394
https://www.youtube.com/watch?v=bG7cCXqcJag&lc=z135w324kw21j1qi104cdzvrpoixslmq1jw

Views: 195008
PBS Infinite Series

Introduces Public Key Cryptography and RSA
Table of Contents:
00:00 - Cryptography
00:05 - Encryption
00:36 - Caesar Cipher
02:07 - Encryption
02:42 - Public – Key Cryptography
03:18 - We need to know …
03:30 - Recall : Congruence Modulo n
03:56 - Congruence modulo n
04:27 - What's so important?
05:02 - Modular Arithmetic
06:04 - Residues
06:42 - Practical Applications
08:10 - A Computation Technique
10:12 - Relatively Prime & Inverse
11:22 - Example
12:14 - RSA
12:46 - To encode…
14:07 - To decode…
14:36 - Let’s Decode it!
14:37 - Example
17:23 - Let’s Decode it!
18:50 - Let’s Decode it!
19:30 - That’s it!

Views: 102
Joseph Dugan

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation & time complexity.
Link to factoring graph: http://www.khanacademy.org/labs/explorations/time-complexity

Views: 582032
Art of the Problem

MIT 6.042J Mathematics for Computer Science, Spring 2015
View the complete course: http://ocw.mit.edu/6-042JS15
Instructor: Albert R. Meyer
License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

Views: 20226
MIT OpenCourseWare

In this network security video tutorial we will study the working of RSA Algorithm.
RSA Algorithm theory -
1. Ron Rivest, Adi Shamir and Len Adlemen developed the method called as RSA algorithm.
2. Most popular and proven asymmetric key cryptography algorithm
3. Based on the mathematical fact that it is easy to find and multiply large prime numbers together, but it is extremely difficult to factor their product.
RSA Algorithm Steps -
1. Choose two large prime numbers P and Q.
2. Calculate N = P * Q
3. Select the public key (i.e. the encryption key) E such that it is not a factor of [(P – 1) * (Q – 1)].
4. Select the private key (i.e. the decryption key) D such that the following equation is true:
(D * E) mod (P – 1) * (Q – 1) = 1
5. For encryption calculate the cipher text CT from the plain text PT as follows: CT= PT^E mod N
6. Send CT as the cipher text to the receiver
7. For decryption calculate the plain text PT from the cipher text CT as follows: PT = CT^D mod N
Complete Network Security / Information Security Playlist - https://www.youtube.com/watch?v=IkfggBVUJxY&list=PLIY8eNdw5tW_7-QrsY_n9nC0Xfhs1tLEK
Download my FREE Network Security Android App - https://play.google.com/store/apps/details?id=com.intelisenze.networksecuritytutorials
Simple Snippets Official Website -
http://simplesnippets.tech/
Simple Snippets on Facebook -
https://www.facebook.com/simplesnippets/
Simple Snippets on Instagram -
https://www.instagram.com/simplesnippets/
Simple Snippets on Twitter -
https://twitter.com/simplesnippet
Simple Snippets Google Plus Page -
https://plus.google.com/+SimpleSnippets
Simple Snippets email ID -
[email protected]
For More Technology News, Latest Updates and Blog articles visit our Official Website - http://simplesnippets.tech/
#RSA #RSAalgorithm #NetworkSecurity #AsymmetricCryptography

Views: 1920
Simple Snippets

The history behind public key cryptography & the Diffie-Hellman key exchange algorithm.
We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8

Views: 640468
Art of the Problem

In this video I show how to run the extended Euclidean algorithm to calculate a GCD and also find the integer values guaranteed to exist by Bezout's theorem.

