Chinese Remainder Theorem - Number Theory and Cryptography
Link to this course: https://click.linksynergy.com/deeplink?id=Gw/ETjJoU9M&mid=40328&murl=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fnumber-theory-cryptography...
đĽ Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸¨'.
About this video
Link to this course:
https://click.linksynergy.com/deeplink?id=Gw/ETjJoU9M&mid=40328&murl=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fnumber-theory-cryptography
Chinese Remainder Theorem - Number Theory and Cryptography
Introduction to Discrete Mathematics for Computer Science Specialization
We all learn numbers from the childhood. Some of us like to count, others hate it, but any person uses numbers everyday to buy things, pay for services, estimated time and necessary resources. People have been wondering about numbersâ properties for thousands of years. And for thousands of years it was more or less just a game that was only interesting for pure mathematicians. Famous 20th century mathematician G.H. Hardy once said âThe Theory of Numbers has always been regarded as one of the most obviously useless branches of Pure Mathematicsâ. Just 30 years after his death, an algorithm for encryption of secret messages was developed using achievements of number theory. It was called RSA after the names of its authors, and its implementation is probably the most frequently used computer program in the word nowadays. Without it, nobody would be able to make secure payments over the internet, or even log in securely to e-mail and other personal services. In this short course, we will make the whole journey from the foundation to RSA in 4 weeks. By the end, you will be able to apply the basics of the number theory to encrypt and decrypt messages, and to break the code if one applies RSA carelessly. You will even pass a cryptographic quest!
As prerequisites we assume only basic math (e.g., we expect you to know what is a square or how to add fractions), basic programming in python (functions, loops, recursion), common sense and curiosity. Our intended audience are all people that work or plan to work in IT, starting from motivated high school students.
Do you have technical problems? Write to us: coursera@hse.ru
Number Theory, Cryptography, Modular Exponentiation
I cant think of any other best way of presenting cryptography to beginners. Everything presented in the course has some connection to cryptography, really enjoyed RSA quest.,A good course for people who have no basic background in number theory , explicit clear explanation in RSA algorithm. Overall,a good introduction course.
Cryptography studies ways to share secrets securely, so that even eavesdroppers can't extract any information from what they hear or network traffic they intercept. One of the most popular cryptographic algorithms called RSA is based on unique integer factorization, Chinese Remainder Theorem and fast modular exponentiation. In this module, we are going to study these properties and algorithms which are the building blocks for RSA. In the next module we will use these building blocks to implement RSA and also to implement some clever attacks against RSA and decypher some secret codes.
Chinese Remainder Theorem - Number Theory and Cryptography
Copyright Disclaimer under Section 107 of the copyright act 1976, allowance is made for fair use for purposes such as criticism, comment, news reporting, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favour of fair use.
Video Information
Views
23
Total views since publication
Duration
7:34
Video length
Published
Nov 6, 2020
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#chinese remainder theorem #number theory #chinese remainder theorem example #chinese remainder theorem in cryptography #chinese remainder theorem number theory #chinese remainder theorem in number theory #cryptography and network security #chinese remainder #chinese remainder theorem proof #chinese remainder theorem with example #number theory (chinese remainder theorem)
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.