1 00:00:00,000 --> 00:00:02,000 [Powered by Google Translate] [RSA] 2 00:00:02,000 --> 00:00:04,000 [Rob Bowden] [Tommy MacWilliam] [Harvard University] 3 00:00:04,000 --> 00:00:07,000 [Hoc est CS50.] [CS50.TV] 4 00:00:07,000 --> 00:00:11,000 Lets 'take a inviso RSA, a late algorithm pro encrypting notitia. 5 00:00:11,000 --> 00:00:16,000 Encryption algorithms similem quoque Caesari et Vigenère cyphris non sunt multum securus. 6 00:00:16,000 --> 00:00:20,000 Cum Caesare notas invasorem solummodo indiget ut tentaret XXV diversis claves 7 00:00:20,000 --> 00:00:22,000 ad adepto nuntius velit aequoris text. 8 00:00:22,000 --> 00:00:25,000 Dum Vigenère cyphra tutior est Caesaris cyphra 9 00:00:25,000 --> 00:00:28,000 propter majores search spatium claves, semel invasorem 10 00:00:28,000 --> 00:00:30,000 Vigenère clavem scienti longum notas 11 00:00:30,000 --> 00:00:34,000 determinari poterunt via analysi exemplaria in encrypted text, 12 00:00:34,000 --> 00:00:38,000 in Vigenère cyphra non est quod multo magis tutis quam Caesar cyphra. 13 00:00:38,000 --> 00:00:42,000 RSA e manibus arma non sic vulnerari. 14 00:00:42,000 --> 00:00:45,000 Caesar cyphra et Vigenère cyphra utor idem eadem idem key 15 00:00:45,000 --> 00:00:47,000 ad utrumque encrypt quod minutum nuntium. 16 00:00:47,000 --> 00:00:51,000 Hanc proprietatem efficit ut hae cyphris symmetrica key algorithms. 17 00:00:51,000 --> 00:00:54,000 A fundamentalis forsit per symmetrica key algorithms 18 00:00:54,000 --> 00:00:57,000 est quod illi inniti unum encrypting et mittens nuntiante 19 00:00:57,000 --> 00:00:59,000 et recipientis et decrypting nuntiante 20 00:00:59,000 --> 00:01:03,000 ad iam consenserint upfront in key erunt utrumque utor. 21 00:01:03,000 --> 00:01:06,000 Hic satus ad propositum nobis est pauca. 22 00:01:06,000 --> 00:01:10,000 Quam operor II computers quod egestas communicare constituere secretum key inter eos? 23 00:01:10,000 --> 00:01:16,000 Si occultum sit amet, tunc requiritur ad minutum encrypt amet. 24 00:01:16,000 --> 00:01:18,000 Si omnes have est symmetrica key cryptography 25 00:01:18,000 --> 00:01:21,000 tunc redibit eadem quaestio nuper. 26 00:01:21,000 --> 00:01:25,000 RSA e contrario duo usus clavium 27 00:01:25,000 --> 00:01:28,000 unum pro encryption et alterum pro decryption. 28 00:01:28,000 --> 00:01:32,000 Dicitur amet publicum et privatum illud clavis. 29 00:01:32,000 --> 00:01:34,000 Publicum key est adsuesco assuesco encrypt nuntiandi. 30 00:01:34,000 --> 00:01:38,000 Sicut vos vires coniicere per nomen eius, possumus nostrum publica key cum 31 00:01:38,000 --> 00:01:43,000 quis nos volo sine conponendi securitatem of an encrypted nuntius. 32 00:01:43,000 --> 00:01:45,000 Messages encrypted usura a publicis key 33 00:01:45,000 --> 00:01:49,000 potest nisi decrypted cum suum correspondens privata key. 34 00:01:49,000 --> 00:01:53,000 Dum vos potest particeps tuis quas publice key, esses semper custodiat privatum tuum key occulto. 