Views: 63066
John Bowers

25 80 12 3 5! With the appropriate matrix understanding, you'd know that I just said "Hello!" Yay Math in Studio presents how to use inverse matrices to encrypt and decrypt messages. This is a fascinating topic, and once you understand how it works, it's not so bad. In this video, we walk you through the process of setting up a message, encrypting it with what's called an "encoding matrix," then use the inverse of that matrix to decrypt. Then we round out the lesson with the same tasks on the TI-84 graphing calculator. Enjoy this peek into the world of code breaking, YAY MATH!
Learning should be inspirational. Please visit yaymath.org for:
all videos
free quizzes
free worksheets
debut book on how to connect with and inspire students
entire courses you can download

Views: 5375
yaymath

This video will explain you in detail how caesar cipher encryption and decryption technique works.
This video includes solved example for caesar cipher encryption and decryption algorithm on whiteboard.
I had explained in detail about difficulties student might face while solving example related to caesar cipher in their examination.
More videos about encryption algorithms, computer tips and tricks, ethical hacking are coming very soon so share this video with your friends.
Subscribe to my youtube channel so that you can know when I upload any new video.
See you all very soon in next video, have great days ahead.
Thanks for watching my video.
#caesar #encryption #decryption

Views: 33046
SR COMPUTER EDUCATION

In this tutorial, I demonstrate two different approaches to multiplying numbers in modular arithmetic.
Learn Math Tutorials Bookstore http://amzn.to/1HdY8vm
Donate - http://bit.ly/19AHMvX
STILL NEED MORE HELP?
Connect one-on-one with a Math Tutor. Click the link below:
https://trk.justanswer.com/aff_c?offer_id=2&aff_id=8012&url_id=232
:)

Views: 35890
Learn Math Tutorials

John Wagnon discusses the basics and benefits of Elliptic Curve Cryptography (ECC) in this episode of Lightboard Lessons.
Check out this article on DevCentral that explains ECC encryption in more detail: https://devcentral.f5.com/articles/real-cryptography-has-curves-making-the-case-for-ecc-20832

Views: 180733
F5 DevCentral

Website + download source code @ http://www.zaneacademy.com | Elliptic Curve Cryptography (ECC) @ https://youtu.be/lRY8ZDek8R0

Views: 143
zaneacademy

Learn How to calculate a power b modulus n i.e (a ^ b mod n) using Fast exponential modular arithmetic technique!!
Follow us on : http://aptitudefordummies.wordpress.com
Follow us in Fb : https://www.facebook.com/aptitudedummies
Google+ : [email protected]

Views: 101019
Aptitude for dummies

Views: 119109
B Hariharan

In the video, we avoid using the Euclidean Algorithm to solve a congruence equation that you might find in a Math For Liberal Arts or Survey of Mathematics course, by using a less sophisticated but reliable method of "systematic listing." When the numbers are not very large, this method is fine for solving equations involving modular arithmetic. For early studies of the methods of RSA Public Key Cryptography using small numbers, this is a good way to get a feel for the step in the process in which the decryption exponent must be found by solving a congruence equation. This method is not appropriate for more advanced courses such as Coding Theory.

Views: 745
Ms. Hearn

Learn more advanced front-end and full-stack development at: https://www.fullstackacademy.com
Elliptic Curve Cryptography (ECC) is a type of public key cryptography that relies on the math of both elliptic curves as well as number theory. This technique can be used to create smaller, faster, and more efficient cryptographic keys. In this Elliptic Curve Cryptography tutorial, we build off of the Diffie-Hellman encryption scheme and show how we can change the Diffie-Hellman procedure with elliptic curve equations.
Watch this video to learn:
- The basics of Elliptic Curve Cryptography
- Why Elliptic Curve Cryptography is an important trend
- A comparison between Elliptic Curve Cryptography and the Diffie-Hellman Key Exchange

Views: 24355
Fullstack Academy

I made a mistake ... the equation is y^2 = x^3 - 3x + 5 ... I should have said "="
Details:
http://asecuritysite.com/encryption/ecc
http://asecuritysite.com/comms/plot05

Views: 2159
Bill Buchanan OBE

Using the repeated squaring algorithm to calculate 2^300 mod 50.

