Hey man love the vids. I am in engineering school and I love learning about
this stuff. Could it be possible that the solution to the reimann
hypothesis is a "decrypter" for massive prime numbers allowing anyone to
read private information? I can understand from the physics side why the
hypothesis is wanted to be solved but I can't really think of any real
world applications.
+Fizz My first reaction was that there is no link between the Riemann hypothesis (by the way I have a video on that Intro Riemann hypothesis - YouTube ) and factoring huge numbers into its prime divisors. I have spoken with 2 colleagues who do research in the prime number theorem and computational number theory and neither know of any link.There is a primality testing algorithm and an algorithm to find the least quadratic nonresidue modulo p that are improved if the Generalised Riemann hypothesis is true. In practice these algorithms are not often used as there are better randomised algorithms. Bottom line...it could be possible but does not seem to be presently known.
+Fizz Plus Hi, I 'lltry to do a Q+A video on some of these issues in the next couple of weeks. Thanks for the comment.
What is Encryption and How Does it Work? | Mashable Explains
Encryption & decryption technology protects your e-mails, banking transactions, and even those questionable Etsy purchases. So how does it work, exactly? Hey ...
+Drake B Eh, close enough. For RSA at least, the signature is just a hash of the message encrypted with the sender's private key. Having to explain all that though would just complicate the analogy, and doesn't really add any important information for the average person.
A quick explanation of how encryption works. In this video, where internet banking is used as an example, a simple conversion key, as a secret code, is used to ...
Computer Tech Solutions : How Does Encryption Work?
Encryption works by replacing on letter or numerical character with another character or symbol to create an encoded message. Understand encryption with ...
That would more come under the lines of how to build an encryption. this is
just showing fundamentals of how the process works and explaining that an
encryption is just a hidden value that can be uncovered by a unique system.
This is one of the oldest algorithms and encryption methods have become
infiltrated Raj the following location to see the latest complex
algorithms: encrypt.newatsys.com
wow i tried typing a encrypted response to this saying you are a douche but
it says "! Error, try again" haha. Guess youtube doesn't like random
letters and symbols