Uncover the Mystery: Why This Video Isn't Encrypted with RSA 🔐
Discover the fascinating reasons behind why this video isn't protected with RSA encryption. Join us for an engaging exploration of cryptography and active problem-solving! Support PBS and enhance your understanding of tech mysteries.

PBS Infinite Series
76.1K views • Dec 15, 2017

About this video
Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi
Learn through active problem-solving at Brilliant: https://brilliant.org/InfiniteSeries/
Last episode we discussed Symmetric cryptography https://www.youtube.com/watch?v=NOs34_-eREk Here we break down Asymmetric crypto and more.
Tweet at us! @pbsinfinite
Facebook: facebook.com/pbsinfinite series
Email us! pbsinfiniteseries [at] gmail [dot] com
Previous Episode
(Almost) Unbreakable Crypto | Infinite Series
https://www.youtube.com/watch?v=NOs34_-eREk
How To Break Cryptography
https://www.youtube.com/watch?v=12Q3Mrh03Gk&list=PLa6IE8XPP_gnot4uwqn7BeRJoZcaEsG1D&index=2
Last time, we discussed symmetric encryption protocols, which rely on a user-supplied number called "the key" to drive an algorithm that scrambles messages. Since anything encrypted with a given key can only be decrypted with the same key, Alice and Bob can exchange secure messages once they agree on a key. But what if Alice and Bob are strangers who can only communicate over a channel monitored by eavesdroppers like Eve? How do they agree on a secret key in the first place?
Written and Hosted by Gabe Perez-Giz
Produced by Rusty Ward
Graphics by Ray Lux
Assistant Editing and Sound Design by Mike Petrow and Meah Denee Barrington
Made by Kornhaber Brown (www.kornhaberbrown.com)
Thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level!
And thanks to Nicholas Rose and Mauricio Pacheco who are supporting us at the Lemma level!
Learn through active problem-solving at Brilliant: https://brilliant.org/InfiniteSeries/
Last episode we discussed Symmetric cryptography https://www.youtube.com/watch?v=NOs34_-eREk Here we break down Asymmetric crypto and more.
Tweet at us! @pbsinfinite
Facebook: facebook.com/pbsinfinite series
Email us! pbsinfiniteseries [at] gmail [dot] com
Previous Episode
(Almost) Unbreakable Crypto | Infinite Series
https://www.youtube.com/watch?v=NOs34_-eREk
How To Break Cryptography
https://www.youtube.com/watch?v=12Q3Mrh03Gk&list=PLa6IE8XPP_gnot4uwqn7BeRJoZcaEsG1D&index=2
Last time, we discussed symmetric encryption protocols, which rely on a user-supplied number called "the key" to drive an algorithm that scrambles messages. Since anything encrypted with a given key can only be decrypted with the same key, Alice and Bob can exchange secure messages once they agree on a key. But what if Alice and Bob are strangers who can only communicate over a channel monitored by eavesdroppers like Eve? How do they agree on a secret key in the first place?
Written and Hosted by Gabe Perez-Giz
Produced by Rusty Ward
Graphics by Ray Lux
Assistant Editing and Sound Design by Mike Petrow and Meah Denee Barrington
Made by Kornhaber Brown (www.kornhaberbrown.com)
Thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level!
And thanks to Nicholas Rose and Mauricio Pacheco who are supporting us at the Lemma level!
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
76.1K
Likes
3.2K
Duration
9:48
Published
Dec 15, 2017
User Reviews
4.7
(15) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.