Views: 95653
GVSUmath

Protecting your data through encryption may require complex math, but the process is surprisingly simple.
» Subscribe to NBC News: http://nbcnews.to/SubscribeToNBC
» Watch more NBC video: http://bit.ly/MoreNBCNews
NBC News is a leading source of global news and information. Here you will find clips from NBC Nightly News, Meet The Press, and our original series Debunker, Flashback, Nerdwatch, and Show Me. Subscribe to our channel for news stories, technology, politics, health, entertainment, science, business, and exclusive NBC investigations.
Connect with NBC News Online!
Visit NBCNews.Com: http://nbcnews.to/ReadNBC
Find NBC News on Facebook: http://nbcnews.to/LikeNBC
Follow NBC News on Twitter: http://nbcnews.to/FollowNBC
Follow NBC News on Google+: http://nbcnews.to/PlusNBC
Follow NBC News on Instagram: http://nbcnews.to/InstaNBC
Follow NBC News on Pinterest: http://nbcnews.to/PinNBC
Data Encryption: Simple Idea, Complex Math | Show Me | NBC News

Views: 1995
NBC News

This Algorithm is used to exchange the secret /symmetric key between sender and receiver.
This exchange of key can be done with the help of public key and private key
step 1 Assume prime number p
step 2 Select a such that a is primitive root of p and a less than p
step 3 Assume XA private key of user A
step 4 Calculate YA public key of user A with the help of formula
step 5 Assume XB private key of user B
step 6 Calculate YB public key of user B with the help of formula
step 7 Generate K secret Key using YB and XA with the help of formula at Sender side.
step 8 Generate K secret Key using YA and XB with the help of formula at Receiver side.

Views: 81175
Sundeep Saradhi Kanthety

introduction to number theory for public key crypto. Divisibility, factors, primes, relatively prime. Addition, subtraction, multiplication and division in modular arithmetic. Eulers totient. Course material via: http://sandilands.info/sgordon/teaching

Views: 4675
Steven Gordon

Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi
Symmetric keys are essential to encrypting messages. How can two people share the same key without someone else getting a hold of it? Upfront asymmetric encryption is one way, but another is Diffie-Hellman key exchange. This is part 3 in our Cryptography 101 series. Check out the playlist here for parts 1 & 2: https://www.youtube.com/watch?v=NOs34_-eREk&list=PLa6IE8XPP_gmVt-Q4ldHi56mYsBuOg2Qw
Tweet at us! @pbsinfinite
Facebook: facebook.com/pbsinfinite series
Email us! pbsinfiniteseries [at] gmail [dot] com
Previous Episode
Topology vs. “a” Topology
https://www.youtube.com/watch?v=tdOaMOcxY7U&t=13s
Symmetric single-key encryption schemes have become the workhorses of secure communication for a good reason. They’re fast and practically bulletproof… once two parties like Alice and Bob have a single shared key in hand. And that’s the challenge -- they can’t use symmetric key encryption to share the original symmetric key, so how do they get started?
Written and Hosted by Gabe Perez-Giz
Produced by Rusty Ward
Graphics by Ray Lux
Assistant Editing and Sound Design by Mike Petrow and Meah Denee Barrington
Made by Kornhaber Brown (www.kornhaberbrown.com)
Thanks to Matthew O'Connor, Yana Chernobilsky, and John Hoffman who are supporting us on Patreon at the Identity level!
And thanks to Nicholas Rose, Jason Hise, Thomas Scheer, Marting Sergio H. Faester, CSS, and Mauricio Pacheco who are supporting us at the Lemma level!

Views: 53716
PBS Infinite Series

Website + download source code @ http://www.zaneacademy.com | derive equations For point addition & point doubling @ https://youtu.be/ImEIf-9LQwg | Elliptic Curve Digital Signature Algorithm (ECDSA) - Public Key Cryptography w/ JAVA (tutorial 10) @ https://youtu.be/Kxt8bXFK6zg
00:05 demo prebuilt version of the application
01:05 find all points that satisfy elliptic curve equation
03:05 show cyclic behavior of a generator point in a small group
04:05 use double and add algorithm for fast point hopping
04:45 quick intro to elliptic curves
05:20 singular versus nonsingular elliptic curves
06:00 why use elliptic curve in cryptography
09:55 equations for elliptic curve point addition and doubling
12:02 what is a field
13:35 elliptic curve group operations
14:02 associativity proof for elliptic curve point addition
15:30 elliptic curve over prime fields
16:35 code the application
19:46 check if curve to be instantiated is singular
24:06 implement point addition and doubling
25:59 find all points that satisfy elliptic curve equation
28:00 check if 2 points are inverse of each other
29:15 explain elliptic curve order, subgroup size n, and cofactor h
32:53 implement double and add algorithm
35:09 test run the application
40:20 what does 'Points on elliptic curve + O have cyclic subgroups' mean
40:45 when do all points on an elliptic curve form a cyclic group