61 00:01:55,000 --> 00:01:58,000 et de solo privato key potest dici quod minutum perferentes 62 00:01:58,000 --> 00:02:02,000 si II users volo ut nuntia mittere encrypted cum RSA 63 00:02:02,000 --> 00:02:07,000 Suspendisse eget citroque habent, et publice et privatim amet par. 64 00:02:07,000 --> 00:02:10,000 Nuntiis ex user I usorum II 65 00:02:10,000 --> 00:02:15,000 tantum utor user II scriptor key coniugatione, et nuntiis ex user II usorum I 66 00:02:15,000 --> 00:02:17,000 tantum utor user I scriptor key coniugatione. 67 00:02:17,000 --> 00:02:21,000 Hoc quod sunt II separata claves encrypt quod minutum perferentes 68 00:02:21,000 --> 00:02:24,000 facit RSA an asymmetric key algorithm. 69 00:02:24,000 --> 00:02:28,000 Non amet ut in publicum emittat encrypt alium computatrum 70 00:02:28,000 --> 00:02:31,000 cum key est publicum usquam. 71 00:02:31,000 --> 00:02:33,000 Is opes ut RSA non habent idem satus forsit 72 00:02:33,000 --> 00:02:36,000 sicut symmetrica key algorithms. 73 00:02:36,000 --> 00:02:39,000 Ita si volo mittam nuncium usura RSA encryption 74 00:02:39,000 --> 00:02:42,000 ad expoliandum, Peius primus postulo Rob scriptor publicus key. 75 00:02:42,000 --> 00:02:47,000 Generare par claves, Rob indiget pick II magna numeros primos. 76 00:02:47,000 --> 00:02:50,000 In utroque publicis privatisque sit amet hae claves, 77 00:02:50,000 --> 00:02:54,000 sed publicam key mos tantum uti productum horum II numeris, 78 00:02:54,000 --> 00:02:56,000 multitudo, non se ipsos. 79 00:02:56,000 --> 00:02:59,000 Quondam Ive 'encrypted nuntiante usura Rob scriptor publicus key 80 00:02:59,000 --> 00:03:01,000 Mitte ad me Rob. 81 00:03:01,000 --> 00:03:05,000 Enim computer, factoring numeris Durus est forsit. 82 00:03:05,000 --> 00:03:09,000 Publicum key, memini, usus est productum ex II numeros primos. 83 00:03:09,000 --> 00:03:12,000 Is uber tunc oportet habent solum II factores, 84 00:03:12,000 --> 00:03:16,000 qui numeri efficiunt in occulto fiunt amet. 85 00:03:16,000 --> 00:03:20,000 In ordine ad minutum nuntio, RSA mos utor hac privata key 86 00:03:20,000 --> 00:03:25,000 vel producendo in publicum amet numeri inter se multiplicati. 87 00:03:25,000 --> 00:03:28,000 Quoniam suus 'computationally difficile PROCURATOR numerum 88 00:03:28,000 --> 00:03:32,000 usus est in publico key in II numeris usus est in privata key 89 00:03:32,000 --> 00:03:36,000 suus 'enim difficile invasorem ut instar sicco privata key 90 00:03:36,000 --> 00:03:39,000 oportet quod verbum minutum. 91 00:03:39,000 --> 00:03:43,000 Nunc eamus in aliquam gradu inferiore retineo of RSA. 92 00:03:43,000 --> 00:03:46,000 Primum videamus quomodo duo sint claves generare. 93 00:03:46,000 --> 00:03:49,000 Primo, puteus 'postulo II numeros primos. 94 00:03:49,000 --> 00:03:52,000 Puteus 'haec vocare II numeri p et q. 95 00:03:52,000 --> 00:03:56,000 In ordine ad pick p et q, in praxi volumus pseudorandomly generare 96 00:03:56,000 --> 00:03:59,000 turn multa an determinetur amet 97 00:03:59,000 --> 00:04:02,000 isti sunt numeri forsit primus. 98 00:04:02,000 --> 00:04:05,000 Nos custodire potest generandi temere numerorum super super iterum 99 00:04:05,000 --> 00:04:08,000 donec habemus II primorum uti possumus. 