Unlocking Security: How Discrete Math Powers RSA Encryption π
Discover how discrete mathematics is fundamental to cryptography and the security of online communications, focusing on RSA encryption. Learn the basics in a simple, engaging way!

Komang Adi Ari Jaya Kusuma
19 views β’ Jun 17, 2025

About this video
2IKI ILKOM
Adi: 2415101033
Ila: 2415101064
RSA Encryption, one of the most common methods for sending secret information online. We'll skip the scary, long numbers and use a simple example to show you the core concepts.
In this video, you'll learn:
β How to generate a Public Key (a padlock for anyone to use) and a Private Key (the only key that can open it).
β The step-by-step process of encrypting the message "HI" into a secret code.
β How the private key magically decrypts the code back into the original message.
This is a perfect introduction to cryptography, computer science, and the incredible power of prime numbers!
we will show you (discretely):
The Secret Handshake of the Internet
and the process of RSA
Step 1: Creating Your Public & Private Keys
Step 2: Locking the Message (Encryption)
Step 3: Unlocking the Code (Decryption)
If you enjoyed this explanation, be sure to hit the LIKE button, SUBSCRIBE for more math and tech videos, and share it with a friend!
#RSA #Cryptography #Encryption #HowItWorks #ComputerScience #Security
Adi: 2415101033
Ila: 2415101064
RSA Encryption, one of the most common methods for sending secret information online. We'll skip the scary, long numbers and use a simple example to show you the core concepts.
In this video, you'll learn:
β How to generate a Public Key (a padlock for anyone to use) and a Private Key (the only key that can open it).
β The step-by-step process of encrypting the message "HI" into a secret code.
β How the private key magically decrypts the code back into the original message.
This is a perfect introduction to cryptography, computer science, and the incredible power of prime numbers!
we will show you (discretely):
The Secret Handshake of the Internet
and the process of RSA
Step 1: Creating Your Public & Private Keys
Step 2: Locking the Message (Encryption)
Step 3: Unlocking the Code (Decryption)
If you enjoyed this explanation, be sure to hit the LIKE button, SUBSCRIBE for more math and tech videos, and share it with a friend!
#RSA #Cryptography #Encryption #HowItWorks #ComputerScience #Security
Video Information
Views
19
Duration
5:46
Published
Jun 17, 2025
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.