Views: 316
zaneacademy

In this video, we learn how internet encryption works to secure your data.
Diffie Hellman is the most popular form of internet encryption. It allows two or more parties to exchange information securely. We look at how it works, in general, and then we look at the specific equations that are behind it.
We also discuss downfalls with Diffie Hellman, which now requires 2048 bit keys, and the potential for Elliptic Curve Cryptography.
For all your Global IT Security Needs, in Edmonton, AB and around the world:
Call us 24/7 at 1 866 716 8955 / 780 628 1816
Visit us at https://www.hsmitservices.com/network-security
We'll take care of you!

Views: 293
HSM IT Services

Part 3: Introduction to codes and an example or RSA public key encryption.

Views: 1921
MAT 243 Discrete Mathematics

Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL & TLS and HTTPS.
Watch the next lesson: https://www.khanacademy.org/computing/computer-science/internet-intro/internet-works-intro/v/the-internet-cybersecurity-and-crime?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience
Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/internet-intro/internet-works-intro/v/the-internet-http-and-html?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience
Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information).
About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything.
For free. For everyone. Forever. #YouCanLearnAnything
Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1
Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy

Views: 144683
Khan Academy

Elliptic curve cryptography is the hottest topic in public key cryptography world. For example, bitcoin and blockchain is mainly based on elliptic curves. We can also do encryption / decryption, key exchange and digital signatures with elliptic curves.
This video covers the proofs of addition laws for both point addition and doubling for elliptic curves in weierstrass form. This type curves mostly used in prime field studies.
This is the preview video of Elliptic Curve Cryptography Masterclass online course. You can find the course content here: https://www.udemy.com/elliptic-curve-cryptography-masterclass/?couponCode=ECCMC-BLOG-201801
Documentation: https://sefiks.com/2016/03/13/the-math-behind-elliptic-curve-cryptography/

Views: 189
Sefik Ilkin Serengil

https://cloud.sagemath.com/projects/4d0f1d1d-7b70-4fc7-88a4-3b4a54f77b18/files/lectures/2016-05-23/

Views: 375
William Stein

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

Views: 11888
nptelhrd

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

Views: 1273
Udacity

Enroll to Full Course: https://goo.gl/liK0Oq
Networks#4: The video explains the RSA Algorithm (public key encryption) Concept and Example along with the steps to generate the public and private keys. The video also provides a simple example on how to calculate the keys and how to encrypt and decrypt the messages.
For more, visit http://www.EngineeringMentor.com.
FaceBook: https://www.facebook.com/EngineeringMentor.
Twitter: https://www.twitter.com/Engi_Mentor

Views: 165112
Skill Gurukul

Website + download source code @ http://www.zaneacademy.com | derive equations For point addition & point doubling @ https://youtu.be/ImEIf-9LQwg | Elliptic Curve Diffie–Hellman key exchange (ECDH) - Public Key Cryptography w/ JAVA (tutorial 09) @ https://youtu.be/JlmA9JG7kwY | Elliptic Curve Cryptography (ECC) - Public Key Cryptography w/ JAVA (tutorial 08) @ https://youtu.be/lRY8ZDek8R0

Views: 88
zaneacademy

Using EA and EEA to solve inverse mod.

Views: 414091
Emily Jane

This video gives an introduction and motivation about finding large prime numbers for the RSA. General ideas are discussed.