100 00:04:08,000 --> 00:04:15,000 Hic lets pick p = XXIII et q = XLIII. 101 00:04:15,000 --> 00:04:19,000 Memento opere multum PQ plures. 102 00:04:19,000 --> 00:04:22,000 Quantum scimus, quo maior numerus maior est 103 00:04:22,000 --> 00:04:25,000 crack an encrypted nuntius. 104 00:04:25,000 --> 00:04:29,000 Tamen suus 'quoque magis cari encrypt quod minutum nuntiandi. 105 00:04:29,000 --> 00:04:33,000 Hodie suus 'saepe commendatur ut p et q sunt saltem MXXIV addit frena 106 00:04:33,000 --> 00:04:37,000 quae ponit quisque numerus ad super CCC decimales constet. 107 00:04:37,000 --> 00:04:40,000 Sed puteus 'pick haec parua numeri pro isto exemplo. 108 00:04:40,000 --> 00:04:43,000 Iam puteus multiplicabo p et q pariter ad adepto a 3 numero, 109 00:04:43,000 --> 00:04:45,000 quod puteus 'vocare n. 110 00:04:45,000 --> 00:04:55,000 In nostro casu, n = XXIII * XLIII, quae = CMLXXXIX. 111 00:04:55,000 --> 00:04:58,000 Sumus N = CMLXXXIX. 112 00:04:58,000 --> 00:05:02,000 Next puteus 'multiplicabo p - I cum q - I 113 00:05:02,000 --> 00:05:05,000 ad obtinendam 4 numerus, quod puteus 'vocare m. 114 00:05:05,000 --> 00:05:15,000 In nostro casu, m = XXII * XLII, quae = CMXXIV. 115 00:05:15,000 --> 00:05:18,000 Habemus m = CMXXIV. 116 00:05:18,000 --> 00:05:22,000 E numero primus est secundum quod iam opust m 117 00:05:22,000 --> 00:05:25,000 et minus quam m. 118 00:05:25,000 --> 00:05:28,000 Duo numeri inter se primi sunt aut coprime 119 00:05:28,000 --> 00:05:33,000 sed si utrumque aequaliter divisa est I numerus integer positivus. 120 00:05:33,000 --> 00:05:37,000 Id est, m divisor communis maximus est e, 121 00:05:37,000 --> 00:05:39,000 oportet esse I. 122 00:05:39,000 --> 00:05:44,000 In praxi, suus 'communi pro e ad esse numerum primum (LXV)DXXXVII 123 00:05:44,000 --> 00:05:48,000 numerum non habet esse quamdiu ipsius M. 124 00:05:48,000 --> 00:05:53,000 Enim nostra claves, puteus 'pick e = V 125 00:05:53,000 --> 00:05:57,000 quia V est respective primi CMXXIV. 126 00:05:57,000 --> 00:06:01,000 Denique una numero opust quas feres d. 127 00:06:01,000 --> 00:06:11,000 D oportet esse aliquam valoris satiat aequatio de = I (mod m). 128 00:06:11,000 --> 00:06:17,000 Hoc mod m significat puteus 'uti aliquo vocavit modularis arithmetica. 129 00:06:17,000 --> 00:06:21,000 In modularis arithmetica, semel numerus gets altior quam quidam superiorem ligatus 130 00:06:21,000 --> 00:06:24,000 is mos involvent se circa 0. 131 00:06:24,000 --> 00:06:27,000 A horologium, pro exemplo, utitur modularis arithmetica. 132 00:06:27,000 --> 00:06:31,000 Uno minuto post 1:59, verbigratia, est 2:00, 133 00:06:31,000 --> 00:06:33,000 non 1:60. 134 00:06:33,000 --> 00:06:36,000 Minute manus circumfusa ad 0 135 00:06:36,000 --> 00:06:39,000 super pertingens superiori tenetur ex LX. 136 00:06:39,000 --> 00:06:46,000 Sic, possumus dicere LX aequivalens sit 0 (mod LX) 137 00:06:46,000 --> 00:06:57,000 et CXXV aequivalens sit LXV aequivalens sit V (mod LX). 138 00:06:57,000 --> 00:07:02,000 Publicæ key erit par e et n 139 00:07:02,000 --> 00:07:09,000 Vbi hic igitur e est V et n CMLXXXIX. 