How Are Prime Numbers Used In Cryptography?
Prime numbers are commonly referred to as the “atoms” of the numerical realm, for they are the fundamental, indivisible units that make up every number. For ...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Turkey under the topic 'prime video'.
About this video
Prime numbers are commonly referred to as the “atoms” of the numerical realm, for they are the fundamental, indivisible units that make up every number. For instance, 10 can be written as a product of 2 and 5, two prime numbers. Or, 150 as a product of 15 and 10, which can be further broken down and written as the product of 3, 5, 2 and 5 – all prime numbers. Or a larger number such as 126, 356, which is composed of larger prime numbers 2,2,31, and 1019.
This process of reducing a composite number to a product of prime numbers is known as prime factorization. For a computer, multiplying two prime numbers, each even 100 digits long, isn’t that difficult; however, factoring the product back into its components is notoriously difficult, even for supercomputers. For this very reason, prime numbers are used in cryptography.
It is difficult to find the prime factors of a composite number without knowing the factors to begin with. This makes it difficult for someone to intercept a message and read it without the proper key.
#primenumbers #factorization #cryptography
Stock Video Source: elements.envato.com , pexels.com , pixabay.com, freepik.com
Stock Image Source: elements.envato.com , pexels.com , pixabay.com, freepik.com, Wikimedia Commons
Stock Music Source: elements.envato.com
References:
https://math.berkeley.edu/~kpmann/encryption.pdf
https://cryptofundamentals.com/primes
Original Article Link:
https://www.scienceabc.com/innovation/how-are-prime-numbers-used-in-cryptography.html
If you wish to buy/license this video, please write to us at admin@scienceabc.com.
Voice Over Artist: John Staughton ( https://www.fiverr.com/jswildwood )
SUBSCRIBE to get more such science videos!
https://www.youtube.com/channel/UCnI0aFeBzWBiiXiHp56kaqQ?sub_confirmation=1
Follow us on Twitter!
https://twitter.com/abc_science
Follow us on Facebook!
https://facebook.com/sciabc
Follow our Website!
https://www.scienceabc.com
Video Information
Views
7.5K
Total views since publication
Likes
144
User likes and reactions
Duration
3:27
Video length
Published
Aug 20, 2024
Release date
Quality
hd
Video definition
Captions
Available
Subtitles enabled
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#prime numbers in cryptography #use of prime numbers in coding and decoding of messages #cryptography prime numbers #why are prime numbers important in cryptography #prime number encryption #how are prime numbers used in cryptography #prime numbers cryptography #prime numbers encryption #how are prime numbers used in encryption #Fermat’s Last Theorem #factorization #trapdoor #public key #prime numbers and composite numbers #prime numbers and prime factorization #rsa encryption
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.