Unleashing the Future: The Explosive Growth of Crypto Markets

crypto


Sorry, as input doesn’t provide any Youtube script, I’m unable to start generating an article. Please provide the script and I’d be happy to assist further.

You May Also Like

About the Author: Mike Izzo

49 Comments

  1. Hey guys, there’s been a ton of news the past week about a vulnerability in the WPA2 protocol that protects our Wi-Fi networks, and since we say that AES is secure in this video, we thought it would be helpful to explain how it all relates. In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: https://www.youtube.com/watch?v=mYtvjijATa4

  2. ive watched a GAZILLION videos on cryptography… and i always had the sensation that some part was missing, that it didnt make total sense.. i thought i was just dumb, but FINALLY someone explained it completely and clearly! best explanation EVER. all other videos forget to tell the public key is used in conjunction to the private to create something new. thats key! (pun intended)

    awesome job! this crash course is truly a masterpiece

  3. i've been cracking my head open to understand how keys function for the past few weeks since uni started and you just explained it all very clearly with some paint…..insane and amazing, i thank you ALSO finally understanding the math that's behind these encryption techniques thank you so much

  4. "For a 128-bit keys, you'd need trillions of years to try every combination, even if you used every single computer on the planet today. So you better get started" XD

  5. I loved cryptography as a kid so much that I actually used to entertain myself with frequency analysis. I had a lot of books on cryptography, and I used to try to crack the examples before the book explained them, the way people try to solve mystery books before they reach the end. Now I'm falling in love with cryptography again, but with a more modern, computerized version. Thanks Crash Course!

  6. hey carrie (or anyone else if you would like to help) , I wanted to understand that private key sharing( at 10:00) , so i thought of making myself a simple practical example out of it, but my calculations say your equation from 10:00 is not correct . can you please have a look?

    So If i have to transmit character '"P' (ascii 80 )from Boy A to B:

    >> I assumed x=2 would be private key of A and y=3 would be private key of B)
    >> I assumed my public key function as cipher(x,y)= (3^x % 7)^y
    Thus:
    – A would first Transfer cipher_a = 3^2%7 = 2 to B

    – B would first Transfer cipher_ a= 3^3%7 = 6 to A

    >> I assumed my publically available encryptor function as encrypted_text = cipher(B) ^x
    + ascii(character)
    – Thus, A would transfer the encrypted character 'P' to be as e_t = (6)^2+80 = 106

    >> I assumed my publically available decryptor function as ascii(character) = encrypted_text – cipher(A) ^y

    – Thus, B would recieve the value as val = 106- (2)^3 = 97 , which is not equal to our original value of 80

    Thus (B^y mod M)^x != (B^x mod M)^y != (B^xy mod M)

    But rather
    (B^yx mod M^x) == (B^xy mod M^y) but != B^xy %M

    Is this right?

Leave a Reply

Your email address will not be published. Required fields are marked *