140 00:07:09,000 --> 00:07:15,000 Privatam, key erit par d et n, 141 00:07:15,000 --> 00:07:22,000 quae in nostro casu CLXXXV et CMLXXXIX. 142 00:07:22,000 --> 00:07:25,000 PQ primis animadvertimus origo non apparet 143 00:07:25,000 --> 00:07:29,000 usquam in nostris priuatis seu publicis claves. 144 00:07:29,000 --> 00:07:33,000 Claves autem duo nobis est, quomodo est inspice encrypt 145 00:07:33,000 --> 00:07:36,000 quod minutum nuntium. 146 00:07:36,000 --> 00:07:38,000 Praereptam velim mittite, 147 00:07:38,000 --> 00:07:42,000 par erit, ut hac clave generare. 148 00:07:42,000 --> 00:07:46,000 Tum ego inquies Rob públice key, quae utar 149 00:07:46,000 --> 00:07:48,000 ad encrypt nuntium mittere ad eum. 150 00:07:48,000 --> 00:07:53,000 Recordare, suus 'totaliter okay pro Rob consortem publica key mecum. 151 00:07:53,000 --> 00:07:56,000 Sed non esset esse okay consortem privata key. 152 00:07:56,000 --> 00:08:00,000 Non est clave uti quales. 153 00:08:00,000 --> 00:08:03,000 Nos irritum fieri potest auditui nostro m in plura chunks 154 00:08:03,000 --> 00:08:07,000 minoris omnes n et tunc encrypt singulis illis chunks. 155 00:08:07,000 --> 00:08:12,000 Puteus 'encrypt chorda CS50, quae nos irritum fieri potest ascendit in IV chunks, 156 00:08:12,000 --> 00:08:14,000 unum per litteras. 157 00:08:14,000 --> 00:08:17,000 In ordine ad encrypt mandatique mei, ego puteus 'postulo ut convertam eam in 158 00:08:17,000 --> 00:08:20,000 aliquod genus, numericae repraesentatione. 159 00:08:20,000 --> 00:08:25,000 Lets IUNCTUS in ASCII in valoribus characteres in verba mea. 160 00:08:25,000 --> 00:08:28,000 In ordine ad encrypt data nuntius m 161 00:08:28,000 --> 00:08:37,000 Ego puteus 'postulo ut supputant c = m ad e (mod n). 162 00:08:37,000 --> 00:08:40,000 Sed m ​​minor esse debet quam n, 163 00:08:40,000 --> 00:08:45,000 n modulo vel inenarrabilia verba. 164 00:08:45,000 --> 00:08:49,000 Chunks m solvere potest in plura, quae minores quam n, 165 00:08:49,000 --> 00:08:52,000 et encrypt singulis illis chunks. 166 00:08:52,000 --> 00:09:03,000 Encrypting de his singulis chunks, exurgit C1 = LXVII ad V (mod CMLXXXIX) 167 00:09:03,000 --> 00:09:06,000 quo fit = DCLVIII. 168 00:09:06,000 --> 00:09:15,000 Enim noster secundus FRUSTUM habemus LXXXIII ad V (mod CMLXXXIX) 169 00:09:15,000 --> 00:09:18,000 quo fit = XV. 170 00:09:18,000 --> 00:09:26,000 Enim nostra tertius FRUSTUM habemus LIII ad V (mod CMLXXXIX) 171 00:09:26,000 --> 00:09:30,000 quo fit = DCCXCIX. 172 00:09:30,000 --> 00:09:39,000 Et ad extremum quia nostram ultimam FRUSTUM habemus XLVIII ad V (mod CMLXXXIX) 173 00:09:39,000 --> 00:09:43,000 quo fit = CMLXXV. 174 00:09:43,000 --> 00:09:48,000 Autem possumus mittere super has encrypted valores Rob. 175 00:09:54,000 --> 00:09:58,000 Hic vos vade, Rob. 176 00:09:58,000 --> 00:10:01,000 Dum nostri nuntius in fuga est, lets accipiamus aliam inviso 177 00:10:01,000 --> 00:10:07,000 ad quam nos accepisti valor pro d. 178 00:10:07,000 --> 00:10:17,000 Numerus noster d opus satisfacere 5D = I (mod CMXXIV). 179 00:10:17,000 --> 00:10:24,000 Hoc facit ut d multiplicative inversa V modulo CMXXIV. 