Views: 1889
Leandro Junes

Views: 4318
Internetwork Security

Talk at crypto 2011. Authors: Taizo Shirai, Koichi Sakumoto, Harunaga Hiwatari. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23604

Views: 608
TheIACR

Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to become a sophisticated scientific art—combining mathematics, physics, computer science, and electrical engineering. It not only protects messages, but it also safeguards our privacy. From email to banking transactions, modern cryptography is used everywhere. But does it really protect us? What took place was a discussion of cryptography’s far-reaching influence throughout history from Julius Caesar’s reign to Julian Assange’s WikiLeaks, and the ways in which it—and our privacy—are constantly under assault today as threats lurk behind IP addresses, computational power increases, and our secrets move online.
The World Science Festival gathers great minds in science and the arts to produce live and digital content that allows a broad general audience to engage with scientific discoveries. Our mission is to cultivate a general public informed by science, inspired by its wonder, convinced of its value, and prepared to engage with its implications for the future.
Subscribe to our YouTube Channel for all the latest from WSF.
Visit our Website: http://www.worldsciencefestival.com/
Like us on Facebook: https://www.facebook.com/worldsciencefestival
Follow us on twitter: https://twitter.com/WorldSciFest
Original Program Date: June 4, 2011
MODERATOR: Josh Zepps
PARTICIPANTS: Orr Dunkelman, Tal Rabin, Simon Singh, Brian Snow
Cryptography In A Connected World 00:12
Josh Zepps Introduction 01:33
Participant Introductions 02:30
What is the history of Cryptography? 04:52
What's the difference between Cryptography and Encryption? 06:56
How the enigma machine works. 12:09
You’re Only as Secure as Your Weakest Link 19:18
Public key and private key encryption example. 22:09
What is the distinction between hacking and cryptanalysis? 26:55
The NSA and what they are looking for? 28:25
How do we establish cyber security? 36:20
How do systems get broken into? 45:30
How do you break a code? 56:38
Public key and the key distribution problem. 01:03:04
Codes will need to be tough due to mathematicians getting better. 01:08:15
The cloud and how we protect it. 01:09:22
In a world that is increasingly networked, How do we protect ourselves? 01:14:30
Online voting ... When and how? 01:20:52

Views: 67629
World Science Festival

Website + download source code @ http://www.zaneacademy.com | Elliptic Curve Digital Signature Algorithm (ECDSA) - Public Key Cryptography w/ JAVA (tutorial 10) @ https://youtu.be/Kxt8bXFK6zg | | derive equations For point addition & point doubling @ https://youtu.be/ImEIf-9LQwg

Views: 123
zaneacademy

Elliptic curve cryptography is the hottest topic in public key cryptography world. For example, bitcoin and blockchain is mainly based on elliptic curves. We can also do encryption / decryption, key exchange and digital signatures with elliptic curves.
This video covers the proofs of addition laws for both point addition and doubling for Koblitz Curves introduced by Neal Koblitz. This curves mostly used in binary field studies.
This is the preview video of Elliptic Curve Cryptography Masterclass online course. You can find the course content here: https://www.udemy.com/elliptic-curve-cryptography-masterclass/?couponCode=ECCMC-BLOG-201801
Documentation: https://sefiks.com/2016/03/13/the-math-behind-elliptic-curves-over-binary-field/

Views: 174
Sefik Ilkin Serengil

Elliptic curves, SHA256, and RIPEMD160, oh my. Dr. Darren Tapp presents the fundamental mathematics needed for Bitcoin to work as intended, prepared so that people of many levels can get something out of it. He believes cryptographic methods are not fully used by the private sector. Take some time to learn a little about cryptography and its application to Bitcoin. 3/15/2014
http://www.darrentapp.com/

Views: 12454
adventures in the free state

From OSCON 2013: What do you need to know about prime numbers, Markov chains, graph theory, and the underpinnings of public key cryptography? Well, maybe more than you think!
In this talk, we'll explore the branch of mathematics that deals with separate, countable things. Most of the math we learn in school deals with real-valued quantities like mass, length, and time. However, much of the work of the software developer deals with counting, combinations, numbers, graphs, and logical statements: the purview of discrete mathematics. Join us for this brief exploration of an often-overlooked but eminently practical area of mathematics.
Don't miss an upload! Subscribe! http://goo.gl/szEauh
Stay Connected to O'Reilly Media by Email - http://goo.gl/YZSWbO
Follow O'Reilly Media:
http://plus.google.com/+oreillymedia
https://www.facebook.com/OReilly
https://twitter.com/OReillyMedia

Views: 53034
O'Reilly

Notation (number theory)
To get certificate subscribe: https://www.coursera.org/learn/crypto
========================
Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWYosqucluZghEVjUkopdD1e
========================
About this course: Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.

