How does public key cryptography work – Gary explains
AndroidAuthority,Android,Gary Explains,Cryptography,Public Key,Encryption
How keys are distributed is vital to any encryption system. Find out how to do it with the Diffie–Hellman key exchange and using public-key cryptography. Find out more:
Download the AndroidAuthority App:
Subscribe to our YouTube channel:
—————————————————-
Stay connected to Android Authority:
-
-
-
-
—
Follow the Team:
Josh Vergara:
Joe Hindy:
Lanh Nguyen:
Jayce Broda:
Gary Sims:
Kris Carlon:
Nirave Gondhia:
John Velasco:
Bailey Stein:
#public #key #cryptography #work #Gary #explains
I recommend erictoolls on instagram or whatsapp *16572076574 to you all to help you out cause he finds solution to every of my problems.
erictoolls on instagram or whatsapp *16572076574 turns my non spendable btc into spendable. Now I’ve got a lot of btc. Thanks eric
This is, without any doubt, the best explanation video on YouTube on this subject. Thanks a lot.
When he said: “Here comes the magic”. It truly was a magic, cause I didn’t have clue how he did it!? 🙂
Great Video and the content! It took me 2 attempts to unterstand everything, and when someone asked to explain how Public and private key concept work I was stuck.
My answer was: “check it on YouTube, then we can talk about it“
Thanks for the video!!!!!!!!!!!
Brilliant explanation. 👍👍👍
Great video
Business Opportunity in Ruvol
I have invented a Board Game [still unpublished and not yet out in the market] that I believe is guaranteed to be as challenging and exciting as CHESS. I called it “RUVOL.”
It is my hope that one day Ruvol may surpass chess as the “Number One Board Game in the World.”
The weakness of chess is it always starts in fixed positions that the opening moves become “memorizable.” In fact, not a few have so mastered the moves that they can play against their opponents “blindfolded.” It is for this very reason that the great Bobby Fischer introduced his so-called “Fischer Random Chess,” where the starting position of the pieces is “randomized” to make the memorization of openings impracticable. Fortunately, it is also for this reason that I invented Ruvol where “every game” has been calculated to be a challenging one to play.
HOW IS RUVOL PLAYED and HOW YOU CAN MONETIZE IT?
I detailed everything in my YouTube video. Here is the link: https://www.youtube.com/watch?v=jcqth0m3-R0
BIG MONEY POTENTIAL IN RUVOL!
It is worthwhile to note that the people who play chess will be the same people who will play Ruvol. In my Google search, I learned there are around 800 million chess players in the world. Even just a small percentage of these 800 million is good enough to earn big money from Ruvol either as an ONLINE GAME BUSINESS or as a PHYSICAL PRODUCT DISTRIBUTOR.
You may contact me at: rodolfovitangcol@gmail.com.
Thanks and God bless!
RODOLFO MARTIN VITANGCOL
The Ruvol Inventor
After 2 minutes after I leaned RSA I got the private key from the public key using alexa
Need a video on Digital Signatures.
good video. thanks.
Good job mate
what are some common use cases for this kind of cryptography? Is Diffie-Hellman the most widely used by all encryption applications?
Amazing explanation!. s the document with the detailed explanation still available somewhere? the link in the description unfortunately doesn’t work (anymore).
Why is 7d x mod [(p‑1) (q‑1)] = 1 ===> like where did this come from?
Please help me
Ok what i’m still tripping on (Using Alice and Bob in my example) — I get that Bob’s public and private key are mathematically linked. However if Alice is across the globe how is her public and private linked to Bob. So as I understand it, Bob will use his public key to encrypt a message and send to Alice which she uses her private key to decrypt. OK i’m fine with that. But how is Alices private key linked to Bobs key? If Bob wants to send another msg, say to Tom — again he uses his public key to encrypt. Tom uses his private to decrypt — how is Tom’s key linked? I’m missing something super basic here. Any help appreciated
Outstanding on public-key .…thank you much!
wrrr
4:25 ELECTROBOOM vibes here
How Alice Bob communicated Y^X(mod)P with each other, what if the eve got to know about this?
It all started with Alice and Bob and their need of secret messaging
Daaaamn ‚The best explaination i ever seen for RSA , thankss
I was searching for 4 days to find such a clear video like yours.…..!!!! thank you…!!!😊👍
I think you have a natural talent…!!!👍👍👍👍👍
This video is amazing. Thank you so much for your work!
Really great explanation thank you !
why most youtubers could not make a pratical example about how public key and private works.…they have many computers and they could not explain this praticaly not only words words words
Best explanation I have ever found. Thanks so much!
Did anyone elses brain just about implode before they worked out he did 13^247 the wrong way round? I kept getting a result of 1 thinking I was tripping or something and just started flipping things round till I got the relieving result of 13…
very nice approved
Thank you Gary for dumbing it down. Very informative.
What if he sends a string of multiple words, not just 1 letter?
i understand a lot of concepts in only 15 min… after 5 years 🙂
7:30 I’m convinced this must be black magic. There’s no way this makes any logical sense.
How did they both get the same number?!
Edit: Okay. I replaced everything with variables, and it maybe kinda sorta works? But my math isn’t strong enough to actually have a satisfying conclusion.
Edit2: Okay. I stared at it for another 30 minutes, and it makes sense now.
Assuming Alice’s key is A, and Bob’s key is B:
7^amod13 = x
7^bmod13 = y
An eavesdropper will know x and y.
(7^amod13)^ bmod13 = (7^bmod13)^amod13
Or, simplified down a bit:
f = amod13
g = bmod13
(7^f)^g = (7^g)^f
So they’re guaranteed to get the same number.
Whereas an eavesdropper is holding 7^amod13 and 7^bmod13, but he doesn’t have amod13 bmod13, and calculating it is extremely computationally expensive (He’s trying to find primes) so he can’t run through the equation himself, and therefore can’t calculate their shared secret of 7^f^g.
wtf, this had no business being so well explained and suitable for academic consumption. Great job!
Question pls the number e=7 and d=247 are those const? are there some special selections of e and d? dependencia in de message or primer number?
@12:04 If I was Eve, I could see a) the agreed formula M^E(MOD N), b) Alice’s key ( N — 323), c) the agreed E value (E — 7) and, d) what Bob is sending (13). Therefore I know 2 of 3 “unknowns” and can solve for it. Am I missing something??
I’ve seen other videos that explain it but don’t explain the part about prime numbers. This is so much better.