180 00:10:24,000 --> 00:10:28,000 Datum II integri, a et b, prorogati Euclidaeum algorithm 181 00:10:28,000 --> 00:10:33,000 Haec possunt invenire II integri divisorem communem maximum. 182 00:10:33,000 --> 00:10:37,000 II Item dant alios x et y, 183 00:10:37,000 --> 00:10:47,000 ex aequatione ax + satisfacientes divisor communis maximus = a et b. 184 00:10:47,000 --> 00:10:49,000 Quomodo hic adiuves nos? 185 00:10:49,000 --> 00:10:52,000 Bene, plugging in e = V pro 186 00:10:52,000 --> 00:10:56,000 et m = CMXXIV ipsi b 187 00:10:56,000 --> 00:10:59,000 iam scimus quod hi numeri sunt coprime. 188 00:10:59,000 --> 00:11:03,000 I maximus divisor communis est. 189 00:11:03,000 --> 00:11:09,000 Hoc dat nobis 5x + 924y = I 190 00:11:09,000 --> 00:11:17,000 aut 5x = I - 924y. 191 00:11:17,000 --> 00:11:22,000 Sed si nos tantum curant omnia modulo CMXXIV 192 00:11:22,000 --> 00:11:25,000 tunc potest occumbo - 924y. 193 00:11:25,000 --> 00:11:27,000 Cogitare retro ad horologium. 194 00:11:27,000 --> 00:11:31,000 Si scrupula est in I et tunc exacte X horas, 195 00:11:31,000 --> 00:11:35,000 I scrupula adhuc in novimus. 196 00:11:35,000 --> 00:11:39,000 Hic nos satus procul I et tunc CONVELO exacte y temporibus, 197 00:11:39,000 --> 00:11:41,000 at usque apud nos I. 198 00:11:41,000 --> 00:11:49,000 Habemus 5x = I (mod CMXXIV). 199 00:11:49,000 --> 00:11:55,000 Atque hoc idem x d quaerebatur ante 200 00:11:55,000 --> 00:11:58,000 ita si utimur prorogati Euclidaeum algorithm 201 00:11:58,000 --> 00:12:04,000 ut numerus x, sicut utendum est numerus d. 202 00:12:04,000 --> 00:12:07,000 Nunc lets 'currere prorogati Euclidaeum algorithm pro a = V 203 00:12:07,000 --> 00:12:11,000 et b = CMXXIV. 204 00:12:11,000 --> 00:12:14,000 Puteus 'utor a Methodus quam vocant mensam methodo. 205 00:12:14,000 --> 00:12:21,000 Columnas habebit mensam IV, x, y, d, k. 206 00:12:21,000 --> 00:12:23,000 Tabula nostra incipit cum II remigat. 207 00:12:23,000 --> 00:12:28,000 In primo versu erit I, 0, valor noster est V; 208 00:12:28,000 --> 00:12:37,000 et secundi ordinis 0: I, pretium et B, quae CMXXIV. 209 00:12:37,000 --> 00:12:40,000 4 agmen pretium K, fiet 210 00:12:40,000 --> 00:12:45,000 dividendi valor ipsius d in ordine supra eam cum valor ipsius d 211 00:12:45,000 --> 00:12:49,000 in eadem remigant. 212 00:12:49,000 --> 00:12:56,000 Habemus V divisa per CMXXIV est 0 cum aliqua cetera manerent. 213 00:12:56,000 --> 00:12:59,000 Ut opes habemus k = 0. 214 00:12:59,000 --> 00:13:05,000 Cetera erit valor ipsius celle superius versus cellam II 215 00:13:05,000 --> 00:13:09,000 minus valor row supra illud temporibus k. 216 00:13:09,000 --> 00:13:11,000 Lets 'satus per d in 3 remigant. 217 00:13:11,000 --> 00:13:19,000 Habemus V - CMXXIV * 0 = V. 218 00:13:19,000 --> 00:13:25,000 Mox 0 - 0 * 0 I 219 00:13:25,000 --> 00:13:30,000 et I - 0 0 I *. 220 00:13:30,000 --> 00:13:33,000 Non nimis, ita ut nec movere sequentem ordinem instituunt. 221 00:13:33,000 --> 00:13:36,000 Primum quidem nostri valor ipsius k. 222 00:13:36,000 --> 00:13:43,000 CMXXIV divisa per V = CLXXXIV cum aliqua reliquam, 223 00:13:43,000 --> 00:13:46,000 ita noster valor pro k est CLXXXIV. 