Views: 1625
intrigano

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

Views: 944
Udacity

English Version Link - https://www.youtube.com/watch?v=wD8QYQ3-dwY
Is video me log ko jaldi ya sabse tez solve kaise solve kare jaise sawalo ka jawab hai.
If you liked the content do subscribe to get latest notifications.
For more interesting stuff other than normal ones, make sure
You like our Facebook Page - http://fb.com/AshutoshAndAnurag
Follow on Instagram - http://instagram.com/AshutoshAndAnurag
And Twitter - http://twitter.com/AshutoshNAnurag
Connect with Anurag :-
Facebook - http://fb.com/GambeGB
Instagram - http://instagram.com/GameBehemoth
Twitter - http://twitter.com/GambeGB
Youtube - https://www.youtube.com/channel/UCVqgV8-SQcbcX-9kbsl0H4A
Connect with Ashutosh :-
Instagram - http://instagram.com/ashutosh.trip
Youtube - https://www.youtube.com/channel/UCXmfuLUgMoP71KtGFS76c0g
About Logarithm :-
In mathematics, the logarithm is the inverse operation to exponentiation. That means the logarithm of a number is the exponent to which another fixed number, the base, must be raised to produce that number. In simple cases the logarithm counts factors in multiplication. For example, the base 10 logarithm of 1000 is 3, as 10 to the power 3 is 1000 (1000 = 10 × 10 × 10 = 103); 10 is used as a factor three times. More generally, exponentiation allows any positive real number to be raised to any real power, always producing a positive result, so the logarithm can be calculated for any two positive real numbers b and x where b is not equal to 1. The logarithm of x to base b, denoted logb(x), is the unique real number y such that by = x. For example, log2(64) = 6, as 64 = 26.
The logarithm to base 10 (that is b = 10) is called the common logarithm and has many applications in science and engineering. The natural logarithm has the number e (≈ 2.718) as its base; its use is widespread in mathematics and physics, because of its simpler derivative. The binary logarithm uses base 2 (that is b = 2) and is commonly used in computer science.
Logarithms were introduced by John Napier in the early 17th century as a means to simplify calculations. They were rapidly adopted by navigators, scientists, engineers, and others to perform computations more easily, using slide rules and logarithm tables. Tedious multi-digit multiplication steps can be replaced by table look-ups and simpler addition because of the fact—important in its own right—that the logarithm of a product is the sum of the logarithms of the factors:
log b ( x y ) = log b ( x ) + log b ( y ) , {\displaystyle \log _{b}(xy)=\log _{b}(x)+\log _{b}(y),\,}
provided that b, x and y are all positive and b ≠ 1. The present-day notion of logarithms comes from Leonhard Euler, who connected them to the exponential function in the 18th century.
Logarithmic scales reduce wide-ranging quantities to tiny scopes. For example, the decibel is a unit quantifying signal power log-ratios and amplitude log-ratios (of which sound pressure is a common example). In chemistry, pH is a logarithmic measure for the acidity of an aqueous solution. Logarithms are commonplace in scientific formulae, and in measurements of the complexity of algorithms and of geometric objects called fractals. They describe musical intervals, appear in formulas counting prime numbers, inform some models in psychophysics, and can aid in forensic accounting.
In the same way as the logarithm reverses exponentiation, the complex logarithm is the inverse function of the exponential function applied to complex numbers. The discrete logarithm is another variant; it has uses in public-key cryptography.

Views: 88666
Ashutosh and Anurag