Understanding RSA: The Foundation of Modern Asymmetric Cryptography π
Dive into the essentials of cryptology with our in-depth look at RSA, the cornerstone of modern asymmetric encryption. Perfect for learners and enthusiasts alike!

Cryptography for Everybody
5.2K views β’ May 29, 2020

About this video
#cryptology, #cryptography, #cryptanalysis, #lecture, #course, #tutorial
In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).
This video here gives an introduction to modern asymmetric cryptography. We discuss the RSA (Rivest, Shamir, and Adleman) cipher. First, we give a short introduction of asymmetric cryptography, which was first described by Diffie and Hellman. Then, we describe in detail how the RSA algorithm works. We first show how the key generation of public and private keys work. Then, we show how to encrypt and decrypt (and sign) with the generated keys. After that, we show the homomorphic property of RSA and use it for an attack. Then, we show how to generate keys and how to encrypt and decrypt using RSA in CrypTool 2. Finally, we show an attack on RSA implemented in CrypTool 2 which is based on shared primes in RSA keys.
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads Like what I do π? Help fuel my crypto obsession π β buy me a coffee hereββ thx: https://buymeacoffee.com/cryptographyforeverybody
In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).
This video here gives an introduction to modern asymmetric cryptography. We discuss the RSA (Rivest, Shamir, and Adleman) cipher. First, we give a short introduction of asymmetric cryptography, which was first described by Diffie and Hellman. Then, we describe in detail how the RSA algorithm works. We first show how the key generation of public and private keys work. Then, we show how to encrypt and decrypt (and sign) with the generated keys. After that, we show the homomorphic property of RSA and use it for an attack. Then, we show how to generate keys and how to encrypt and decrypt using RSA in CrypTool 2. Finally, we show an attack on RSA implemented in CrypTool 2 which is based on shared primes in RSA keys.
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads Like what I do π? Help fuel my crypto obsession π β buy me a coffee hereββ thx: https://buymeacoffee.com/cryptographyforeverybody
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
5.2K
Likes
76
Duration
31:52
Published
May 29, 2020
User Reviews
4.5
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.