224 00:13:46,000 --> 00:13:54,000 Nunc CMXXIV - V * CLXXXIV = IV. 225 00:13:54,000 --> 00:14:05,000 I - 0 * CLXXXIV est I - et 0 I * CLXXXIV est -184. 226 00:14:05,000 --> 00:14:07,000 Bene, faciamus sequentem ordinem instituunt. 227 00:14:07,000 --> 00:14:10,000 Nostri valor ipsius k erit I quia 228 00:14:10,000 --> 00:14:15,000 V divisa per IV = I cum aliqua cetera manerent. 229 00:14:15,000 --> 00:14:17,000 Lets replete in altera columns. 230 00:14:17,000 --> 00:14:21,000 V - IV * I = I. 231 00:14:21,000 --> 00:14:25,000 0 - I * I = -1. 232 00:14:25,000 --> 00:14:33,000 Et I - CLXXXIV * I est CLXXXV. 233 00:14:33,000 --> 00:14:35,000 Lorem ipsum dolor sit k deinceps fore. 234 00:14:35,000 --> 00:14:40,000 Bene nobis videtur I IV divisa est IV. 235 00:14:40,000 --> 00:14:43,000 In hoc casu ubi erant 'dividendo per I talis, ut k est equalis 236 00:14:43,000 --> 00:14:50,000 valor ipsius d in supra row pertinet quo 'perfectus cum nostris algorithm. 237 00:14:50,000 --> 00:14:58,000 Et hic potest y = x = -1 in ultima CLXXXV. 238 00:14:58,000 --> 00:15:00,000 Nunc ergo ad propositum nostrum exemplar sit amet. 239 00:15:00,000 --> 00:15:04,000 Dictum est valor ipsius x ex hac cursus algorithm 240 00:15:04,000 --> 00:15:08,000 esset multiplicative inversa a (mod b). 241 00:15:08,000 --> 00:15:15,000 Id est CLXXXV est multiplicative inversa V (mod CMXXIV) 242 00:15:15,000 --> 00:15:20,000 per quae intelligitur quod habemus valorem CLXXXV pro d. 243 00:15:20,000 --> 00:15:23,000 I, quod in ultima d = 244 00:15:23,000 --> 00:15:26,000 certificat e erat coprime ad m. 245 00:15:26,000 --> 00:15:30,000 I ergo si non vult e novo eligo. 246 00:15:30,000 --> 00:15:33,000 Nunc lets 'vide si Rob meam suscepit nuntius. 247 00:15:33,000 --> 00:15:35,000 Quando aliquis mittit mihi encrypted nuntius 248 00:15:35,000 --> 00:15:38,000 quamdiu Ive 'mea custodierit privata key secretum 249 00:15:38,000 --> 00:15:41,000 Curabitur quis minutum unum verbum. 250 00:15:41,000 --> 00:15:46,000 Ad minutum a FRUSTUM c possum calculare originali nuntius 251 00:15:46,000 --> 00:15:53,000 FRUSTUM d aequalis potentiae (mod n). 252 00:15:53,000 --> 00:15:57,000 Memento mei secreta clavem d et n. 253 00:15:57,000 --> 00:16:01,000 Impetro a plenus nuntius a suo chunks nos minutum singulis FRUSTUM 254 00:16:01,000 --> 00:16:04,000 et IUNCTUS praecessi. 255 00:16:04,000 --> 00:16:08,000 Exigo quam tutum est RSA? 256 00:16:08,000 --> 00:16:10,000 Verum sit, nescio. 257 00:16:10,000 --> 00:16:14,000 Quamdiu voluit ex invasore guinem verba crack 258 00:16:14,000 --> 00:16:16,000 encrypted cum RSA. 259 00:16:16,000 --> 00:16:19,000 Accedit ad publicam meminerint amet invasorem, 260 00:16:19,000 --> 00:16:21,000 quae utrumque continet e et n. 261 00:16:21,000 --> 00:16:26,000 Si oppugnator procurat inferre PROCURATOR n in sua II primorum, p et q, 262 00:16:26,000 --> 00:16:30,000 tunc ipsa coniectare poterat d usura prorogati Euclidaeum algorithm. 263 00:16:30,000 --> 00:16:35,000 Hoc dat privata key, quo uti potest ad minutum ulla nuntius. 