Enter your query, example: how not cry when slicing onion or how to enter an Free Italian Sex Webcams?

How encryption works Videos

How encryption works

An explanation of encryption for everyone. Using only high school mathematics. See my other videos ...

User Comments

https://lh4.googleusercontent.com/-wGCqwTdUE4w/AAAAAAAAAAI/AAAAAAAAABA/MoikRA1LvhM/photo.jpg?sz=64
Hey man love the vids. I am in engineering school and I love learning about this stuff. Could it be possible that the solution to the reimann hypothesis is a "decrypter" for massive prime numbers allowing anyone to read private information? I can understand from the physics side why the hypothesis is wanted to be solved but I can't really think of any real world applications.
https://lh4.googleusercontent.com/-K4Y0UFmFYO0/AAAAAAAAAAI/AAAAAAAAACk/Mg5fp8Pprws/photo.jpg?sz=64
+Fizz My first reaction was that there is no link between the Riemann hypothesis (by the way I have a video on that Intro Riemann hypothesis - YouTube ) and factoring huge numbers into its prime divisors. I have spoken with 2 colleagues who do research in the prime number theorem and computational number theory and neither know of any link.There is a primality testing algorithm and an algorithm to find the least quadratic nonresidue modulo p that are improved if the Generalised Riemann hypothesis is true. In practice these algorithms are not often used as there are better randomised algorithms. Bottom line...it could be possible but does not seem to be presently known.
https://lh4.googleusercontent.com/-K4Y0UFmFYO0/AAAAAAAAAAI/AAAAAAAAACk/Mg5fp8Pprws/photo.jpg?sz=64
+Fizz Plus Hi, I 'lltry to do a Q+A video on some of these issues in the next couple of weeks. Thanks for the comment.

What is Encryption and How Does it Work? | Mashable Explains

Encryption & decryption technology protects your e-mails, banking transactions, and even those questionable Etsy purchases. So how does it work, exactly? Hey ...

User Comments

https://lh4.googleusercontent.com/-r43NDSxfqFE/AAAAAAAAAAI/AAAAAAAALrQ/7X6nrqx9Iss/photo.jpg?sz=64
This is a great explanation of how public key encryption works. I'll have to remember this one...
https://lh6.googleusercontent.com/-ohVUzA2TsFQ/AAAAAAAAAAI/AAAAAAAAA-k/o5orhf-yvX0/photo.jpg?sz=64
+Andrew Meyer Thanks Andrew. Let us know if there's anything you'd like us to explain in the future!
https://lh6.googleusercontent.com/-Ou4uEwjgTjk/AAAAAAAAAAI/AAAAAAAAB_A/ilqPmnCtwMM/photo.jpg?sz=64
very well explained :)
https://lh6.googleusercontent.com/-ohVUzA2TsFQ/AAAAAAAAAAI/AAAAAAAAA-k/o5orhf-yvX0/photo.jpg?sz=64
+Shaffiullah khan Thanks!
https://lh3.googleusercontent.com/-LkHkclOFF_8/AAAAAAAAAAI/AAAAAAAAAFA/SUYfSPNeIFY/photo.jpg?sz=64
Nice video and metaphor but RSA encryption is not "double" encryption, authentication is checked by encryption a "signature" with the private key
https://lh4.googleusercontent.com/-r43NDSxfqFE/AAAAAAAAAAI/AAAAAAAALrQ/7X6nrqx9Iss/photo.jpg?sz=64
+Drake B Eh, close enough. For RSA at least, the signature is just a hash of the message encrypted with the sender's private key. Having to explain all that though would just complicate the analogy, and doesn't really add any important information for the average person.
https://lh5.googleusercontent.com/-HWosbB_NCBQ/AAAAAAAAAAI/AAAAAAAAArc/k1LTACanmeU/photo.jpg?sz=64
Interesting Presentation.. Looking forward for more
https://lh6.googleusercontent.com/-ohVUzA2TsFQ/AAAAAAAAAAI/AAAAAAAAA-k/o5orhf-yvX0/photo.jpg?sz=64
+Rokibul Hasan Tanzim Thanks! Anything you'd like us to explain next?
https://lh6.googleusercontent.com/-RcNgpCPn4e4/AAAAAAAAAAI/AAAAAAAAG-s/GGBZ6dhFkvE/photo.jpg?sz=64
Justin Timberlake wants to know what's in the box, too.
https://lh6.googleusercontent.com/-ohVUzA2TsFQ/AAAAAAAAAAI/AAAAAAAAA-k/o5orhf-yvX0/photo.jpg?sz=64
+Eric Torres (SizZle) :|
https://lh4.googleusercontent.com/-ANYsY6wWXZ4/AAAAAAAAAAI/AAAAAAAAAA8/dlam4hcy__s/photo.jpg?sz=64
Hello. LOL
https://lh6.googleusercontent.com/-ohVUzA2TsFQ/AAAAAAAAAAI/AAAAAAAAA-k/o5orhf-yvX0/photo.jpg?sz=64
+Omar J yo!