264 00:16:35,000 --> 00:16:38,000 Sed quam cito possumus PROCURATOR integri? 265 00:16:38,000 --> 00:16:41,000 Deinde nescio. 266 00:16:41,000 --> 00:16:43,000 Nemo invenit ieiunium via faciendi, 267 00:16:43,000 --> 00:16:46,000 per quae intelligitur quod data magna satis n 268 00:16:46,000 --> 00:16:49,000 foret invasorem unrealistically diu 269 00:16:49,000 --> 00:16:51,000 ad PROCURATOR numerum. 270 00:16:51,000 --> 00:16:54,000 Si quis revelavit ieiunium viam factoring integri 271 00:16:54,000 --> 00:16:57,000 RSA esset confringatur. 272 00:16:57,000 --> 00:17:01,000 Sed etiam si integer factorization est inherently tardus 273 00:17:01,000 --> 00:17:04,000 in RSA algorithm adhuc posset habere aliquod vitium in eam 274 00:17:04,000 --> 00:17:07,000 admittit pro securus decryption de nuntiandi. 275 00:17:07,000 --> 00:17:10,000 , Nemo inventa, et revelaverit talia vitium tamen, 276 00:17:10,000 --> 00:17:12,000 non unus, sed non est. 277 00:17:12,000 --> 00:17:17,000 In theoria posset aliquis esse sicco illic legens tota notitia encrypted cum RSA. 278 00:17:17,000 --> 00:17:19,000 Illic 'alius aliquantulus of a intimitatem semen. 279 00:17:19,000 --> 00:17:23,000 Si Tommy encrypts aliquam legationem usura publice, key 280 00:17:23,000 --> 00:17:26,000 et invasorem encrypts eadem man usura publice, key 281 00:17:26,000 --> 00:17:29,000 oppugnator videbit II perferentes sunt identicae 282 00:17:29,000 --> 00:17:32,000 et sic cognoscunt quid Tommy encrypted. 283 00:17:32,000 --> 00:17:36,000 In ordine ad hoc excludendum, perferentes sunt typice padded cum temere bits 284 00:17:36,000 --> 00:17:39,000 antequam encrypted ita quod idem nuntius encrypted 285 00:17:39,000 --> 00:17:44,000 multiple vicis mos vultus diversis quamdiu padding super nuntius est diversa. 286 00:17:44,000 --> 00:17:47,000 Sed memento quomodo habeamus cessitas perferentes in chunks 287 00:17:47,000 --> 00:17:50,000 ita quod quilibet FRUSTUM minor est quam n? 288 00:17:50,000 --> 00:17:52,000 Padding in chunks: quod significet quod habeamus cessitas res sursum 289 00:17:52,000 --> 00:17:57,000 in magis etiam chunks cum padded FRUSTUM minor esse debet, quam n. 290 00:17:57,000 --> 00:18:01,000 Encryption et decryption sunt respective carus cum RSA, 291 00:18:01,000 --> 00:18:05,000 et sic indigens diducere a nuntius in multas chunks potest esse valde veste pretiosa. 292 00:18:05,000 --> 00:18:09,000 Si magna volumen of notitia esse indiget encrypted et decrypted 293 00:18:09,000 --> 00:18:12,000 possumus miscere beneficia symmetrica key algorithms 294 00:18:12,000 --> 00:18:16,000 cum illis de RSA impetro utrumque securitatem et efficientiae. 295 00:18:16,000 --> 00:18:18,000 Ingredi non licet, hic 296 00:18:18,000 --> 00:18:23,000 Aes est symmetrica key algorithm sicut Vigenère et Caesar cyphris 297 00:18:23,000 --> 00:18:25,000 sed multo durius fatiscat. 298 00:18:25,000 --> 00:18:30,000 Nimirum, non possumus uti aes sine constituendum corresponsabilitate abscondito key 299 00:18:30,000 --> 00:18:34,000 inter II systemata, et vidimus forsit per quod ante. 300 00:18:34,000 --> 00:18:40,000 Sed nunc uti possumus RSA ad stabiliendam corresponsabilitate abscondito key inter II ratio. 301 00:18:40,000 --> 00:18:43,000 Puteus 'vocare computer mittens notitia mittentis 302 00:18:43,000 --> 00:18:46,000 et computer suscipiens notitia recipientis. 303 00:18:46,000 --> 00:18:49,000 Accipientis habet RSA key par et mittit 304 00:18:49,000 --> 00:18:51,000 clavis mittitur publica. 305 00:18:51,000 --> 00:18:54,000 Mittentis generat aes key, 306 00:18:54,000 --> 00:18:57,000 encrypts eam cum accipientis est scriptor RSA publica key, 307 00:18:57,000 --> 00:19:00,000 et mittit amet aes recipientis. 308 00:19:00,000 --> 00:19:04,000 Accipientis decrypts nuntiante, cum suo RSA privata key. 309 00:19:04,000 --> 00:19:09,000 Utrumque mittentis et recipientis nunc habent communi aes key inter eos. 310 00:19:09,000 --> 00:19:14,000 Aes, quae est multo velocior in encryption et decryption quam RSA, 311 00:19:14,000 --> 00:19:18,000 Mauris sit amet nunc libros mittere encrypt accipienti magnum, 312 00:19:18,000 --> 00:19:21,000 qui potest minutum usura idem eadem idem key. 313 00:19:21,000 --> 00:19:26,000 Aes, quae est multo velocior in encryption et decryption quam RSA, 314 00:19:26,000 --> 00:19:30,000 Mauris sit amet nunc libros mittere encrypt accipienti magnum, 315 00:19:30,000 --> 00:19:32,000 qui potest minutum usura idem eadem idem key. 316 00:19:32,000 --> 00:19:36,000 Nos iustus opus RSA transferre partita key. 317 00:19:36,000 --> 00:19:40,000 RSA iam non usum fuisse. 318 00:19:40,000 --> 00:19:46,000 Videntur verba teneo. 319 00:19:46,000 --> 00:19:49,000 Quid refert si in charta legerent Vivamus ante incidissent 320 00:19:49,000 --> 00:19:55,000 quia solus non sum de propriae amet. 321 00:19:55,000 --> 00:19:57,000 Lets minutum singulis chunks in auditui. 322 00:19:57,000 --> 00:20:07,000 FRUSTUM primum, DCLVIII, levamus d, quod est CLXXXV, 323 00:20:07,000 --> 00:20:18,000 mod n, CMLXXXIX, erit LXVII, 324 00:20:18,000 --> 00:20:24,000 quae est C littera in ASCII. 325 00:20:24,000 --> 00:20:31,000 Nunc, onto secundo FRUSTUM. 326 00:20:31,000 --> 00:20:35,000 Secundo FRUSTUM valet XV, 327 00:20:35,000 --> 00:20:41,000 quae levamus ad 185th potentia, 328 00:20:41,000 --> 00:20:51,000 mod CMLXXXIX, et hoc est aequalis LXXXIII 329 00:20:51,000 --> 00:20:57,000 quae est litterae S in ASCII. 330 00:20:57,000 --> 00:21:06,000 Jam tertius FRUSTUM, quae habet valorem DCCXCIX, nos suscitábunt CLXXXV, 331 00:21:06,000 --> 00:21:17,000 mod CMLXXXIX, et hoc est aequalis LIII, 332 00:21:17,000 --> 00:21:24,000 V ASCII in qua ratio valet. 333 00:21:24,000 --> 00:21:30,000 Nunc ultimo FRUSTUM, quae habet valorem CMLXXV, 334 00:21:30,000 --> 00:21:41,000 levamus ad CLXXXV, mod CMLXXXIX, 335 00:21:41,000 --> 00:21:51,000 et hoc est aequalis XLVIII, quae est valor character 0 ASCII. 336 00:21:51,000 --> 00:21:57,000 Est nomen meum Rob Bowden, et hoc est CS50. 337 00:21:57,000 --> 00:22:00,000 [CS50.TV] 338 00:22:06,000 --> 00:22:08,000 RSA omnino. 339 00:22:08,000 --> 00:22:14,000 RSA omnino. [Risus] 340 00:22:14,000 --> 00:22:17,000 Omnino.