Encryption Explained

A quick explanation of how encryption works. In this video, where internet banking is used as an example, a simple conversion key, as a secret code, is used to ...

Computer Tech Solutions : How Does Encryption Work?

Encryption works by replacing on letter or numerical character with another character or symbol to create an encoded message. Understand encryption with ...

User Comments

https://gp3.googleusercontent.com/-1VD83QGy11E/AAAAAAAAAAI/AAAAAAAAAAA/GskYgd1YO4Q/s48-c-k-no/photo.jpg?sz=64
That would more come under the lines of how to build an encryption. this is just showing fundamentals of how the process works and explaining that an encryption is just a hidden value that can be uncovered by a unique system.
https://i1.ytimg.com/i/kkTF4iPkx-wPN1kt-uA6Rw/1.jpg?sz=64
This is one of the oldest algorithms and encryption methods have become infiltrated Raj the following location to see the latest complex algorithms: encrypt.newatsys.com
https://gp6.googleusercontent.com/-mNGZ-FuCnTA/AAAAAAAAAAI/AAAAAAAAAAA/ygVvip2oy0M/s48-c-k-no/photo.jpg?sz=64
wow i tried typing a encrypted response to this saying you are a douche but it says "! Error, try again" haha. Guess youtube doesn't like random letters and symbols
https://gp6.googleusercontent.com/-Wv0khzIPatQ/AAAAAAAAAAI/AAAAAAAAAAA/dUMzQ-XNN30/s48-c-k-no/photo.jpg?sz=64
I lost 2 minutes of my life with something that I know since 4th grade :))
https://gp3.googleusercontent.com/-1VD83QGy11E/AAAAAAAAAAI/AAAAAAAAAAA/GskYgd1YO4Q/s48-c-k-no/photo.jpg?sz=64
And you wasted another 30 seconds typing that comment.
https://gp5.googleusercontent.com/-9tcNx8yeK2g/AAAAAAAAAAI/AAAAAAAAAAA/GYabBY9SsuY/s48-c-k-no/photo.jpg?sz=64
Simple explanation without the gobbledygook! Thanks...
https://gp5.googleusercontent.com/-jvfa1GyomW0/AAAAAAAAAAI/AAAAAAAAAAA/dP2497xTX9c/s48-c-k-no/photo.jpg?sz=64
Can you teach the more complicated version?
https://gp3.googleusercontent.com/-C-CIVu3k08g/AAAAAAAAAAI/AAAAAAAAAAA/Jnn1WKiVeT8/s48-c-k-no/photo.jpg?sz=64
This video made a lot of sense! Thanks!
https://gp5.googleusercontent.com/-1xe3LjDBwuM/AAAAAAAAAAI/AAAAAAAAAAA/lDrj9Q0eQM0/s48-c-k-no/photo.jpg?sz=64
You have an awesome voice!
https://i1.ytimg.com/i/34j2NcodMiGADDV5o1wmYQ/1.jpg?sz=64
This is a great video!

The Internet: Encryption & Public Keys

Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online.

User Comments

https://lh5.googleusercontent.com/-VYUtYgDKcaw/AAAAAAAAAAI/AAAAAAAAAD8/Kv5JAsqEyUs/photo.jpg?sz=64
thats cool and all but the NSA can break 2048-bit encryption
https://lh5.googleusercontent.com/-twKZDmR0u50/AAAAAAAAAAI/AAAAAAAAAGs/EZoYDznwREo/photo.jpg?sz=64
I said where they stated not what the website think .
https://lh5.googleusercontent.com/-VYUtYgDKcaw/AAAAAAAAAAI/AAAAAAAAAD8/Kv5JAsqEyUs/photo.jpg?sz=64
//arstechnica.com/security/2013/09/of-course-nsa-can-crack-crypto-anyone-can-the-question-is-how-much/
https://lh5.googleusercontent.com/-twKZDmR0u50/AAAAAAAAAAI/AAAAAAAAAGs/EZoYDznwREo/photo.jpg?sz=64
+GreenBeen2 Any source where they stated this?

Sookasa Protection demo: How encryption works

How Sookasa's patented encryption technology protects your important corporate data.
Sign up for free to join this conversation on fsaved.com.
Already have an account? Sign in to comment